Delivery-Date: Fri, 26 Jun 2015 16:28:21 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 4E2F41E012F;
	Fri, 26 Jun 2015 16:28:19 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 980D536582;
	Fri, 26 Jun 2015 20:28:14 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 9BC09365C3
 for <tor-talk@lists.torproject.org>; Fri, 26 Jun 2015 20:28:10 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id fUe5CBrSXCLv for <tor-talk@lists.torproject.org>;
 Fri, 26 Jun 2015 20:28:10 +0000 (UTC)
Received: from khazad-dum.seul.org (khazad-dum.csail.mit.edu [128.31.0.47])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "moria.seul.org", Issuer "moria.seul.org" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 81C17365BF
 for <tor-talk@lists.torproject.org>; Fri, 26 Jun 2015 20:28:10 +0000 (UTC)
Received: by khazad-dum.seul.org (Postfix, from userid 501)
 id EE8A81E0BD0; Fri, 26 Jun 2015 16:28:07 -0400 (EDT)
Date: Fri, 26 Jun 2015 16:28:07 -0400
From: Roger Dingledine <arma@mit.edu>
To: tor-talk@lists.torproject.org
Message-ID: <20150626202807.GK7957@moria.seul.org>
References: <CAJwFvsUhDbo60X9MrXRe-iKpbU4zz-8Q7W9er-+G2yk_DDS+fA@mail.gmail.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <CAJwFvsUhDbo60X9MrXRe-iKpbU4zz-8Q7W9er-+G2yk_DDS+fA@mail.gmail.com>
User-Agent: Mutt/1.5.20 (2009-12-10)
Subject: Re: [tor-talk] Clear net and Tor site on the same server
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Fri, Jun 26, 2015 at 04:17:37PM -0400, Tyler Hardin wrote:
> Why is it suggested not to do this? Does it matter as long as I'm not at
> all concerned about privacy? I want to run a wallet-less bitcoin node and
> thought I might as well make it accessible via Tor, however it definitely
> isn't worth paying for an extra server to serve as a dedicated proxy.

Right, I think it is fine to run a normal website on the Internet and also
make it available as an onion site by running Tor on the same computer.

It all comes down to what security goals you have in mind. If one of
your goals is to protect the location of the website so people visiting
it cannot learn where it is, then you have many more things you ought
to think about.

But for your situation, it sounds fine. For background you might enjoy:
https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs
https://lists.torproject.org/pipermail/tor-talk/2015-May/thread.html#37820

> BTW, what kind of memory usage can I get by with to run a Tor server? How
> about a Tor node?

These phrases "Tor server" and "Tor node" are ambiguous. You might enjoy

https://www.torproject.org/docs/faq#ConfigureRelayOrBridge
https://www.torproject.org/docs/faq#ExitPolicies
https://www.torproject.org/docs/hidden-services

Running a Tor relay can use quite a bit of memory depending on how much
traffic it's handling. Running a Tor bridge generally means you're
handling much less traffic, and so the memory footprint is much lower.
And running an onion service (aka hidden service) is usually very low
memory footprint too, but it depends how popular the service is.

Hope that helps,
--Roger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

