Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
How to create your website on the Darknet (.onion)
Message
<blockquote data-quote="Ghosthunter" data-source="post: 593" data-attributes="member: 6"><p><strong>We get the address</strong></p><p>That's it, now we restart the tor daemon via systemctl and look at HiddenServiceDir. There will be several files - a private key and your "onion" hostname. It is a random 16 character identifier. For example, gjobqjj7wyczbqie.onion is the address of the Candle search resource. The address is completely random, but with a sufficiently long search, you can generate a human-readable pair from the address and the private key. Of course, not all 16 characters - it would take billions of years. For example, the well-known catalog of Flibusta's books has a mirror flibustahezeous3.onion, and Facebook spent a lot of resources to choose the most euphonious from the generated options: facebookcorewwwi.onion.</p><p></p><p>That's it, after some time your resource will be announced and will become globally available. Please note that you can proxy not only the http protocol, but also any other.</p><p></p><p><strong>Garlic</strong></p><p>The second option was conceived as even more paranoid in nature. The i2p project was not originally conceived as a means of proxying traffic to the regular Internet and, in terms of architecture, is a completely closed overlay network. Separate gates in both directions exist, but this is rather an exception. Moreover, it is potentially unsafe.</p><p></p><p>I2p has several options for implementing software router nodes. The official implementation is written in Java. And it just monstrously devours all available resources, both in terms of RAM and CPU. Nevertheless, it is she who is considered the reference and is regularly audited. I would recommend that you use the much lighter version, i2pd, written in C ++. It has its own nuances that may cause some i2p applications to fail, but overall it's a great alternative implementation. The project is actively being sawed at the present time.</p><p></p><p><strong>Install the demon</strong></p><p>The best part is that the authors have provided many deployment options, including docker and snap. You can go the way of the classic repository.</p><p>Code:</p><p>sudo add-apt-repository ppa<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite7" alt=":p" title="Stick out tongue :p" loading="lazy" data-shortname=":p" />urplei2p/i2pd</p><p>sudo apt-get update</p><p>sudo apt-get install i2pd</p><p></p><p>But I would advise using snap. It will not only quickly and conveniently deploy the daemon, but also provide automatic updates directly from the upstream, depending on the selected distribution channel.</p><p>Code:</p><p>no_face@i2pd:~$ snap info i2pd</p><p>name: i2pd</p><p>summary: Distributed anonymous networking framework</p><p>publisher: Darknet Villain (supervillain)</p><p>store-url: <a href="https://snapcraft.io/i2pd" target="_blank">https://snapcraft.io/i2pd</a></p><p>license: BSD-3-Clause</p><p>description: |</p><p>i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client.</p><p>I2P (Invisible Internet Protocol) is a universal anonymous network layer.</p><p>All communications over I2P are anonymous and end-to-end encrypted,</p><p>participants don't reveal their real IP addresses.</p><p>snap-id: clap1qoxuw4OdjJHVqEeHEqBBgIvwOTv</p><p>channels:</p><p>latest/stable: 2.32.1 2020-06-02 (62) 16MB -</p><p>latest/candidate: ↑</p><p>latest/beta: ↑</p><p>latest/edge: 2.32.1 2020-06-02 (62) 16MB -</p><p></p><p>Install snap if you haven't already and set the default stable option:</p><p>Code:</p><p>apt install snapd</p><p>snap install i2pd</p><p></p><p><strong>Configuring</strong></p><p>Unlike the web-gui Java version, i2pd does not have so many settings, twists, and tabs. Only the most necessary things up to asceticism. However, the easiest way is to configure it directly in the config file.</p><p></p><p>In order for your web resource to become available in i2p, it must be proxied similarly to the onion option. To do this, go to ~ / .i2pd / tunnels.conf and add your backend.</p><p>Code:</p><p>[anon-website]</p><p>type = http</p><p>host = 127.0.0.1</p><p>port = 8080</p><p>keys = anon-website.dat</p><p></p><p>After restarting the daemon, you will get a random 32-bit address. It can be viewed in the web console, which is available by default at 127.0.0.1:7070 /?Page=i2p_tunnels. Do not forget to allow access to it from your IP address, if necessary. By default, it is only available on the local interface. There will be something scary like: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</p><p></p><p>The i2p network has a semblance of DNS, but it is more like a scattered list of / etc / hosts. You subscribe to specific sources in the console that tell you how to get to the conditional flibusta.i2p. Therefore, it makes sense to add a more or less beautiful name to large resources like inr.i2p.</p><p></p><p><strong>Can i2p and onion be deployed?</strong></p><p>You can use any bulletproof hosting. In the event of a motivated complaint against our client, hoster can terminate the contract and extinguish the virtual machine. Most hosters will do the same. However, due to the peculiarities of the tor architecture, and especially i2p, it is very difficult, and often simply impossible, to determine exactly where the website is hosted.</p><p></p><p>Nevertheless, there is nothing illegal in the very use of such tools. Therefore, we will not mind if you open a mirror of your legal web resource in overlay networks. In any case, I strongly recommend again not to blindly experiment with tor on your home machine. Either the IP can get blacklisted, or the pative will arrive. Better to rent a VPS, it is inexpensive.</p><p></p><p>You can find a list of bulletproof hosters in this thread, prices are very cheap, everyone can afford</p></blockquote><p></p>
