Member
- Joined
- Oct 11, 2023
- Messages
- 105
- Thread Author
- #1
Firstly, even on the site of the TOP project itself, you can find instructions for creating a site in the onion zone. Here is the link
Step-by-step guidelines are everywhere on the web
At the moment, there are no hosting sites that provide a shared or a cluster with a link to .onion.
Let me explain why next.
You need to redeem your vps \ vds \ dedicated and then configure it.
Concise: why there are no shares, why you need your own VPS and how to set it up.
1. Shareds are not present, because it is assumed that 1 .onion domain will go to the network from 1 physical virtual machine. Of course, with the help of ngnix, you can configure the config and even screw ispmanager to create accounts with domains. But TOP is always scam, CPU, legal and other black sites. And any hosting is a reselling of physical equipment in the last instance. And as a fact - abuses, hold, deletion of the entire configuration (up to reseller accounts). Therefore, we are buying a separate VPS.
2. It's safety. An average virtual machine costs 256-300 rubles, it takes 5 minutes to set up transparent proxying from your domain via ngnix. The same site (physical domain, gtld for example, + .onion) on the same server, I would not.
3. Basic knowledge of linux, command line is required. If there are none, go to the trading sections, the work section. If there is no money - then go straight to coursea, learn cmd linux. Ninja-way so to speak.
If there is, go on. Any debian-like distribution is needed.
Code:
sudo apt-get install tor
We didn't tweak the .onion domain here, but this is already a topic for a separate conversation.
P.S. For information - TOR nodes listen to traffic, trojanjs hang on many sites (a trick that allows you to fire a person's real ip address), many scripts firing dns (obey, google), plus the rsa key has a bookmark. From all this, it appears that TOR is not such a panacea. Alternatively, use any .cn domain and server in China. Fortunately, virtual machines are already on sale there.
Here's another way we found:
Website development in the .onion domain zone is no different from the standard "website building" on the legal Internet.
Getting started, you need to know English, basic knowledge will be enough and of course HTML, HTML5, PHP.
We need a
1. We go through a small
We write Username together without spaces (AnonymusMan), the site will automatically generate a domain name.
2. Of After the registration in the FTP section called, you Up Need to the create a new password, in the upper cell of the The table <br> we a leave the old one's specified 'DURING registration
3. Upload your "template" of the site to the host via FTP
To create a site on your PC, you need, that is, your computer will be in the role of a server. Install the Web server and configure the server, in the hostname file you can find the address of your site: (it will look something like this)
That's all the first steps in the "Dark Web" have been made, you can get to work.
In this article, I tried to introduce you to the easiest way, there are more professional approaches when using Kali Linux and at the end, keep another manual from cryptopunks -
Garlic and onion hosting: how to raise a web resource so that the domain is not taken away
Disclaimer: The tools described here are completely legal. It's like a knife: someone cuts cabbage into a salad, someone uses it for attacks. Therefore, the post is devoted exclusively to tools that can be used for both good and bad purposes.
Global DNS is a wonderful thing that has survived decades. But he has a fundamental problem - your domain can simply be split if they suddenly decide that you have violated something. Or someone with money and connections will have a grudge against you. Everyone remembers the history of the same torrents.ru. If for some reason you want to remove such risks, you can look towards overlay networks, which simply do not have a regulator capable of dividing a domain name. Therefore, we will raise onion and i2p web resources.
Onion rings
Let's start with the classics. I think that on Habré, almost everyone used Tor in the form of the Tor-browser bundle. It helped me a lot when, in the process of hunting for Telegram, they suddenly began to abruptly break connectivity with the largest hosters in the most unexpected places. In this mode, Tor uses classic onion encryption, layer-by-layer wrapping data in such a way that it would be impossible to establish the source and destination of the packet. Nevertheless, the end point of the route is still the regular Internet, where we end up through the Exit nodes.
This solution has several problems:
Therefore, we will raise the onion resource directly within the network, without access to the regular Internet. For example, as an additional backup entry point to your resource. Let's assume that you already have a web server with some content served by nginx. For starters, if you do not want to shine on the public Internet, do not be too lazy to go to iptables and set up a firewall. You must be blocked from accessing your web server from anywhere except localhost. As a result, you got a site accessible locally at localhost:8080/. Additional fastening of https will be redundant here, since the tor transport will take over this task.
