This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
darkweb_service [2018/09/15 14:24] vk3smb [SSH access to your server] |
darkweb_service [2018/09/15 14:32] (current) vk3smb [Keys on your Android Phone] |
||
---|---|---|---|
Line 122: | Line 122: | ||
{{ : | {{ : | ||
Checking the screenshot of Orbot above, you will notice under Tor-Enabled apps, a command line looking icon. This is ConnectBot SSH. It is available from Google play as well. In Orbot, you have to enable the VPN, then click the settings icon, then select ConnectBot. | Checking the screenshot of Orbot above, you will notice under Tor-Enabled apps, a command line looking icon. This is ConnectBot SSH. It is available from Google play as well. In Orbot, you have to enable the VPN, then click the settings icon, then select ConnectBot. | ||
- | More security…… | + | ===== More security…… |
As you can see in the previous chapter, we can “torify” a command to allow it access through the dark web. Since we can do it, so can a hacker… | As you can see in the previous chapter, we can “torify” a command to allow it access through the dark web. Since we can do it, so can a hacker… | ||
+ | |||
A hacker, if he gets hold of your onion address, can torify a port scanner and get it to scan the ports on your dark web server, finding an open port 22. On the clear web, a smart person would have fail-to-ban or similar installed to circumvent this after a couple of tries, and hopefully he gives up and annoys someone else, but in the dark web, everyone who attempts to connect to your dark web server looks the same to the server…. | A hacker, if he gets hold of your onion address, can torify a port scanner and get it to scan the ports on your dark web server, finding an open port 22. On the clear web, a smart person would have fail-to-ban or similar installed to circumvent this after a couple of tries, and hopefully he gives up and annoys someone else, but in the dark web, everyone who attempts to connect to your dark web server looks the same to the server…. | ||
+ | |||
So now, we delve into keys. They have to be installed on any client that tries to access your dark web server. | So now, we delve into keys. They have to be installed on any client that tries to access your dark web server. | ||
+ | |||
To set up authentication, | To set up authentication, | ||
- | HiddenServiceDir / | + | < |
HiddenServicePort 80 127.0.0.1: | HiddenServicePort 80 127.0.0.1: | ||
- | # | + | # |
So it becomes | So it becomes | ||
- | HiddenServiceDir / | + | < |
HiddenServicePort 80 127.0.0.1: | HiddenServicePort 80 127.0.0.1: | ||
HiddenServicePort 22 127.0.0.1: | HiddenServicePort 22 127.0.0.1: | ||
- | HiddenServiceAuthorizeClient stealth hidden_service | + | HiddenServiceAuthorizeClient stealth hidden_service</ |
Save it, and restart TOR. | Save it, and restart TOR. | ||
+ | |||
Now in your / | Now in your / | ||
- | qb7burbgiso43fzv.onion N# | + | |
+ | < | ||
It will show you the address, and the key required for you to access hidden_service, | It will show you the address, and the key required for you to access hidden_service, | ||
+ | |||
Write the key down (it is case sensitive), as you need it put that key onto any client you wish to give access to your dark web server. | Write the key down (it is case sensitive), as you need it put that key onto any client you wish to give access to your dark web server. | ||
+ | |||
As you have two different TOR versions on your client PC (one is installed on your PC and we use it with SSH, the other is bundled with the TOR-browser), | As you have two different TOR versions on your client PC (one is installed on your PC and we use it with SSH, the other is bundled with the TOR-browser), | ||
+ | |||
For SSH to work, on your PC, edit the torrc file: | For SSH to work, on your PC, edit the torrc file: | ||
- | # nano / | + | < |
Go right down to the bottom of the file and add the following: | Go right down to the bottom of the file and add the following: | ||
- | Rest of file… | + | < |
HidServAuth qb7burbgiso43fzv.onion | HidServAuth qb7burbgiso43fzv.onion | ||
+ | </ | ||
And restart TOR. | And restart TOR. | ||
+ | |||
For your browser, you have to dig up the torrc file that comes with it. It will be somewhere like ~/ | For your browser, you have to dig up the torrc file that comes with it. It will be somewhere like ~/ | ||
+ | |||
Add the same line to the end of the file and restart the browser. | Add the same line to the end of the file and restart the browser. | ||
+ | |||
There it is, a secure interface to control the VK3RWO repeater, which I can access anywhere. | There it is, a secure interface to control the VK3RWO repeater, which I can access anywhere. | ||
- | Keys on your Android Phone | + | ===== Keys on your Android Phone ===== |
Within Orbot, you need to click the 3 dots on the top right, click Hidden Services, then Client cookies. | Within Orbot, you need to click the 3 dots on the top right, click Hidden Services, then Client cookies. | ||
- | Upgrading to TOR V3 | + | |
+ | ===== Upgrading to TOR V3 ===== | ||
At the time of writing this, TOR V3 has been released stable. | At the time of writing this, TOR V3 has been released stable. | ||
