12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394 |
- <?php
- /**
- * <https://y.st./>
- * Copyright © 2016 Alex Yst <mailto:copyright@y.st>
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <https://www.gnu.org./licenses/>.
- **/
- $xhtml = array(
- 'title' => 'Relay service',
- 'body' => <<<END
- <p>
- I did not sleep well last night.
- I woke up at about four and couldn't get back to sleep.
- </p>
- <p>
- I began my <a href="http://sbuk7aqcxkoyipwv.onion/">onion-to-clearnet</a> forwarding service today to aid in bypassing $a[Tor] blocks.
- I obviously can't use it myself, as my own $a[IP] address acts as the exit, but perhaps someone can make use of it.
- Unfortunately, I set up the website for the server over $a[HTTP] instead of $a[HTTPS].
- I much prefer $a[HTTPS], but a lot of onionlanders don't.
- This service is for them, not me, and encryption is already supplied by $a[Tor], so I'll do it their way.
- I've also decided to use the high ports, not the low ports, for forwarding.
- Many of the low ports have specific services that they are assumed to run.
- If I end up needing one of those ports after I've already assigned it for forwarding, it will be too late.
- As such, I've decided to use the ports in the 49152-65535 range, as they are currently defined as ports that will not be assigned any specific service.
- If the $a[IANA] decides to change this, some network changes will be to be expected, so there won't be any issues with me reclaiming ports; it wasn't my fault, I took reasonable precautions.
- <a href="https://opalrwf4mzmlfmag.onion/">Wowaname</a> suggested allowing other people to share their $a[IP] addresses in the same way, using my onion to forward to random volunteer machines in a round-robin-type way.
- I'm not sure who would volunteer, but it seems like it would be easy to set up on their end.
- The simplest way would probably be to set up port forwarding in their home router configuration.
- They wouldn't even need to install $a[Tor], though of course I recommend installing and using $a[Tor] to everyone.
- I thought about adding freenode to my forwarding configuration, but due to the fact that I don't want to play "favorites" with $a[Tor]-haters, I didn't want to add any specific services until they were requested.
- <a href="https://ronsor.net/">Ronsor</a> quickly suggested <a href="ircs://sbuk7aqcxkoyipwv.onion:49152/">freenode</a> (once people were actually awake), so that resolved that issue.
- </p>
- <p>
- While discussing ways to get multiple $a[IP] addresses to be usable for relay service, wowaname and I were discussing on <a href="ircs://kitsune6uv4dtdve.onion:6697/%23Volatile">#Volatile</a> how nice round robin support for onion addresses.
- One hidden service node can relay to multiple servers, but multiple hidden service nodes cannot use the same onion address like can be done in $a[DNS].
- Cathugger knew of an article about <a href="https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/">horizontal scalability of hidden services</a>.
- With the techniques the author suggests, it is possible to get up to sixty separate machines at separate locations to receive requests meant for a single onion address.
- These sixty machines are all registered with the $a[Tor] network without any changes to the underlying infrastructure.
- The only things changed are on the machines that hold the private onion key.
- It sounds a bit difficult to deploy and custom code is needed, but it might get people thinking about the need to share onion addresses between machines like this.
- It might lead to changes in how $a[Tor] fundamentally handles hidden services.
- Even if it doesn't lead to changes, it provides an option for large services that really need more room to grow on the $a[Tor] network.
- </p>
- <p>
- When the local community college said that they would send me a gift card, I assumed that it was a use-anywhere prepaid type of gift card.
- That was a naïve assumption on my part.
- The card arrived in the mail today and it's a gift card for their in-house book store.
- As the card dosen't have much on it and I don't know if I'll be attending this school, it's little more than an amusing novelty item.
- Still, it got me to submit my feedback for their orientation.
- I was going to do that anyway, but this helped make sure I did it in a timely manner.
- </p>
- <p>
- Our mother, Cyrus, Vanessa, and I volunteered at a spaghetti-serving fund raiser today.
- We told them that we were there to help, then waited a couple hours for them to be ready for help.
- We were pretty much just wasting time unable to do anything, so we asked if they even needed us.
- They told us that they didn't even want our help.
- Why didn't they just tell us that from the beginning? While I was waiting, I thought about the fact that my <a href="/en/domains/accessed574tizbu.onion.xhtml">accessed574tizbu</a> onion would have been a cool address for my forwarding service because it helps people access malicious servers, but I'm going to continue using my <a href="/en/domains/sbuk7aqcxkoyipwv.onion.xhtml">sbuk7aqcxkoyipwv</a> onion.
- </p>
- <p>
- It seems that Ronsor will be away for three weeks.
- </p>
- <p>
- Wowaname decided that she wanted her $a[Tor]-to-IRC2P onion to be "listed" on my forwarding service.
- It seemed pretty strange to me.
- I'm not sure she understood that it was a forwarding service, not a listing of forwarding services.
- However, it seemed like it could be of benefit to $a[Tor] users, as it does provide access to a service not normally reachable over $a[Tor], so I went with it.
- However, I didn't want it to look like my forwarding service was not up to forwarding to other darknets and that this burden had to fall to others.
- To fix this, I set up $a[I2P] on my server and forwarded one of my onion ports to <a href="irc://sbuk7aqcxkoyipwv.onion:49153/">IRC2P</a> as well.
- If I chance upon any other services similar to mine, I'll add them to my list and forward to their destinations in parallel.
- A little redundancy doesn't hurt.
- While the onion-to-clearnet ports are nice for getting access to places without giving into their ridiculous anti-privacy agendas, the onion-to-other-darnet ports are nice for convenience.
- </p>
- <p>
- As I was installing <a href="apt:i2p">$a[I2P]</a> on my server, I decided to install it <a href="https://geti2p.net/en/download/debian#debian">from a package</a>, unlike on my client machine.
- Installation went fine, but I found that $a[I2P]'s package, being from a non-Debian party, is not set up to start itself as a system service.
- You still need to run <code>i2prouter start</code> to start it each time you start the system, unless you script something to take care of that.
- $a[I2P]'s strange (in my opinion) setup of binding ports to services made it ridiculously easy to forward between darknets.
- It also didn't hurt that one of the default port bindings was pointed directly to the service that I needed in this case.
- </p>
- END
- );
|