by kettunen on 3/10/22, 7:32 AM with 130 comments
by bauruine on 3/10/22, 8:28 AM
[0]: Search for HiddenServiceSingleHopMode on https://2019.www.torproject.org/docs/tor-manual.html.en or just use the following config options
SOCKSPort 0
HiddenServiceNonAnonymousMode 1
HiddenServiceSingleHopMode 1
by nextaccountic on 3/10/22, 7:51 AM
Is there any evidence that the majority of exit nodes aren't malicious? There's only 300 or so in the US, 300 or so in Germany, and in other countries even less. What would it take for three letter agencies to compromise most of it?
I mean, suppose all of the existing nodes weren't malicious. Could a government agency plausibly run 1000 exit nodes in a way that doesn't give away they are government-run? This would make the majority of exit nodes malicious.
by p4bl0 on 3/10/22, 2:08 PM
$ curl -I https://pablo.rauzy.name/
HTTP/1.1 200 OK
Server: nginx/1.14.2
Date: Thu, 10 Mar 2022 14:04:44 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 2843
Last-Modified: Sun, 23 Jan 2022 22:21:41 GMT
Connection: keep-alive
Onion-Location: http://c2fk5i7jqn7am7nfo7eb7hwrkclyj3jj4qcwgdh6ievp7v5ie4gd3mid.onion/
It would be interesting to try to see if the Tor Browser has a TOFU policy and warn its user if the onion address change after they visited the site once.If it is the case then you combine the ease of access of typing a normal domain name and the Onion security through an HSTS equivalent mechanism.
by linuxandrew on 3/10/22, 9:09 AM
I think there are probably some uses of the Tor network that aren't fully realised yet - file sharing (something similar to I2P) which avoids the exit node using onion addressing and chat applications (like Briar which uses onion addresses, or Secure Scuttlebutt).
As for web traffic, it is nice to offer an onion address. I wonder if websites could offer an "upgrade" to onion addresses, similar to how IPFS does?
by nonrandomstring on 3/10/22, 9:08 AM
No, the article is asking how you could, as a website owner, make things easier on Tor users and yourself! It starts with the assumption that you care, and want to help users who require better privacy.
It answers, though not in detail, the many HN readers who invariably post replies concerning Tor that "All my abuse comes through Tor".
Creating an .onion address mitigates that significantly.
by noname120 on 3/10/22, 8:23 AM
From Wikipedia:
> Addresses in the onion TLD are […] automatically generated based on a public key when an onion service is configured.
> 256-bit ed25519 public key along with a version number and a checksum of the key and version number
That's all you need to know.
by shp0ngle on 3/10/22, 8:50 AM
What? Writing raw onion addresses is like writing raw IPv6 addresses. Nobody can remember then and check them.
What is easier
or
> ej3kv4ebuugcmuwxctx5ic7zxh73rnxt42soi3tdneu2c2em55thufqd.onion
by Sami_Lehtinen on 3/10/22, 2:26 PM
Actually this is not true. Tor runs as SOCKS5 proxy, and you can use any browser or application with it.
by bawolff on 3/10/22, 9:08 AM
Users are bad at security. If they fail to set up tor, .onion links don't work, so it acts as a barrier against users shooting themselves in the foot.
This is counterbalanced by higher phishing risks.
by JulianMorrison on 3/10/22, 11:23 AM
by djdjfhsje33edh on 3/10/22, 2:50 PM
by badrabbit on 3/10/22, 9:33 PM
by Tepix on 3/10/22, 2:55 PM
by rosndo on 3/10/22, 8:14 AM
There are no other practical attacks that malicious exit nodes could execute against sites using TLS and HSTS preload lists. If you’re a website administrator, fixing those things should be your priority before implementing onion addresses.
Onion addresses also come with slight drawbacks. They’re difficult for users and more vulnerable to phishing. Hidden services are also extremely vulnerable to CPU-based DoS attacks.
by moltke on 3/10/22, 3:03 PM