Delivery-Date: Wed, 01 Oct 2014 13:02:53 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.9 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id A77B91E0C07;
	Wed,  1 Oct 2014 13:02:51 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 4BF5C2C288;
	Wed,  1 Oct 2014 17:02:48 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id D9E2821012
 for <tor-talk@lists.torproject.org>; Wed,  1 Oct 2014 17:02:44 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id jX3Lzig0LhVu for <tor-talk@lists.torproject.org>;
 Wed,  1 Oct 2014 17:02:44 +0000 (UTC)
Received: from latitanza.investici.org (latitanza.investici.org
 [82.94.249.234])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "smtp.autistici.org",
 Issuer "Autistici/Inventati Certification Authority" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id AE7A62B394
 for <tor-talk@lists.torproject.org>; Wed,  1 Oct 2014 17:02:44 +0000 (UTC)
Received: from [82.94.249.234] (latitanza [82.94.249.234]) (Authenticated
 sender: lblissett@paranoici.org) by localhost (Postfix) with ESMTPSA id
 54CBB120B6E
 for <tor-talk@lists.torproject.org>; Wed,  1 Oct 2014 17:02:40 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paranoici.org;
 s=stigmate; t=1412182961;
 bh=xZ3klPtJ+AYgvvFIjAsYtRcBIMXkR4pFIyqhO7tyohg=;
 h=Date:From:To:Subject:References:In-Reply-To;
 b=Tg1U/O5tYdQp4rMlfHemwF/RcdscdjrrIHYiC98nuV/J+pJbEd/SRqd+ueaw8mhxO
 zmBTzil0Rfd5cHArheUR++Edign6TzPweEQcz3T54QD0kOnPrm3R0bRWrvXfm6wMN8
 hZWipWFLey5ab514m4TtT2TvVTZSiMlGP1dMw7sE=
Date: Wed, 1 Oct 2014 14:02:35 -0300
From: "L. Blissett" <lblissett@paranoici.org>
To: tor-talk@lists.torproject.org
Message-ID: <20141001170235.GA21969@tagesuhu-pc.batista.in>
References: <542AE168.1010802@sde12.jazztel.es>
MIME-Version: 1.0
In-Reply-To: <542AE168.1010802@sde12.jazztel.es>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [tor-talk] Hidden Services - Access control.
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============8969604150626511628=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


--===============8969604150626511628==
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="pf9I7BMVVzbSWLtt"
Content-Disposition: inline


--pf9I7BMVVzbSWLtt
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Tue, Sep 30, 2014 at 06:59:20PM +0200, Llu=EDs wrote:
> I am trying to setup a hidden webserver, only for
> testing at the moment.
>=20
> After reading the hidden services howto here:
>=20
> https://www.torproject.org/docs/tor-hidden-service.html.en
>=20
> I didn't find anything about access control,
> is there anyway of doing this ?
> Can I hide the *.onion address to anyone, but me ?
> Where can I found more information ?

To anyone I would say no, but I think IFRAME + tor2web might do the
trick if you just wish to avoid having your users remembering the onion
address.

But this would be also a step back on the safeguards of the hidden
service model, since you would need to register the domain somewhere
outside tor network.


--pf9I7BMVVzbSWLtt
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=j0As
-----END PGP SIGNATURE-----

--pf9I7BMVVzbSWLtt--

--===============8969604150626511628==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============8969604150626511628==--

