JustPaste.it

Chat history

 tor  code:
SocksPort 0
HiddenServiceSingleHopMode 1
HiddenServiceNonAnonymousMode 1
HiddenServiceDir /var/lib/tor/ssh_service
HiddenServicePort 22
HiddenServiceDir /var/lib/tor/http_service
HiddenServicePort 80

 

 

  1. SocksPort 0

    • This disables the local SOCKS proxy that Tor provides. Normally, applications can be configured to connect to this proxy in order to send their traffic through the Tor network. By setting it to 0, you're turning this feature off. It doesn't affect the operation of any hidden services or relays.
  2. HiddenServiceSingleHopMode 1

    • By default, a Tor hidden service (onion service) will route client connections through the Tor network, using a path that consists of several relays (usually three). This directive changes that behavior, making client connections to the hidden service go through just one relay. This can decrease latency, but at the potential cost of decreased anonymity.
  3. HiddenServiceNonAnonymousMode 1

    • This directive makes the hidden service non-anonymous to the Tor network, meaning the hidden service will connect to the Tor network in a way that reveals its IP address to the first relay (entry node) it connects to. This decreases the level of anonymity for the hidden service but can be used in setups where the location of the service isn't a secret.
  4. HiddenServiceDir /var/lib/tor/ssh_service

    • This sets up the directory where Tor will store information about a hidden service. In this case, it appears to be related to an SSH service. This directory will contain the private key and hostname (the .onion address) of the hidden service.
  5. HiddenServicePort 22

    • This tells Tor to advertise the hidden service on port 22 (typically used for SSH) and to redirect incoming connections to this hidden service to the local port 22. This would allow someone to connect to the SSH service on this machine over Tor using the .onion address.
  6. HiddenServiceDir /var/lib/tor/http_service

    • This sets up another directory for another hidden service, this time related to an HTTP service.
  7. HiddenServicePort 80

    • Similarly, this tells Tor to advertise the second hidden service on port 80 (typically used for HTTP) and redirect incoming connections to the local port 80. This would allow someone to access a web server on this machine over Tor using the .onion address.

In summary, the configuration sets up Tor to run two hidden services: one for SSH and one for HTTP. Both of these hidden services have reduced their standard levels of anonymity by making use of the HiddenServiceSingleHopMode and HiddenServiceNonAnonymousMode directives.