Hi,
I just set up an experimental Tor mirror here:
https://defuse.ca/tor-mirror/
(Please don't include it in any mirror lists yet.)
I'm a little worried about security, though. The 'Configuring a Mirror'
page [1] has me cloning the Tor website via rsync, which isn't a secure
protocol. There are two specific risks here:
1. To the user of the mirror: A network attacker between my server and
Tor could have replaced the Tor binaries with a malicious copy.
2. To the host of the mirror: A network attacker, or an evil sysadmin at
Tor, could insert PHP scripts (or other things that Apache will
execute) into my system, then execute by making a web request.
I worked around (2) by adding "php_flag engine off" to the Directory
entry in my Apache configuration, but I'm not certain that's good
enough. Can the .htaccess in the Tor mirror override it? Are there other
things that Apache will execute that I'm not aware of?
To solve (1), how about letting users submit an SSH public key so they
can rsync over SSH, or just have an account with a stupid password like
"tormirror", then publish the SSH fingerprint on torproject.org?
A Git repository with signed tags could be another solution.
[1] https://www.torproject.org/docs/running-a-mirror.html.en
Thanks,
--
Taylor Hornby
Rsynced every 4 hours, should be HTTPS-only (HTTP redirects to HTTPS):
https://tor-mirror-ssl.nicecon.org
Intend to keep it available for as long as Tor is blocked in Turkey (or
until Turkey blocks that site as well)
Hello everybody I'd like to introduce myself:
My name's André Schulz and i'm currently hosting a mirror of the Tor
website at
http://tor.xn--externenprfung-nichtschler-7zcn.de/
and the dist is located at
http://tor.xn--externenprfung-nichtschler-7zcn.de/dist/
------------------------------------------------------------------------------
Via the .htaccess-file I activated Directory Indexing so the dist
directory can be seen in public.
I didn't buy an SSL-Certificate yet, so i'm only hosting in http - not https.
Further information and mirror details:
| Country | Organisation | Status | ftp | http dist/ | http website |
https dist/ | https website | rsync dist/ | rsync website |
| DE | Externenprüfung Nichtschüler | Up to date | - | http
[http://tor.xn--externenprfung-nichtschler-7zcn.de/dist/] | http
[http://tor.xn--externenprfung-nichtschler-7zcn.de/] | - | - | - | - |
To specify the "up do date": I let a cronjob execute an .sh-script
every 4 hours so my mirror is synchronized with your primary server
every 4 hours ^^
Greetings,
André Schulz
Hello!
I've set up a new Website Mirror following the instructions from https://www.torproject.org/docs/running-a-mirror.html.en
at
https://tor-anonymizer.maclemon.at/
Updates are done automatically every 6h via rsync as recommended.
Is there anything else I should check, double check, do before submitting it to the official list of mirror servers?
Best regards
MacLemon
I have added the warning to the top of http://www.tailsgnulinux.org/ as requested.
Timothy Anderson
From: intrigeri
Sent: Wednesday, February 26, 2014 8:47 AM
To: tailsgnulinux(a)gmail.com
Cc: tails-dev(a)boum.org
Hi,
Lunar wrote (26 Feb 2014 11:13:28 GMT) :
> tailsgnulinux(a)gmail.com:
>> I have set up a new Tor mirror. It is located in the United States.
>> The url is http://tor.mirrors.tailsgnulinux.org/.
> Sorry but to the best of my knowledge, the canonical URL for Tails is
> <https://tails.boum.org/>. I am quite opposed to adding mirrors with
> misleading domain names to the pool of Tor Project's mirrors.
I'm afraid people who are looking for Tails might mistakenly believe
that tailsgnulinux.org is the real thing. Could you please add
a visible warning on this website, that points users to our website?
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
On Mon, 10 Feb 2014 22:29:04 -0600
John Ricketts <john(a)quintex.com> wrote:
> All,
>
> I see very little traffic on my mirror. is this common?
>
> John
> QuintexSJT
> _______________________________________________
> tor-mirrors mailing list
> tor-mirrors(a)lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-mirrors
Which mirror are we talking about?
On the Tor help desk, I often distribute mirror links to individuals
who cannot access the tpo home page. I find that I usually only send
links from mirror sites that use HTTPS with CA signed SSL
certificiate. I find that if I send an email response linking to a
mirror page that requires visitors to click through a warning, I
often have to send an additional email later, expaining to the user that
the site is not compromised, although all other times they see this
warning in their browser, they should listen.
I'm not sure if this applies to your mirror or not, but I do find
that the mirrors I send individuals to the most are those with
user-friendly HTTPS.