Delivery-Date: Fri, 02 Jan 2015 04:13:36 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD,URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 83DA51E045E
	for <archiver@seul.org>; Fri,  2 Jan 2015 04:13:34 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 5928F326DA;
	Fri,  2 Jan 2015 09:13:29 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id EB504325DB
 for <tor-talk@lists.torproject.org>; Fri,  2 Jan 2015 09:13:25 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id ZrrmSbQJ46k0 for <tor-talk@lists.torproject.org>;
 Fri,  2 Jan 2015 09:13:25 +0000 (UTC)
Received: from server4.tvdw.eu (lauravdw.com [IPv6:2001:1af8:4100:a00d:4::2])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256
 bits)) (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id B5F2632576
 for <tor-talk@lists.torproject.org>; Fri,  2 Jan 2015 09:13:25 +0000 (UTC)
Received: from proxy-gw-l.booking.com ([5.57.20.8] helo=Toms-MacBook-Pro.local)
 by server4.tvdw.eu with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128)
 (Exim 4.84) (envelope-from <info@tvdw.eu>) id 1Y6yIJ-000516-WA
 for tor-talk@lists.torproject.org; Fri, 02 Jan 2015 10:13:20 +0100
Message-ID: <54A6612D.5070402@tvdw.eu>
Date: Fri, 02 Jan 2015 10:13:17 +0100
From: Tom van der Woerdt <info@tvdw.eu>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
 rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <54A659FE.5010102@riseup.net>
In-Reply-To: <54A659FE.5010102@riseup.net>
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk] Hidden Service Hosting (Free experimental offer)
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Just wanted to point out that I think it's awesome Thomas is doing this! 
Buy him a beer if you see him.

Tom



Thomas White schreef op 02/01/15 om 09:42:
> Hey all,
>
> So following my other mail, I just want to offer people on this
> mailing list a chance to test something out before I go into the wider
> public with it.
>
> I have been reviewing some ways in which to offer "hosting" solutions
> for hidden services, and although there are ways to do like regular
> shared hosting environments by isolating users on an apache server for
> example, I feel a little experimental way to give people more freedom
> is to assign individual VPS's which are accessed via a separate .onion
> over SSH. For example, the HS address would be example1*.onion but to
> SSH into it, for security, would use a different address such as
> sshaddress*.onion. This ensures no user of the service would know the
> true IP of the server it is hosted on and allows for shared
> environments without putting others at risk.
>
> If anyone wants to test this out with me, I am offering the VPS for
> free for a few weeks/months so I can get the architecture right and
> fine tune the setup. All the traffic on the VPS is automatically
> routed through Tor so IP leaks won't be a huge problem, but of course
> you still maintain responsibility for the security of your machine and
> whatever you install on it. The use cases are unlimited but for
> obvious reasons it must be legal under British & Swedish law (feel
> free to ask beforehand but if it is legal I will defend it to the best
> of my ability).
>
> If you'd like to take up this offer and try it out please email me
> privately (my key is below). I ask that if you wish to request one,
> please mention anything specific like RAM/CPU/Hard disk requirements
> (no bandwidth limitations) so I can appropriately assign them. For now
> unfortunately only debian installs will be available and nothing
> except sshd will come preconfigured on the VPS so if you aren't
> familiar with the command line on debian you may not find this useful.
> Also any custom onion address you want please keep it to 7 characters
> or below for now as my GPU is really on it's last limb after
> generating over 1.4 million keys.
>
> I offer no guarantees on the availability of this, nor do I take
> responsibility for it, this is an entirely experimental project and I
> am hoping any participants take up this offer to perhaps
> mirror/reverse proxy their blogs, or of course bring any interesting
> ideas to the table. All feedback on it is welcome too :)
>
> Time to give these hidden services some lovin'
>
> Regards,
> T
>
>
> - --
> Activist, anarchist and a bit of a dreamer.
>
> PGP Keys: key.thecthulhu.com
> Current Fingerprint: E771 BE69 4696 F742 DB94 AA8C 5C2A 8C5A 0CCA 4983
> Key-ID: 0CCA4983
> Master Fingerprint: DDEF AB9B 1962 5D09 4264 2558 1F23 39B7 EF10 09F0
> Key-ID: EF1009F0
>
> Twitter: @CthulhuSec
> XMPP: thecthulhu at jabber.ccc.de
> XMPP-OTR: 4321B19F A9A3462C FE64BAC7 294C8A7E A53CC966

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

