] Hidden service security w. Apache/Win32
On 2012-02-19 19:58 CET, Ondrej Mikle wrote: Addendum for truly
uberparanoid installation: [various best practices] With the
uberparanoid installation, the greatest risk is a return-to-libc-style attack
on Tor where attacker instructs Tor to make
Is the time sync spoofing even applicable to hidden services?
How can the MS time server tampering with the exit nodes be applicable to
hidden services?
It has nothing to do directly with Apache or the hidden service.
For correct operation Tor needs the correct time and date. Windows will
On Feb 20, 2012, at 8:57 PM, Ondrej Mikle wrote:
On 02/20/2012 05:06 PM, Ralf-Philipp Weinmann wrote:
On 2012-02-19 19:58 CET, Ondrej Mikle wrote:
Addendum for truly uberparanoid installation:
[various best practices]
With the uberparanoid installation, the greatest risk is a
On 02/20/2012 05:06 PM, Ralf-Philipp Weinmann wrote:
On 2012-02-19 19:58 CET, Ondrej Mikle wrote:
Addendum for truly uberparanoid installation:
[various best practices]
With the uberparanoid installation, the greatest risk is a
return-to-libc-style
attack on Tor where attacker instructs
Hello Everybody
I am in the process of setting up a hidden service with Apache 2.2 under
Windows.
I run Apache (Win32) in a virtual machine and Tor in a separate virtual
machine under VMware Workstation.
VM 1 runs Apache and VM 2 runs Tor.
VM 1 is connected to VM 2 through an internal host
On Sun, 19 Feb 2012 12:50:47 -
Fred Toben red...@tormail.net wrote:
Hello Everybody
I am in the process of setting up a hidden service with Apache 2.2
under Windows.
I run Apache (Win32) in a virtual machine and Tor in a separate
virtual machine under VMware Workstation.
VM 1 runs
So far I haven't found any public info about the possible downsides of
running a hidden service under Windows.
Let's assume a fresh, clean windows installation. Have you found a list
and description of all outgoing network connections, that will be made by
that windows installation? I haven't
It would be very dangerous to use Windows in any way for running hidden
services! Run Linux and VirtualBox on your host machine. Ubuntu is
probably best if you're new to Linux. Have your host machine access the
Internet through a reputable multi-hop VPN service, and firewall it to
prevent
Is the time sync spoofing even applicable to hidden services?
How can the MS time server tampering with the exit nodes be applicable to
hidden services?
It has nothing to do directly with Apache or the hidden service.
For correct operation Tor needs the correct time and date. Windows will