Expanding TOR
I will consider the installation using Ubuntu as an example, but there will be no fundamental differences with other distributions. First, let's define the repository. The official documentation does not recommend using packages that are maintained by the distribution itself, as they may contain critical vulnerabilities that have already been patched upstream by developers. Moreover, the developers recommend using the unattended-upgrades mechanism for automatic updates in order to ensure their timely delivery.
Create a file for an additional repository:
Code:
# nano /etc/apt/sources.list.d/tor.list
And add the necessary addresses to it:
Code:
deb
deb-src
Now we need to take care of the gpg key, without which the server will reasonably not trust new packages.
Code:
# curl
# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -
Now you can install the main package from upstream and the keychain to automatically update the signature.
Code:
# apt update
# apt install tor deb.torproject.org-keyring
Configuring proxying
In / etc / tor / torrc, you will find the daemon configuration file. After updating it, do not forget to restart it.
Just want to warn especially curious users. Do not enable relay mode on your home machine! Especially in exit node mode. They can knock. On a VPS, I would not configure the node as a relay either, since this will create a rather significant load on both the processor and traffic. On a wide channel, you can easily reach 2-3 terabytes per month.
Find a section in torrc that looks like this:
Code:
############### This section is just for location-hidden services ###
Here you need to register your localhost web resource. Like that:
Code:
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:8080
Or you can use unix sockets:
Code:
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
HiddenServicePort 80 unix:/path/to/socket
You do not have permission to view link
Log in or register now.
Step-by-step guidelines are everywhere on the web
At the moment, there are no hosting sites that provide a shared or a cluster with a link to .onion.
Let me explain why next.
You need to redeem your vps \ vds \ dedicated and then configure it.
Concise: why there are no shares, why you need your own VPS and how to set it up.
1. Shareds are not present, because it is assumed that 1 .onion domain will go to the network from 1 physical virtual machine. Of course, with the help of ngnix, you can configure the config and even screw ispmanager to create accounts with domains. But TOP is always scam, CPU, legal and other black sites. And any hosting is a reselling of physical equipment in the last instance. And as a fact - abuses, hold, deletion of the entire configuration (up to reseller accounts). Therefore, we are buying a separate VPS.
2. It's safety. An average virtual machine costs 256-300 rubles, it takes 5 minutes to set up transparent proxying from your domain via ngnix. The same site (physical domain, gtld for example, + .onion) on the same server, I would not.
3. Basic knowledge of linux, command line is required. If there are none, go to the trading sections, the work section. If there is no money - then go straight to coursea, learn cmd linux. Ninja-way so to speak.
If there is, go on. Any debian-like distribution is needed.
Code:
sudo apt-get install tor
We didn't tweak the .onion domain here, but this is already a topic for a separate conversation.
P.S. For information - TOR nodes listen to traffic, trojanjs hang on many sites (a trick that allows you to fire a person's real ip address), many scripts firing dns (obey, google), plus the rsa key has a bookmark. From all this, it appears that TOR is not such a panacea. Alternatively, use any .cn domain and server in China. Fortunately, virtual machines are already on sale there.
Here's another way we found:
Website development in the .onion domain zone is no different from the standard "website building" on the legal Internet.
Getting started, you need to know English, basic knowledge will be enough and of course HTML, HTML5, PHP.
We need a
You do not have permission to view link
Log in or register now.
browser, free hosting in my case. If you decide to create a really serious website or forum, you need to "buy" a domain and hosting.1. We go through a small
You do not have permission to view link
Log in or register now.
We write Username together without spaces (AnonymusMan), the site will automatically generate a domain name.
2. Of After the registration in the FTP section called, you Up Need to the create a new password, in the upper cell of the The table <br> we a leave the old one's specified 'DURING registration
3. Upload your "template" of the site to the host via FTP
To create a site on your PC, you need, that is, your computer will be in the role of a server. Install the Web server and configure the server, in the hostname file you can find the address of your site: (it will look something like this)
You do not have permission to view link
Log in or register now.
in the .onion network. Screenshot's can be viewed
You do not have permission to view link
Log in or register now.
