Author: phobos Date: 2012-04-12 12:34:34 +0000 (Thu, 12 Apr 2012) New Revision: 25605
Modified: website/trunk/docs/en/hidden-services.wml website/trunk/docs/en/tor-hidden-service.wml Log: update hidden service examples.
Modified: website/trunk/docs/en/hidden-services.wml =================================================================== --- website/trunk/docs/en/hidden-services.wml 2012-04-12 01:10:13 UTC (rev 25604) +++ website/trunk/docs/en/hidden-services.wml 2012-04-12 12:34:34 UTC (rev 25605) @@ -69,17 +69,16 @@ # use?
<p> - Step three: A client that wants to contact a hidden service needs to - learn about its - onion address first. After that, the client can initiate connection - establishment by downloading the descriptor from the distributed hash - table. If - there is a descriptor for XYZ.onion (the hidden service could also be - offline or have left long ago, or there could be a typo in the onion - address), the client now knows the set of introduction points and the - right public key to use. Around this time, the client also creates - a circuit to another randomly picked relay and asks it to act as - <em>rendezvous point</em> by telling it a one-time secret. + Step three: A client that wants to contact a hidden service needs + to learn about its onion address first. After that, the client can + initiate connection establishment by downloading the descriptor from + the distributed hash table. If there is a descriptor for XYZ.onion + (the hidden service could also be offline or have left long ago, + or there could be a typo in the onion address), the client now + knows the set of introduction points and the right public key to + use. Around this time, the client also creates a circuit to another + randomly picked relay and asks it to act as <em>rendezvous point</em> + by telling it a one-time secret. </p>
<img alt="Tor hidden service step three" src="$(IMGROOT)/THS-3.png"> @@ -87,24 +86,23 @@ # "IP1-3" and "PK"
<p> - Step four: When the descriptor is present and the rendezvous point is - ready, the client assembles an <em>introduce</em> - message (encrypted to the hidden service's public key) including the - address of the rendezvous point and the one-time secret. The client sends - this message to one of the introduction points, requesting it be delivered - to the hidden service. Again, communication takes place via a Tor circuit: - nobody can relate sending the introduce message to the client's IP - address, so the client remains anonymous. + Step four: When the descriptor is present and the rendezvous + point is ready, the client assembles an <em>introduce</em> message + (encrypted to the hidden service's public key) including the address + of the rendezvous point and the one-time secret. The client sends + this message to one of the introduction points, requesting it be + delivered to the hidden service. Again, communication takes place + via a Tor circuit: nobody can relate sending the introduce message + to the client's IP address, so the client remains anonymous. </p>
<img alt="Tor hidden service step four" src="$(IMGROOT)/THS-4.png">
<p> Step five: The hidden service decrypts the client's introduce message - and finds the - address of the rendezvous point and the one-time secret in it. The service - creates a circuit to the rendezvous point and sends the one-time secret to - it in a rendezvous message. + and finds the address of the rendezvous point and the one-time secret + in it. The service creates a circuit to the rendezvous point and + sends the one-time secret to it in a rendezvous message. </p>
<p>
Modified: website/trunk/docs/en/tor-hidden-service.wml =================================================================== --- website/trunk/docs/en/tor-hidden-service.wml 2012-04-12 01:10:13 UTC (rev 25604) +++ website/trunk/docs/en/tor-hidden-service.wml 2012-04-12 12:34:34 UTC (rev 25605) @@ -20,15 +20,34 @@ </p>
<p>If you have Tor installed, you can see hidden services - in action by visiting <a href="http://duskgytldkxiuqc6.onion/">our - example hidden service</a>. + in action by visiting one of our official hidden services: + <ul> + <li><a href="http://idnxcnkne4qt76tg.onion/">The Tor Project Website</a></li> + <li><a href="http://j6im4v42ur6dpic3.onion/">The Tor Package Archive</a></li> + <li><a href="http://p3igkncehackjtib.onion/">The Tor Media Archive</a></li> + </ul> + + Others run reliable hidden services, such as <a + href="http://3g2upl4pq6kufc4m.onion/%22%3EThe Duck Duck + Go</a> search engine and someone hosting a <a + href="http://duskgytldkxiuqc6.onion/%22%3Esample site</a>. </p> - - <p>This howto describes the steps for setting up your own hidden service + <p> + It will typically