Delivery-Date: Fri, 02 Jan 2015 20:43:52 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,
	URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 307E61E0AE5
	for <archiver@seul.org>; Fri,  2 Jan 2015 20:43:51 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id D365C329B6;
	Sat,  3 Jan 2015 01:43:45 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id C5507329B2
 for <tor-talk@lists.torproject.org>; Sat,  3 Jan 2015 01:43:41 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Jv0D04cG0hqq for <tor-talk@lists.torproject.org>;
 Sat,  3 Jan 2015 01:43:41 +0000 (UTC)
Received: from mail-ig0-x22b.google.com (mail-ig0-x22b.google.com
 [IPv6:2607:f8b0:4001:c05::22b])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 8CF0E329B1
 for <tor-talk@lists.torproject.org>; Sat,  3 Jan 2015 01:43:41 +0000 (UTC)
Received: by mail-ig0-f171.google.com with SMTP id z20so306270igj.16
 for <tor-talk@lists.torproject.org>; Fri, 02 Jan 2015 17:43:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:from:date:message-id:subject:to
 :content-type; bh=gVb/KfDhms0SdLFWeXnvxSOEp2uKqx+wb3zmMPFn27c=;
 b=rB44eNYR4pFy0rmpKWhz7mD3TdskGCW6gEcSHGzGyQsPPYVAn8mV1ruXdfsbSuY07k
 yRpmZuBhuEx6wBguvc0rcwe1mP+1CklM/SEDUWk34A46+tYZ5f3ZZYJvTuCcZSxTY3Qw
 N1AsIB07xuUA5KYHMSBb0yorD8pLnmfWAMgxb3ScOMTYs7oBQpaD786gcR6FM+/2Kifb
 ZadDBg886ZDULHpU5B2bZQ6zJXPx1xaSniHePKbNJZtX9gJIv/AHVXfA8pIMPQl+5tv/
 ibvLWABcQ/W2/pbA6TEl6Wo9ypaU62ylGXz0FsyjStcuJUl8O6/hy3cY6Z8BnGF1zI8p
 sP8g==
X-Received: by 10.107.164.75 with SMTP id n72mr71172248ioe.17.1420249419327;
 Fri, 02 Jan 2015 17:43:39 -0800 (PST)
MIME-Version: 1.0
Received: by 10.107.13.206 with HTTP; Fri, 2 Jan 2015 17:43:24 -0800 (PST)
In-Reply-To: <54A719CC.8080905@cni.net>
References: <54A719CC.8080905@cni.net>
From: "Xiaolan.Me" <xiaolan65535@gmail.com>
Date: Sat, 3 Jan 2015 09:43:24 +0800
Message-ID: <CAJaLD9Ko___=_EGaq=qSm95_v_N8XLEAi+oRF2Vcq1C025Eqow@mail.gmail.com>
To: tor-talk@lists.torproject.org
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk] Hidden Service Hosting (Free experimental, offer)
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

I am using another way to solve IP leaks problem.
my host-os is CentOS and only installed VirtualBox
I have 2 virtual machines running on the host-os
the first one is a CentOS with 2 network adapter, one is NAT , another is
Internal(ip: 192.168.222.1).
it running Tor and ShadowSocks(bypass GFW) , Tor through ShadowSocks and
listen on 192.168.222.1:9050 (Internal Adapter)


Another is also CentOS and running apache, only one network
adapter(Internal ip:192.168.222.2)
when this virutal machine wants to access internet , must set socks5 proxy
to 192.168.222.1:9050
so even this VM gets hacked, the attacker still can't know the real IP....

2015-01-03 6:21 GMT+08:00 Larry Brandt <lbrandt@cni.net>:

> I'm interested but a slow mover.  Work sometimes gets in my way.  I am
> putting together pages for a hidden site but I don't think I can be ready
> to put it on line til month's end.  It will be a legal site everywhere.
> This is a wonderful offer Thomas.  Hope someone takes you up on it.
> Larry Brandt
>
>
> Just wanted to point out that I think it's awesome Thomas is doing this!
> Buy him a beer if you see him.
>
> Tom
>
>
>
> Thomas White schreef op 02/01/15 om 09:42:
>
>  Hey all,
>>
>> So following my other mail, I just want to offer people on this
>> mailing list a chance to test something out before I go into the wider
>> public with it.
>>
>> I have been reviewing some ways in which to offer "hosting" solutions
>> for hidden services, and although there are ways to do like regular
>> shared hosting environments by isolating users on an apache server for
>> example, I feel a little experimental way to give people more freedom
>> is to assign individual VPS's which are accessed via a separate .onion
>> over SSH. For example, the HS address would be example1*.onion but to
>> SSH into it, for security, would use a different address such as
>> sshaddress*.onion. This ensures no user of the service would know the
>> true IP of the server it is hosted on and allows for shared
>> environments without putting others at risk.
>>
>> If anyone wants to test this out with me, I am offering the VPS for
>> free for a few weeks/months so I can get the architecture right and
>> fine tune the setup. All the traffic on the VPS is automatically
>> routed through Tor so IP leaks won't be a huge problem, but of course
>> you still maintain responsibility for the security of your machine and
>> whatever you install on it. The use cases are unlimited but for
>> obvious reasons it must be legal under British & Swedish law (feel
>> free to ask beforehand but if it is legal I will defend it to the best
>> of my ability).
>>
>> If you'd like to take up this offer and try it out please email me
>> privately (my key is below). I ask that if you wish to request one,
>> please mention anything specific like RAM/CPU/Hard disk requirements
>> (no bandwidth limitations) so I can appropriately assign them. For now
>> unfortunately only debian installs will be available and nothing
>> except sshd will come preconfigured on the VPS so if you aren't
>> familiar with the command line on debian you may not find this useful.
>> Also any custom onion address you want please keep it to 7 characters
>> or below for now as my GPU is really on it's last limb after
>> generating over 1.4 million keys.
>>
>> I offer no guarantees on the availability of this, nor do I take
>> responsibility for it, this is an entirely experimental project and I
>> am hoping any participants take up this offer to perhaps
>> mirror/reverse proxy their blogs, or of course bring any interesting
>> ideas to the table. All feedback on it is welcome too
>>
>> Time to give these hidden services some lovin'
>>
>> Regards,
>> T
>>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

