Please help me test my hidden service
Ringo
2600denver at gmail.com
Tue Aug 4 08:34:55 UTC 2009
"For that matter, it's probably best *not* to run most kinds of hidden
> services on tor relays precisely because tor relays are well known through
> the directory. Running a hidden service on a client-only tor would be the
> safest way because clients are not listed anywhere as such."
I actually thought the opposite was true. If somebody is running a
hidden service that's transferring lots of data, somebody listening to
their connection would be able to tell that lots of traffic was going
through the Tor network. If this person had a middleman relay, this
would be easy to explain. I guess it depends on the person's situation.
Thoughts?
"Best you learn how to protect your butt *before* opening it up to the
> world, no? Have you thought about running your service inside a jail or a
> virtual machine? That would make it much easier to wall it off from the
> rest of your computer and home network."
It's inside a virtual machine and the account it's using on the host
machine has been limited fairly well IMO.
> A jail or a VM can certainly help you there by limiting the ability
> of shell accounts to access the world at large, especially when combined
> with the application of a decent packet filter on the host system.
Something deep inside me says it would be a horrible idea to give out
shell access but it's in a virtual machine (which I'm not attached to if
I lose) and the host firewall won't let it send anything out that
doesn't go through Tor. Maybe it wouldn't be so dangerous after all.
Solidarity,
Ringo
More information about the tor-talk
mailing list