[prev in list] [next in list] [prev in thread] [next in thread] 

List:       tor-talk
Subject:    Re: [tor-talk] Hidden Services - Access control.
From:       coderman <coderman () gmail ! com>
Date:       2014-09-30 22:22:47
Message-ID: CAJVRA1TEdxtUiLLQYbMPXKvj2fcT4H7UqYqtMGDr-qd_t8Xp_w () mail ! gmail ! com
[Download RAW message or body]

On 9/30/14, LluĂ­s <msl12@sde12.jazztel.es> wrote:
> ...
> I didn't find anything about access control,
> is there anyway of doing this ?
> Can I hide the *.onion address to anyone, but me ?

you cannot hide the existence of the *.onion, as these are "location
hidden" not "existence hidden".

you can use various methods to restrict access, my favorite being PKI
with client certificates - if you are not an authorized client your
socket is disconnected before reaching application service layers.

simple HTTP auth leaks too much for my taste.  and of course,
variations of single packet authentication to access...

best regards,
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic