[tor-onions] Onion-routing of The Free Software Foundation Europe

Jacob Hrbek kreyren at rixotstudio.cz
Fri Jan 22 11:21:34 UTC 2021


On 1/21/21 9:27 PM, Silvia wrote:
> Exciting to see fsfe moving to onions.
> How can we help you guys with this?

Currently the main problem is with implementation as there is an issue 
with certificates using TLS-over-onions (Not economical for non-profit 
foundation) where it seems that using reverse proxy with currently used 
Apache or implementing EOTK is the way to go there? More options and way 
to configure EOTK (alec seems to be currently busy and unable to answer) 
appreciated.

Also brainstorm for the implementation as a whole would be appreciated 
the services seems to be mostly running in jail/VM which is favorable to 
be preserved for security reasons (e.g. in scenario where there is a 
major bug discovered in the wild to reduce the impact of one service on 
the system).
So i am currently unsure whether we want to:
1. run one tor daemon per system in jail/VM to provide the routing from 
exposed ports from the services e.g. 
https://git.fsfe.org/kreyren/fsfe-planet/src/branch/onionz/docker-compose.yml
2. implementing tor daemon within these jails/VMs with the service

srv/service1 (exposing port 12447)
srv/service2 (exposing port 12448)

and setting tor as

HiddenServiceDir /var/lib/tor/service1
HiddenServicePort 12447 127.0.0.1:12447

HiddenServiceDir /var/lib/tor/service2
HiddenServicePort 12447 127.0.0.1:12447


3. implementing tor daemon on the router assuming all services being 
routed through a routing server, but i am concerned about sanitization 
as if there is a bug in tor that could expose user traffic to bad 
actors. (currently being discussed)

4. Implementing xen (https://en.wikipedia.org/wiki/Xen) which currently 
not favorable as it would require lots of work on the backend.

5. Other?

FWIW i would also like to provide something like 
https://onion.debian.org so that the website list is available to the 
end-user.


-- 

- Krey

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x31AE4020956E0A9A.asc
Type: application/pgp-keys
Size: 3187 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-onions/attachments/20210122/2779b7b1/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 855 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-onions/attachments/20210122/2779b7b1/attachment.sig>


More information about the tor-onions mailing list