[tor-talk] Hidden services for mundane things (was: Re: Pirate Linux)

Ted Smith tedks at riseup.net
Fri Aug 19 18:49:48 UTC 2011


On Tue, 2011-08-16 at 16:14 -0400, andrew at torproject.org wrote:
> On Tue, Aug 16, 2011 at 11:38:35AM -0400, tedks at riseup.net wrote 2.6K bytes in 68 lines about:
> : Is there a reason for doing this over a hidden service instead of just
> : Tor? I use a hidden service to check if my home server is reachable, but
> : if I'm on a network I don't trust (which is most of them) I just connect
> : to things through Tor.
> 
> I do this because I don't want to have to trust the exit node, the isp
> of the exit node, and the networks between the exit node and the
> destination. I use tor for lots of stuff, banking, general browsing,
> etc. But checking my email, ssh access, and such I do via hidden service
> so, in theory, no one knows what I'm doing.
> 
> For clarity, every server I access has a hidden service setup in torrc,
> like so:
> 
> HiddenServiceDir /usr/local/var/lib/tor/hidden/ssh/
> HiddenServicePort 22 127.0.0.1:22
> 
> HiddenServiceDir /usr/local/var/lib/tor/hidden/web/
> HiddenServicePort 80 127.0.0.1:80
> 
> HiddenServiceDir /usr/local/var/lib/tor/hidden/imaps/
> HiddenServicePort 995 127.0.0.1:995
> 
> and so on for each different service. 
> 
> Some hosts have 10 different hidden services on them. I've been doing
> this for years. It lets me keep a simple deny all incoming firewall, and
> not have to worry about NAT and such. Hidden services just work and are
> globally accessible.
> 

Is there a reason why you use a different service for each port, instead
of having them all on one service?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20110819/a67c8702/attachment.pgp>


More information about the tor-talk mailing list