.That's all the first steps in the "Dark Web" have been made, you can get to work.
In this article, I tried to introduce you to the easiest way, there are more professional approaches when using Kali Linux and at the end, keep another manual from cryptopunks -
You do not have permission to view link
Log in or register now.
Garlic and onion hosting: how to raise a web resource so that the domain is not taken away
Disclaimer: The tools described here are completely legal. It's like a knife: someone cuts cabbage into a salad, someone uses it for attacks. Therefore, the post is devoted exclusively to tools that can be used for both good and bad purposes.
Global DNS is a wonderful thing that has survived decades. But he has a fundamental problem - your domain can simply be split if they suddenly decide that you have violated something. Or someone with money and connections will have a grudge against you. Everyone remembers the history of the same torrents.ru. If for some reason you want to remove such risks, you can look towards overlay networks, which simply do not have a regulator capable of dividing a domain name. Therefore, we will raise onion and i2p web resources.
Onion rings
Let's start with the classics. I think that on Habré, almost everyone used Tor in the form of the Tor-browser bundle. It helped me a lot when, in the process of hunting for Telegram, they suddenly began to abruptly break connectivity with the largest hosters in the most unexpected places. In this mode, Tor uses classic onion encryption, layer-by-layer wrapping data in such a way that it would be impossible to establish the source and destination of the packet. Nevertheless, the end point of the route is still the regular Internet, where we end up through the Exit nodes.
This solution has several problems:
- Unfriendly people may come to the owner of the Exit node and begin to claim that the owner is an inveterate criminal, swearing bad words at the authorities. There is a nonzero risk that few people will listen to your explanations about the fact that you are only an exit node.
- Using the tor network as a proxy to ordinary resources anonymizes the client, but does not help in any way from dividing the domain and claims against the owner of the service.
- Preparing content and a regular web server
Therefore, we will raise the onion resource directly within the network, without access to the regular Internet. For example, as an additional backup entry point to your resource. Let's assume that you already have a web server with some content served by nginx. For starters, if you do not want to shine on the public Internet, do not be too lazy to go to iptables and set up a firewall. You must be blocked from accessing your web server from anywhere except localhost. As a result, you got a site accessible locally at localhost:8080/. Additional fastening of https will be redundant here, since the tor transport will take over this task.
Expanding TOR
I will consider the installation using Ubuntu as an example, but there will be no fundamental differences with other distributions. First, let's define the repository. The official documentation does not recommend using packages that are maintained by the distribution itself, as they may contain critical vulnerabilities that have already been patched upstream by developers. Moreover, the developers recommend using the unattended-upgrades mechanism for automatic updates in order to ensure their timely delivery.
Create a file for an additional repository:
Code:
# nano /etc/apt/sources.list.d/tor.list
And add the necessary addresses to it:
Code:
deb
You do not have permission to view link
Log in or register now.
bionic maindeb-src
You do not have permission to view link
Log in or register now.
bionic mainNow we need to take care of the gpg key, without which the server will reasonably not trust new packages.
Code:
# curl
You do not have permission to view link
Log in or register now.
A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | gpg --import# gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -
Now you can install the main package from upstream and the keychain to automatically update the signature.
Code:
# apt update
# apt install tor deb.torproject.org-keyring
Configuring proxying
In / etc / tor / torrc, you will find the daemon configuration file. After updating it, do not forget to restart it.
Just want to warn especially curious users. Do not enable relay mode on your home machine! Especially in exit node mode. They can knock. On a VPS, I would not configure the node as a relay either, since this will create a rather significant load on both the processor and traffic. On a wide channel, you can easily reach 2-3 terabytes per month.
Find a section in torrc that looks like this:
Code:
############### This section is just for location-hidden services ###
Here you need to register your localhost web resource. Like that:
Code:
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:8080
Or you can use unix sockets:
Code:
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
HiddenServicePort 80 unix:/path/to/socket