mirror of
https://github.com/openoms/bitcoin-tutorials.git
synced 2025-12-18 20:44:20 +01:00
Merge pull request #39 from nyxnor/patch-1
client authorization instructions for onion services
This commit is contained in:
@@ -1,35 +1,29 @@
|
||||
## Create a Tor Hidden Service
|
||||
A simple example of creating and using a Tor Hidden Service.
|
||||
|
||||
Using ThunderHub as an example, use anyother name to be change the directory name.
|
||||
Using SSH as an example, use any other name to be change the directory name.
|
||||
|
||||
* Install Tor:
|
||||
```
|
||||
$ sudo apt install tor
|
||||
sudo apt install tor
|
||||
```
|
||||
* Edit the config file:
|
||||
```
|
||||
$ sudo nano /etc/tor/torrc
|
||||
sudo nano /etc/tor/torrc
|
||||
```
|
||||
* add for a v3 onion address:
|
||||
* Choose v3 onion address:
|
||||
```
|
||||
HiddenServiceDir /var/lib/tor/thunderhub/
|
||||
HiddenServiceDir /var/lib/tor/ssh/
|
||||
HiddenServiceVersion 3
|
||||
HiddenServicePort 80 127.0.0.1:3010
|
||||
```
|
||||
* add for a v2 onion address:
|
||||
```
|
||||
HiddenServiceDir /var/lib/tor/thunderhub/
|
||||
HiddenServiceVersion 2
|
||||
HiddenServicePort 80 127.0.0.1:3010
|
||||
```
|
||||
* restart Tor:
|
||||
* Restart Tor:
|
||||
```
|
||||
sudo systemctl restart tor
|
||||
```
|
||||
* list the files in the directory
|
||||
* List the files in the directory
|
||||
```
|
||||
$ sudo ls -la /var/lib/tor/thunderhub/
|
||||
$ sudo ls -la /var/lib/tor/ssh/
|
||||
total 12
|
||||
drwx------ 1 debian-tor debian-tor 136 Jan 30 07:09 .
|
||||
drwx------ 1 debian-tor debian-tor 826 Jan 31 00:00 ..
|
||||
@@ -38,15 +32,78 @@ drwx------ 1 debian-tor debian-tor 0 Feb 11 2020 authorized_clients
|
||||
-rwx------ 1 debian-tor debian-tor 64 Feb 11 2020 hs_ed25519_public_key
|
||||
-rwx------ 1 debian-tor debian-tor 96 Feb 11 2020 hs_ed25519_secret_key
|
||||
```
|
||||
* note the Hidden Service address:
|
||||
* Note the Hidden Service address:
|
||||
```
|
||||
sudo cat /var/lib/tor/thunderhub/hostname
|
||||
```
|
||||
* Connect over the Tor Browser.
|
||||
|
||||
## Add client authorization (Optional)
|
||||
A simple example of requiring authentication credential in order to connect to the onion service
|
||||
|
||||
* Install required packages:
|
||||
```
|
||||
sudo apt install basez openssl
|
||||
```
|
||||
* Generate key:
|
||||
```
|
||||
openssl genpkey -algorithm x25519 -out /tmp/k1.prv.pem
|
||||
```
|
||||
* Re-format key into base32 creating public and private keys:
|
||||
```
|
||||
cat /tmp/k1.prv.pem | grep -v " PRIVATE KEY" | base64pem -d | tail --bytes=32 | base32 | sed 's/=//g' > /tmp/k1.prv.key
|
||||
openssl pkey -in /tmp/k1.prv.pem -pubout | grep -v " PUBLIC KEY" | base64pem -d | tail --bytes=32 | base32 | sed 's/=//g' > /tmp/k1.pub.key
|
||||
```
|
||||
* Note the private key (client):
|
||||
```
|
||||
cat /tmp/k1.prv.key
|
||||
```
|
||||
* Note the public key: (server):
|
||||
```
|
||||
cat /tmp/k1.pub.key
|
||||
```
|
||||
* Server config:
|
||||
* Create .auth file:
|
||||
```
|
||||
sudo nano /var/lib/tor/ssh/authorized_clients/alice.auth
|
||||
```
|
||||
* Edit .auth file:
|
||||
```
|
||||
descriptor:x25519:<base32-pub-key>
|
||||
```
|
||||
* Client config for (choose one):
|
||||
* GUI service (thunderhub):
|
||||
* Enter the private key noted above Tor Browser when prompted the [credential window](https://tb-manual.torproject.org/onion-services/).
|
||||
|
||||
* Headless service (ssh):
|
||||
* Edit the config file:
|
||||
```
|
||||
ClientOnionAuthDir /var/lib/tor/onion_auth/
|
||||
```
|
||||
* Create .auth_private file:
|
||||
```
|
||||
sudo nano /var/lib/tor/onion_auth/bob-ssh.auth_private
|
||||
```
|
||||
* Edit .auth_private file
|
||||
```
|
||||
<56-char-onion-addr-without-.onion-part>:descriptor:x25519:<base32-priv-key>
|
||||
```
|
||||
* Remove keys stored in /tmp:
|
||||
```
|
||||
sudo rm -f /tmp/k1.pub.key /tmp/k1.prv.key /tmp/k1.prv.pem
|
||||
```
|
||||
* Restart Tor to apply changes (server and client):
|
||||
```
|
||||
sudo systemctl restart tor@default
|
||||
```
|
||||
|
||||
#### Notes:
|
||||
The SSL stripping attack is not applicable when the traffic does not leave the Tor network so usinga self-hosted Hidden Service in the Tor Browser is not at risk.
|
||||
|
||||
Always make sure that the clearnet site you open in the Tor Browser uses SSL encryption (HTTPS).
|
||||
* The SSL stripping attack is not applicable when the traffic does not leave the Tor network so usinga self-hosted Hidden Service in the Tor Browser is not at risk.
|
||||
* Always make sure that the clearnet site you open in the Tor Browser uses SSL encryption (HTTPS).
|
||||
|
||||
#### Sources:
|
||||
|
||||
* [Tor Guide - Setup Onion Service](https://community.torproject.org/onion-services/setup/)
|
||||
* [Tor Guide - Client Authorization](https://community.torproject.org/onion-services/advanced/client-auth/)
|
||||
* [Mike Tigas bash script](https://gist.github.com/mtigas/9c2386adf65345be34045dace134140b) or [Suphanat Chunhapanya rust script](https://github.com/ppopth/torkeygen)
|
||||
|
||||
Reference in New Issue
Block a user