Re: Tor-ramdisk 20100115 is out.
--- On Fri, 1/15/10, basile bas...@opensource.dyc.edu wrote: From: basile bas...@opensource.dyc.edu To run a hidden service, you first need to run a service, like a web page. To run a web page you need to have some web pages and an apache server. You would further need php and mysql if you want a blog or wiki. On top of that you run tor. See http://www.torproject.org/docs/tor-hidden-service.html.en Well, there is tiny and light web server http://monkey-project.com/ and there is non-php, non-mysql blogging software such as http://sourceforge.net/projects/bashblogger/ that uses only bash plus standard utils. I suppose it wouldn't be hard for the tor-ramdisk folk to add progs like those, think Damnsmalllinux (which ships with monkey server). What I don't know about however are what security risks introducing monkey server would bring and how those should be handled. Clearly there would have to be a persistent directory containing the files to be served. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Tor-ramdisk 20100115 is out.
Hi everyone I want to announce to the list that a new rlease of tor-ramdisk is out. Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Security is enhenced by hardening the kernel and binaries, and privacy is enhanced by forcing logging to be off at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key, which may be exported/imported by FTP. Changelog: Tor was updated to 0.2.1.21. The setup scripts now include the option of setting your own DNS server when acquiring networking information by DHCP to avoid ISPs that use DNS... blocking. These changes have been implemented in the i686, MIPS, and the new x86_64 port. These have been tested in the wild. i686: Homepage: http://opensource.dyc.edu/tor-ramdisk Download: http://opensource.dyc.edu/tor-ramdisk-downloads x86_64: Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads MIPS: Homepage: http://opensource.dyc.edu/tor-mips-ramdisk Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads -- Anthony G. Basile, Ph.D. Chair of Information Technology D'Youville College Buffalo, NY 14201 USA (716) 829-8197 signature.asc Description: OpenPGP digital signature
Re: Tor-ramdisk 20100115 is out.
On 01/15/2010 10:13 AM, arshad wrote: is this a project supported/acknowledged by torproject? Yes, it's acknowledged. It's a great way for people with dedicated hardware to run a Tor relay. -- Andrew Lewman The Tor Project pgp 0x31B0974B Website: https://torproject.org/ Blog: https://blog.torproject.org/ Identi.ca: torproject *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor-ramdisk 20100115 is out.
On 01/15/2010 12:50 PM, basile wrote: But all the ramdisk image has in it is a kernel, 3 binaries (tor, ntpd and busybox) and one ash script. You can't run the service there. I guess you could run it on another machine behind tor-ramdisk. You could map the hidden service to another server, but you might as well run the tor client and a hidden service on that other machine itself. The hidden service also wants to write a private key and hostname somewhere. If you write this to a ram disk, it also goes away when the system is rebooted. -- Andrew Lewman The Tor Project pgp 0x31B0974B Website: https://torproject.org/ Blog: https://blog.torproject.org/ Identi.ca: torproject *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/