[QUOTE="Ghosthunter, post: 593, member: 6"] [B]We get the address[/B] That's it, now we restart the tor daemon via systemctl and look at HiddenServiceDir. There will be several files - a private key and your "onion" hostname. It is a random 16 character identifier. For example, gjobqjj7wyczbqie.onion is the address of the Candle search resource. The address is completely random, but with a sufficiently long search, you can generate a human-readable pair from the address and the private key. Of course, not all 16 characters - it would take billions of years. For example, the well-known catalog of Flibusta's books has a mirror flibustahezeous3.onion, and Facebook spent a lot of resources to choose the most euphonious from the generated options: facebookcorewwwi.onion. That's it, after some time your resource will be announced and will become globally available. Please note that you can proxy not only the http protocol, but also any other. [B]Garlic[/B] The second option was conceived as even more paranoid in nature. The i2p project was not originally conceived as a means of proxying traffic to the regular Internet and, in terms of architecture, is a completely closed overlay network. Separate gates in both directions exist, but this is rather an exception. Moreover, it is potentially unsafe. I2p has several options for implementing software router nodes. The official implementation is written in Java. And it just monstrously devours all available resources, both in terms of RAM and CPU. Nevertheless, it is she who is considered the reference and is regularly audited. I would recommend that you use the much lighter version, i2pd, written in C ++. It has its own nuances that may cause some i2p applications to fail, but overall it's a great alternative implementation. The project is actively being sawed at the present time. [B]Install the demon[/B] The best part is that the authors have provided many deployment options, including docker and snap. You can go the way of the classic repository. Code: sudo add-apt-repository ppa:purplei2p/i2pd sudo apt-get update sudo apt-get install i2pd But I would advise using snap. It will not only quickly and conveniently deploy the daemon, but also provide automatic updates directly from the upstream, depending on the selected distribution channel. Code: no_face@i2pd:~$ snap info i2pd name: i2pd summary: Distributed anonymous networking framework publisher: Darknet Villain (supervillain) store-url: [URL]https://snapcraft.io/i2pd[/URL] license: BSD-3-Clause description: | i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client. I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses. snap-id: clap1qoxuw4OdjJHVqEeHEqBBgIvwOTv channels: latest/stable: 2.32.1 2020-06-02 (62) 16MB - latest/candidate: ↑ latest/beta: ↑ latest/edge: 2.32.1 2020-06-02 (62) 16MB - Install snap if you haven't already and set the default stable option: Code: apt install snapd snap install i2pd [B]Configuring[/B] Unlike the web-gui Java version, i2pd does not have so many settings, twists, and tabs. Only the most necessary things up to asceticism. However, the easiest way is to configure it directly in the config file. In order for your web resource to become available in i2p, it must be proxied similarly to the onion option. To do this, go to ~ / .i2pd / tunnels.conf and add your backend. Code: [anon-website] type = http host = 127.0.0.1 port = 8080 keys = anon-website.dat After restarting the daemon, you will get a random 32-bit address. It can be viewed in the web console, which is available by default at 127.0.0.1:7070 /?Page=i2p_tunnels. Do not forget to allow access to it from your IP address, if necessary. By default, it is only available on the local interface. There will be something scary like: ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p The i2p network has a semblance of DNS, but it is more like a scattered list of / etc / hosts. You subscribe to specific sources in the console that tell you how to get to the conditional flibusta.i2p. Therefore, it makes sense to add a more or less beautiful name to large resources like inr.i2p. [B]Can i2p and onion be deployed?[/B] You can use any bulletproof hosting. In the event of a motivated complaint against our client, hoster can terminate the contract and extinguish the virtual machine. Most hosters will do the same. However, due to the peculiarities of the tor architecture, and especially i2p, it is very difficult, and often simply impossible, to determine exactly where the website is hosted. Nevertheless, there is nothing illegal in the very use of such tools. Therefore, we will not mind if you open a mirror of your legal web resource in overlay networks. In any case, I strongly recommend again not to blindly experiment with tor on your home machine. Either the IP can get blacklisted, or the pative will arrive. Better to rent a VPS, it is inexpensive. You can find a list of bulletproof hosters in this thread, prices are very cheap, everyone can afford [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
How to create your website on the Darknet (.onion)
Top