- | Note: Upgrading to V3 does not (yet) allow 56 character names on Hidden Auth Services, they still have to be 16 characters long. | + | |
+ | //Note: Upgrading to V3 does not (yet) allow 56 character names on Hidden Auth Services, they still have to be 16 characters long.// | ||
If you wish to have the 56 character long onion, you need to either: | If you wish to have the 56 character long onion, you need to either: | ||
- | Centos/ | + | * Centos/ |
- | Debian/ | + | |
The following applies to Ubuntu Bionic Beaver (18.04LTS). | The following applies to Ubuntu Bionic Beaver (18.04LTS). | ||
+ | |||
In a shell, you need to install apt-transport-https and modify the sources: | In a shell, you need to install apt-transport-https and modify the sources: | ||
- | # sudo apt install apt-transport-https | + | < |
- | # sudo nano / | + | # sudo nano / |
Add the following to the bottom of the file and save it: | Add the following to the bottom of the file and save it: | ||
- | deb https:// | + | < |
- | deb-src https:// | + | deb-src https:// |
Then you need to add the gpg keys to sign the packages, update the repositories and install it, in the shell type: | Then you need to add the gpg keys to sign the packages, update the repositories and install it, in the shell type: | ||
- | # gpg2 --recv A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | + | < |
# gpg2 --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add - | # gpg2 --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add - | ||
# apt update | # apt update | ||
- | # apt install tor deb.torproject.org-keyring | + | # apt install tor deb.torproject.org-keyring</ |
Make sure its enabled and running: | Make sure its enabled and running: | ||
- | # systemctl enable tor | + | < |
- | # systemctl restart tor | + | # systemctl restart tor</ |
Now to convert your sites to V3 addresses, edit your / | Now to convert your sites to V3 addresses, edit your / | ||
- | HiddenServiceDir / | + | < |
HiddenServicePort 80 127.0.0.1: | HiddenServicePort 80 127.0.0.1: | ||
# | # | ||
- | HiddenServiceVersion 3 | + | HiddenServiceVersion 3</ |
Save the file and restart TOR. Your new address will be in hostname. | Save the file and restart TOR. Your new address will be in hostname. | ||
- | If you have HiddenServiceAuthorizeClient option on your site, when you restart TOR, it will fail as V3 does not yet support this. | + | |
- | Further investigation | + | If you have //HiddenServiceAuthorizeClient// option on your site, when you restart TOR, it will fail as V3 does not yet support this. |
+ | |||
+ | ===== Further investigation | ||
There is only one thing I can see needing further investigation: | There is only one thing I can see needing further investigation: | ||
- | Other Ham uses of the Dark Web. | + | * Other Ham uses of the Dark Web. |
- | Summary | + | ===== Summary |
This is about as good as you can get for security, anonymity and Access of equipment on the other side of public NAT’s and Firewalls. | This is about as good as you can get for security, anonymity and Access of equipment on the other side of public NAT’s and Firewalls. | ||
- | No IP address anybody can find. | + | * No IP address anybody can find. |
- | A web address that is not publicly accessible on the clear web. | + | |
- | A way around Public NAT’s on 4G connections | + | |
- | A way around Firewalls. | + | |
- | No open ports on your router. | + | |
- | An address that only you will know, if it is found by (a deliberate) accident, | + | |
- | You have authentication that only you have the key to | + | |
- | An address that you don't pay for | + | |
- | You’re able to change that address if something goes horribly wrong with the address your using. | + | |
- | Not paying for a VPN | + | |
- | You don't have any hassles if your IP address changes, TOR will repopulate | + | |
The downside, its slower than the clear web. | The downside, its slower than the clear web. | ||
- | A Parting thought | + | ===== A Parting thought |
As I mentioned earlier, “think pi-star”, I thought I’d leave these couple of photos as food for thought. | As I mentioned earlier, “think pi-star”, I thought I’d leave these couple of photos as food for thought. | ||
+ | {{ : | ||
Here is a Raspberry Pi 3b, an MMDVM board, and an Optus 4G modem with an “extra” data sim that is attached to my mobile plan. Optus will not give public IP addresses to personal plans,and as a result, this device is behind a Public NAT. | Here is a Raspberry Pi 3b, an MMDVM board, and an Optus 4G modem with an “extra” data sim that is attached to my mobile plan. Optus will not give public IP addresses to personal plans,and as a result, this device is behind a Public NAT. | ||
+ | |||
Note, there is NO cable plugged into the LAN port of the Pi. | Note, there is NO cable plugged into the LAN port of the Pi. | ||
+ | |||
This is the start of the MultiMode VK3RWO repeater… | This is the start of the MultiMode VK3RWO repeater… | ||
+ | |||
Getting the 4G modem to work on a command line Pi without user interaction is an article on its own…... | Getting the 4G modem to work on a command line Pi without user interaction is an article on its own…... | ||
- | Here is the proof in the pudding. | + | Here is the proof in the pudding. |
+ | What more do you want? | ||
+ | {{ : |