Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 3861  |
|  Oli to Richard Menedetter  |
|  Fidonet TOR service  |
|  16 Jan 22 12:18:50  |
 
MSGID: 2:280/464.47 61e3ff1a
REPLY: 2:310/31 61e3e9e0
PID: JamNNTPd/Linux 1
CHRS: LATIN-1 2
TZUTC: 0100
TID: CrashMail II/Linux 1.7
Richard wrote (2022-01-16):
RM> Hi All!
RM> If somebody wants to try to connect to Fidonet over a TOR hidden service
RM> then please let me know. I will send you an onion address.
RM> In regards to how to connect, should be as easy as running this:
RM> torsocks binkd
RM> and then configure the onion address as my DNS name.
or via -pipe option
node 1:2/3 -pipe "ncat --proxy-type socks5 --proxy 127.0.0.1:9050 abc123.onion
24554"
or with a perl hook
file tor-hook.pl:
sub on_call
{
if ($config{"tor-proxy"}) {
foreach (split(/;/, $hosts)) {
if ($_ =~ /\.onion\z/) {
$hosts = $_;
$socks = $config{"tor-proxy"};
Log(3, "Cpt. Hook: using tor-proxy $socks for .onion address");
}
}
}
return 1;
}
binkd.cfg:
perl-hooks /etc/binkd/tor-hook.pl
perl-var tor-proxy 127.0.0.1:9050/
node 1:2/3 abc123.onion
---
* Origin: Birds aren't real (2:280/464.47)
SEEN-BY: 1/123 15/0 30/0 80/1 90/1 105/81 106/201 120/340 123/131
SEEN-BY: 124/5016 153/757 7715 154/10 203/0 221/0 1 6 226/30 229/110
SEEN-BY: 229/317 424 426 428 550 664 700 240/1120 5832 249/206 400
SEEN-BY: 266/512 280/464 5003 5006 5555 282/464 1038 292/854 8125
SEEN-BY: 301/0 1 101 113 812 310/31 317/3 320/219 322/757 341/234
SEEN-BY: 342/200 396/45 423/120 460/58 633/280 712/848 770/1 920/1
SEEN-BY: 2452/250 5020/545 1042 5058/104
PATH: 280/464 301/1 229/426
|
[ << oldest | < older | list | newer > | newest >> ]