Tutorials for providing Hidden Services?
Ringo Kamens
2600denver at gmail.com
Thu Dec 18 21:28:47 UTC 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
6cnf6cp02 at sneakemail.com wrote:
> Hi!
>
> I want to provide basic free anonymous blogging services using Tor's hidden services. Are there any tutorials for this, apart from the basic setup information on Torproject.org? More specifically, how can I stop my users from identifying my server? What do I have to pay attention to?
>
> How can I block connection attempts by Apache using my external network interface, eg. if the users execute scripts that contact external addresses? What information is exposed by environment variables, and how can I stop the user from reading them? For example, can I modify timezone/timestamps to obfuscate my server location?
>
> What settings do I have to change to fully remove Apache's IP logging to protect my users?
>
> Thanks,
> Daniel
>
If you're running a hidden service, you don't have to turn off Apache's
logging because it will all look like it's coming from Localhost. You
should start a guide on the NoReply wiki or maybe one of the hidden ones.
Ringo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFJSsCO6pWcWSc5BE4RAsCxAKCHn9uIVIAmd+Y1TLZaY+bI8hT7LQCgxNCG
4hVbEhYrgkaexSmDIC1QWqA=
=lz6G
-----END PGP SIGNATURE-----
More information about the tor-talk
mailing list