tor
tor notes
- Known 0days not disclosed in court as defense. Cope with parallel construction.
- socks5 on 9050 by default
- browser bundle runs 9051 by default
http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/ is opsec bible
brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion is brave
https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd/ is protonmail
https://dns4torpnlfs2ifuz2s2yf3fc7rdmsbhm6rw75euj35pac6ap25zgqad.onion/ is cloudflare 1.1.1.1
MapAddress palladium.libera.chat libera75jm6of4wxpxt4aynol3xjmbtxgfyjpu34ss4d7r7q2v5zrpyd.onion is liberia.chat
phobosxilamwcg75xt22id7aywkzol6q6rfl2flipcqoc4e4ahima5id.onion is phobos
xmh57jrknzkhv6y3ls3ubitzfqnkrwxhopf5aygthi7d6rplyvk3noyd.onion is torch
monerotoruzizulg5ttgat2emf4d6fbmiea25detrmmy7erypseyteyd.onion is getmonero (unstoppableswap.net for btc->xmr)
p2pmin25k4ei5bp3l6bpyoap6ogevrc35c3hcfue7zfetjpbhhshxdqd.onion is p2pool
https://incoghostm2dytlqdiaj3lmtn7x2l5gb76jhabb6ywbqhjfzcoqq6aad.onion/ is incognet
- buyvm{crypto only anon}, vsys.host, hostslick
http://kiwifarmsaaf4t2h7gc3dfc5ojhmqruw2nit3uejrpiagrxeuxiyxcyd.onion/ is kiwifarms
- t.me/s/kiwifarms for telegram updates
uzfomcxbx24d3esy7akpdbiovcfoorupz4aez6fpabmyh45nnqdp7mqd.onion is /fdroid/repo
https://4zwzi66wwdaalbhgnix55ea3ab4pvvw66ll2ow53kjub6se4q2bclcyd.onion is guix sub mirror
archiveiya74codqgiixo33q62qlrqtkgmcitqx5u2oeqnmn5bpcbiyd.onion is archive.is
dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/ is dread
https://5gdvpfoh6kb2iqbizb37lzk2ddzrwa47m6rpdueg2m656fovmbhoptqd.onion/ is riseup
http://zlibrary24tuxziyiyfr7zd46ytefdqbqd2axkmxm4o5374ptpc52fad.onion/ is zlib
https://bookszlibb74ugqojhzhg2a63w5i2atv5bqarulgczawnbmsb6s6qead.onion/ - zlib books
https://www.reddittorjg6rue252oqsxryoxengawnmo46qy4kyii5wtqnwfj4ooad.onion/ is reddit
btdigggink2pdqzqrik3blmqemsbntpzwxottujilcdjfz56jumzfsyd.onion/ is btdigg
m2ylflyeak6i6o4hsfwcrfwcq2bbjxk6nf2rnmm7fu6qiuu3hybenzid.onion is jabber.ccc.de
- digicert offers ev wildcard certs for .onion and harica.gr offers .onion
- https://acmeforonions.org/ for certbot certs
certbot certonly --server https://acme.api.acmeforonions.org/directory --standalone --http-01-port 8080 --http-01-address 127.0.0.1 -d mysite.onion
- https://acmeforonions.org/ for certbot certs
- ensure multi point check or pinned HTTPS verified to avoid bgp att
- https://spoofer.caida.org/summary.php percentage of spoofable ips that do not have source address validation (SAV)
- tcp 9001 for relay default without bridge
- set
DNSPort 127.0.10.1:53and set pihole uservice directory of client/service - tcp with outbound nat punching
- Traffic analysis vulnerabilities excluding routing/ddos fingerprinting
- snowflake (webrtc)
- hardcoded STUN servers list with fast local DNS requests for multiple instead of 1
- hardcoded request to sstatic cdn for domain fronting after STUN
- client unvalidated TLS handshake to node
- server TLS cert is self signed
- hardcodes fields in specific order, unusual lack of additional data fields
- issuer CN is always www. (8-20 chars) .com with no country, state, org or issuer
- subject CN is always www. (8-20 chars) .net (non overlaping with issuer) with no fields
- obsf4
- well known protocols are not imitated throughly ie the first data packet on port 443 needs a TLS/SSL header to be HTTPS
- obsf4proxy sets TCP push flag on last packet (uncommon)
- initialization data is half duplex and only flows one way at a time
- first data packet is client to server packet is 141 - 8192 bytes and the next server to client packet is 21 - 8192 bytes
- all data is 21 - 8192 bytes, checking 6+ data packets for size range increases fingerprint
- identified connections can reveal others based on the half second timing window for parallel connections
- Inter Arrival Timing flags
- 0 sends largest first with last having psh flag due to network segmentation
- 1 sets the max payload to 1448 bytes (with psh flag)
- 2 uncommon uses random sizes and the psh flag doesn't always change direction of data flow
- Browser bundle
- automatic bridge connections on startup
- known bridge request changing traceability
- private bridges allow unique tracking and proof as bridges persist to disk
- snowflake (webrtc)
- vanity address generator for v3
- v3 addresses use ed25519 keys
Link .torrc
(ignore-errors
(let* ((tor-confdir (concat (file-name-as-directory (xdg-config-home) "tor"))
(tor-conf (concat (file-name-as-directory tor-confdir) ".torrc")))
(if (not (file-exists-p tor-confdir))
(progn (make-directory tor-confdir)
(set-file-modes tor-confdir #o700)))
(if (not (or (file-exists-p tor-conf) (file-symlink-p tor-conf)))
(make-symbolic-link (concat (file-name-directory (or load-file-name buffer-file-name)) ".torrc") tor-conf 1))))
Data Directory
(concat (file-name-as-directory (xdg-config-home)) "tor")
Control Socket
(concat (file-name-as-directory (concat (file-name-as-directory (xdg-config-home)) "tor")) "torSocket")
.torrc
StrictNodes 1
AvoidDiskWrites 1
Sandbox 1
#UseBridges 1
# does not work with bridges
EntryNodes {us}
#ExcludeExitNodes {il},{gb},{ca},{nz},{au},{us},{fr},{??}
#ExcludeNodes BadExit,Unnamed,default,{il},{gb},{ca},{nz},{au}
#ExitNodes {us}
# obfs4proxy configuration
#ClientTransportPlugin obfs4 exec /usr/share/tor/PluggableTransports/lyrebird
DataDirectory /home/jam/.config/tor
ControlSocket /home/jam/.config/tor/torSocket
CookieAuthentication 1
#HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
#HiddenServicePort 80 unix:/path/to/socket
VanguardsLiteEnabled 1
HiddenServiceEnableIntroDoSDefense 1
#HiddenServiceEnableIntroDoSBurstPerSec 200
#HiddenServiceEnableIntroDoSRatePerSec 25
#HiddenServicePoWDefensesEnabled 1
#HiddenServiceNumIntroductionPoints 20
#HiddenServiceMaxStreams 65535
#HiddenServiceMaxStreamsCloseCircuit 1
#HiddenServiceOnionBalanceInstance 1
#HiddenServiceExportCircuitID haproxy
#HiddenServiceNonAnonymousMode 1
#HiddenServiceSingleHopMode 1
#AllowSingleHopCircuits 1 # set self as own Rendezvous point