tor_hidden_service_example update with v2 address

This commit is contained in:
openoms
2021-01-31 14:08:09 +00:00
committed by GitHub
parent 88d54d1bba
commit 92f0ca8679

View File

@@ -1,7 +1,7 @@
## Create a Tor Hidden Service
A simple example of creating and using a Tor Hidden Service.
Using ThunderHub as an example.
Using ThunderHub as an example, use anyother name to be change the directory name.
* Install Tor:
```
@@ -11,16 +11,33 @@ $ sudo apt install tor
```
$ sudo nano /etc/tor/torrc
```
* add:
* add for a v3 onion address:
```
HiddenServiceDir /var/lib/tor/thunderhub/
HiddenServiceVersion 3
HiddenServicePort 80 127.0.0.1:3010
```
* add for a v2 onion address:
```
HiddenServiceDir /var/lib/tor/thunderhub/
HiddenServiceVersion 2
HiddenServicePort 80 127.0.0.1:3010
```
* restart Tor:
```
sudo systemctl restart tor
```
* list the files in the directory
```
$ sudo ls -la /mnt/hdd/tor/lndrpc10009/
total 12
drwx------ 1 debian-tor debian-tor 136 Jan 30 07:09 .
drwx------ 1 debian-tor debian-tor 826 Jan 31 00:00 ..
drwx------ 1 debian-tor debian-tor 0 Feb 11 2020 authorized_clients
-rw------- 1 debian-tor debian-tor 63 Jan 30 07:09 hostname
-rwx------ 1 debian-tor debian-tor 64 Feb 11 2020 hs_ed25519_public_key
-rwx------ 1 debian-tor debian-tor 96 Feb 11 2020 hs_ed25519_secret_key
```
* note the Hidden Service address:
```
sudo cat /var/lib/tor/thunderhub/hostname
@@ -32,4 +49,4 @@ sudo cat /var/lib/tor/thunderhub/hostname
#### Notes:
The SSL stripping attack is not applicable when the traffic does not leave the Tor network so usinga self-hosted Hidden Service in the Tor Browser is not at risk.
Always make sure that the clearnet site you open in the Tor Browser uses SSL encryption (HTTPS).
Always make sure that the clearnet site you open in the Tor Browser uses SSL encryption (HTTPS).