public inbox for gentoo-user@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-user] Is running Tor hidden services on VPS a good idea?
@ 2018-04-24 19:10 Hubert Hauser
  2018-04-24 20:44 ` R0b0t1
  0 siblings, 1 reply; 3+ messages in thread
From: Hubert Hauser @ 2018-04-24 19:10 UTC (permalink / raw
  To: gentoo-user

I want to run a few Tor hidden services. My home network is behind a
carrier gateway NAT so I can't make server from Raspberry Pi. I consider
run Tor hidden services on VPS. What do you think about it? Is cgNAT
obstacle if I want to run Tor hidden services?



^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [gentoo-user] Is running Tor hidden services on VPS a good idea?
  2018-04-24 19:10 [gentoo-user] Is running Tor hidden services on VPS a good idea? Hubert Hauser
@ 2018-04-24 20:44 ` R0b0t1
  2018-04-25 18:17   ` Hubert Hauser
  0 siblings, 1 reply; 3+ messages in thread
From: R0b0t1 @ 2018-04-24 20:44 UTC (permalink / raw
  To: gentoo-user

On Tue, Apr 24, 2018 at 2:10 PM, Hubert Hauser <hubot@mail.com> wrote:
> I want to run a few Tor hidden services. My home network is behind a
> carrier gateway NAT so I can't make server from Raspberry Pi. I consider
> run Tor hidden services on VPS. What do you think about it? Is cgNAT
> obstacle if I want to run Tor hidden services?
>

A hidden service listens to connections from a Tor daemon. The
recommended setup has both on the same machine, so the web service is
only accepting connections from the machine it is run on. It does not
need to be outwardly accessible.

Tor will work even if you are behind NAT, assuming you do not run it
in a mode where it accepts Tor to Tor connections or Internet to Tor
connections.


Running a hidden service on a VPS, assuming you are not breaking the
laws in your jurisdiction, is likely the better idea. It will have
higher bandwidth and if an attacker succeeds in resolving its location
(which is possible to do and rather easy) they will get a datacenter,
not your neighborhood.

If you are breaking laws in your jurisdiction of residence I would
highly recommend moving. Whether or not it is a better idea to
self-host in this case is a tossup. On one hand, if you self-host and
the authorities resolve your hidden service's location, they get you,
but you may have a chance to destroy evidence. On the other hand, if
you VPS-host and the authorities resolve your hidden service's
location, they may subpoena the datacenter and get your details and
also the information on the server.

Cheers,
     R0b0t1


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [gentoo-user] Is running Tor hidden services on VPS a good idea?
  2018-04-24 20:44 ` R0b0t1
@ 2018-04-25 18:17   ` Hubert Hauser
  0 siblings, 0 replies; 3+ messages in thread
From: Hubert Hauser @ 2018-04-25 18:17 UTC (permalink / raw
  To: gentoo-user

[-- Attachment #1: Type: text/plain, Size: 1987 bytes --]

I live in Poland. Tor hidden services will be located in FORPSI / Aruba
Cloud VPS provider in Czech Republic data center. Is this provider good
for hosting Tor hidden services? My threat model is school. If I would
expect subponea, it's will probably about defamation or offense of
religious feelings. I do not know much about the law.


On 24/04/18 22:44, R0b0t1 wrote:
> On Tue, Apr 24, 2018 at 2:10 PM, Hubert Hauser <hubot@mail.com> wrote:
>> I want to run a few Tor hidden services. My home network is behind a
>> carrier gateway NAT so I can't make server from Raspberry Pi. I consider
>> run Tor hidden services on VPS. What do you think about it? Is cgNAT
>> obstacle if I want to run Tor hidden services?
>>
> A hidden service listens to connections from a Tor daemon. The
> recommended setup has both on the same machine, so the web service is
> only accepting connections from the machine it is run on. It does not
> need to be outwardly accessible.
>
> Tor will work even if you are behind NAT, assuming you do not run it
> in a mode where it accepts Tor to Tor connections or Internet to Tor
> connections.
>
>
> Running a hidden service on a VPS, assuming you are not breaking the
> laws in your jurisdiction, is likely the better idea. It will have
> higher bandwidth and if an attacker succeeds in resolving its location
> (which is possible to do and rather easy) they will get a datacenter,
> not your neighborhood.
>
> If you are breaking laws in your jurisdiction of residence I would
> highly recommend moving. Whether or not it is a better idea to
> self-host in this case is a tossup. On one hand, if you self-host and
> the authorities resolve your hidden service's location, they get you,
> but you may have a chance to destroy evidence. On the other hand, if
> you VPS-host and the authorities resolve your hidden service's
> location, they may subpoena the datacenter and get your details and
> also the information on the server.
>
> Cheers,
>      R0b0t1
>


[-- Attachment #2: Type: text/html, Size: 3086 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2018-04-25 18:23 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-04-24 19:10 [gentoo-user] Is running Tor hidden services on VPS a good idea? Hubert Hauser
2018-04-24 20:44 ` R0b0t1
2018-04-25 18:17   ` Hubert Hauser

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox