Jump to content

.onion: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
XaPi (talk | contribs)
Replacing (adding) Image
added .exit info here
Line 24: Line 24:


A list of .onion hosts can be found here; [[Tor (anonymity network)#Central sites|Tor, Central Sites]].
A list of .onion hosts can be found here; [[Tor (anonymity network)#Central sites|Tor, Central Sites]].

== .exit ==
'''.exit''' is a [[pseudo-top-level domain]] used by [[Tor (anonymity network)|Tor]] users to indicate on the fly to the Tor software the preferred [[Tor_(anonymity_network)#Anonymous_outgoing_connections|exit node]] that should be used while connecting to a service such as a [[World Wide Web|web server]], without having to edit the configuration file for Tor (''torrc'')

The syntax used with this domain is ''hostname'' + ''.exitnode'' + ''.exit'', so that a user wanting to connect to [http://www.torproject.org/ www.torproject.org] through node ''tor26'' would have to type ''[http://www.torproject.org.tor26.exit/ www.torproject.org.tor26.exit]'' in his browser as the URL.

Example uses for this include accessing a site available only to addresses of a certain country or checking if a certain node is working.

Users can also type ''exitnode.exit'' alone to access the IP address of ''exitnode''


==External links==
==External links==

Revision as of 23:42, 30 May 2008

.onion
Tor
Introduced2004
TLD typePseudo-domain-style address suffix
StatusNot in root, but used by Tor clients, servers, and proxies
RegistryTor
Intended useTo designate a hidden service reachable via Tor
Actual useUsed by Tor users for services in which both provider and user is anonymous and difficult to trace
Registration restrictionsAddresses are "registered" automatically by Tor client when a hidden service is set up
StructureNames are opaque strings such as 6sxoyfb3h2nvok2d.onion, generated from public keys
DocumentsTor design document
Dispute policiesSee Tor abuse FAQ
Registry websitewww.torproject.org

.onion is a pseudo-top-level domain address suffix (similar in concept to such endings as .bitnet and .uucp used in earlier times) designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as Web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider.

Addresses in the .onion pseudo-TLD are opaque, non-meaningful strings which are automatically generated based on a public key when a hidden service is configured.

The "onion" name refers to onion routing, the technique used by Tor to achieve a degree of anonymity.

A list of .onion hosts can be found here; Tor, Central Sites.

.exit

.exit is a pseudo-top-level domain used by Tor users to indicate on the fly to the Tor software the preferred exit node that should be used while connecting to a service such as a web server, without having to edit the configuration file for Tor (torrc)

The syntax used with this domain is hostname + .exitnode + .exit, so that a user wanting to connect to www.torproject.org through node tor26 would have to type www.torproject.org.tor26.exit in his browser as the URL.

Example uses for this include accessing a site available only to addresses of a certain country or checking if a certain node is working.

Users can also type exitnode.exit alone to access the IP address of exitnode