take 10-60 seconds to load (or to decide that the + service is currently unreachable). If it fails immediately and your + browser pops up an alert saying that "www.duskgytldkxiuqc6.onion could + not be found, please check the name and try again" then you haven't + configured Tor correctly; see <a href="<page docs/faq>#DoesntWork">the + it-doesn't-work FAQ entry</a> for some help. + </p> + + <p> + This howto describes the steps for setting up your own hidden service website. For the technical details of how the hidden service protocol - works, see our <a href="<page docs/hidden-services>">hidden service protocol</a> page. + works, see our <a href="<page docs/hidden-services>">hidden service + protocol</a> page. </p> - + <hr> <a id="zero"></a> <h2><a class="anchor" href="#zero">Step Zero: Get Tor working</a></h2> @@ -48,66 +67,33 @@ X howto</a>, and Linux/BSD/Unix users should follow the <a href="<page docs/tor-doc-unix>">Unix howto</a>. </p> - - <p>Once you've got Tor installed and configured, - you can see hidden services in action by following this link to <a - href="http://duskgytldkxiuqc6.onion/%22%3Eour example hidden service</a> - or the <a - href="http://3g2upl4pq6kufc4m.onion/%22%3EDuckDuckGo search engine hidden service</a>. - It will typically take 10-60 seconds to load (or to decide that it - is currently unreachable). If it fails immediately and your browser - pops up an alert saying that "www.duskgytldkxiuqc6.onion could not - be found, please check the name and try again" then you haven't - configured Tor correctly; see <a - href="<page docs/faq>#DoesntWork">the - it-doesn't-work FAQ entry</a> for some help. - </p> - + <hr> <a id="one"></a> <h2><a class="anchor" href="#one">Step One: Install a web server locally</a></h2> <br>
- <p>First, you need to set up a web server locally. Setting up a web - server can be tricky, - so we're just going to go over a few basics here. If you get stuck - or want to do more, find a friend who can help you. We recommend you - install a new separate web server for your hidden service, since even - if you already have one installed, you may be using it (or want to use - it later) for an actual website. + <p> + First, you need to set up a web server locally. Setting up a web + server can be tricky, so we're just going to go over a few basics + here. If you get stuck or want to do more, find a friend who can + help you. We recommend you install a new separate web server for + your hidden service, since even if you already have one installed, + you may be using it (or want to use it later) for an actual website. </p> - - <p>If you're on Unix or OS X and you're comfortable with - the command-line, by far the best way to go is to install <a - href="http://www.acme.com/software/thttpd/%22%3Ethttpd</a>. Just grab the - latest tarball, untar it (it will create its own directory), and run - <kbd>./configure && make</kbd>. Then <kbd>mkdir hidserv; cd - hidserv</kbd>, and run - <kbd>../thttpd -p 5222 -h localhost</kbd>. It will give you back your prompt, - and now you're running a webserver on port 5222. You can put files to - serve in the hidserv directory. + + <p> + Once you've got your web server set up, make + sure it works: open your browser and go to <a + href="http://localhost:5222/%22%3Ehttp://localhost:5222/</a>, where + 5222 is the port that you picked above. Then try putting a file in + the main html directory, and make sure it shows up when you access + the site. The reason we bind the web server only to localhost is to + make sure it isn't publically accessible. If people could get to it + directly, they could confirm that your computer is the one offering + the hidden service. </p> - - <p>If you're on Windows, you might pick <a - href="http://savant.sourceforge.net/%22%3ESavant</a> or <a - href="http://httpd.apache.org/%22%3EApache</a>, and be sure to configure it - to bind only to localhost. You should also figure out what port you're - listening on, because you'll use it below. - </p> - - <p>(The reason we bind the web server only to localhost is to make - sure it isn't publically accessible. If people could get to it directly, - they could confirm that your computer is the one offering the hidden - service.) - </p> - - <p>Once you've got your web server set up, make sure it works: open your - browser and go to <a - href="http://localhost:5222/%22%3Ehttp://localhost:5222/</a>, where 5222 is - the port that you picked above. Then try putting a file in the main html - directory, and make sure it shows up when you access the site. - </p> - + <hr> <a id="two"></a> <h2><a class="anchor" href="#two">Step Two: Configure your hidden service</a></h2>
tor-commits@lists.torproject.org