Jump to content

.onion: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Belorn (talk | contribs)
Undid revision 461264046 by Noname 99 (talk) undo section blanking
Line 43: Line 43:


Users can also type ''exitnode.exit'' alone to access the IP address of ''exitnode''
Users can also type ''exitnode.exit'' alone to access the IP address of ''exitnode''

== Examples of .onion sites ==
(Tor is required to access the sites)

* [http://eqt5g4fuenphqinx.onion/ Core.onion], one long-standing introductory hub to the web of onions
<!-- * [http://l6nvqsqivhrunqvs.onion/ onionforum - Main Page], a popular discussion forum -->
* [http://xqz3u5drneuzhaeo.onion/users/badtornodes/ InspecTor / ExcludeNodes generator], tab-keeping on glitchy or spurious exit nodes
<!-- * [http://oqznfi3tdo6nwg3f.onion/ Tor network search - Torgle v3], a search engine and service index -->
* [http://xqz3u5drneuzhaeo.onion/ Freedom Hosting], free hidden web hosting with PHP and MySQL. During October 2011, hacktivist collective Anonymous downed the servers of Freedom Hosting as part of OpDarknet, a campaign against child pornography.<ref>"#OpDarknet Major Release and Timeline," Oct. 15, 2011, http://pastebin.com/T1LHnzEW</ref> [[Anonymous (group)|Anonymous]] stated in media releases that Freedom Hosting had refused to remove such sites as "Lolita City" and "Hard Candy," which it found to contain 100 GB of child porn. Anonymous released 1500 user names from these sites and invited the FBI and Interpol to follow up.<ref>"Anonymous Back in Action: Targets Child Porn Web Sites, Releases User Names," International Business Times, Oct. 23, 2011. http://www.ibtimes.com/articles/235991/20111023/anonymous-hacking-group-targets-child-porn-web-sites-releases-user-names-lolita-city-child-pornograp.htm</ref>
* [http://am4wuhz3zifexz5u.onion/Library/ The Tor Library], small library of books in PDF and other common formats
* [http://ci3hn2uzjw2wby3z.onion/ talk.masked], an anon-post board
* [http://squareh565qgkioq.onion/ SquareBoard - Random], publicly browseable, image upload
* [http://lotjbov3gzzf23hc.onion/ TorStatusNet], StatusNet on tor (twitter-like clone).


== References ==
== References ==

Revision as of 14:17, 18 November 2011

.onion
Introduced2004
TLD typePseudo-domain-style host suffix
StatusNot in root, but used by Tor clients, servers, and proxies
RegistryTor
Intended useTo designate a hidden service reachable via Tor
Actual useUsed by Tor users for services in which both provider and user is anonymous and difficult to trace
Registration restrictionsAddresses are "registered" automatically by Tor client when a hidden service is set up
StructureNames are opaque strings such as jv6g2ucbhrjcnwgi.onion, generated from public keys
DocumentsTor design document
Dispute policiesN/A
Registry websitewww.torproject.org

.onion is a pseudo-top-level domain host suffix (similar in concept to such endings as .bitnet and .uucp used in earlier times) designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as Web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider.

Addresses in the .onion pseudo-TLD are opaque, non-mnemonic, 16-character alpha-semi-numeric hashes which are automatically generated based on a public key when a hidden service is configured. These 16-character hashes can be made up of any letter of the alphabet, and decimal digits beginning with 2 and ending with 7, thus representing an 80-bit number in base32.

The "onion" name refers to onion routing, the technique used by Tor to achieve a degree of anonymity.

WWW to .onion proxies

Proxies into the TOR network allow accessing dynamically routed services from non-TOR browsers.

tor2web

Allows access using a non-TOR browser by changing the domain suffix .onion of any hidden service host to .tor2web.org. The protocol prefix http:// can also be changed into https:// to use an encrypted connection to the tor2web proxy server in order to provide additional privacy.

For example http://eqt5g4fuenphqinx.onion/ would become https://eqt5g4fuenphqinx.tor2web.org/.

Using a proxy server of this kind decreases the level of security in comparison to using Tor by having it installed on the computer.[1]

.exit

.exit is a pseudo-top-level domain used by Tor users to indicate on the fly to the Tor software the preferred exit node that should be used while connecting to a service such as a web server, without having to edit the configuration file for Tor (torrc)

The syntax used with this domain is hostname + .exitnode + .exit, so that a user wanting to connect to http://www.torproject.org/ through node tor26 would have to enter the URL http://www.torproject.org.tor26.exit.

Example uses for this include accessing a site available only to addresses of a certain country or checking if a certain node is working.

Users can also type exitnode.exit alone to access the IP address of exitnode

Examples of .onion sites

(Tor is required to access the sites)

  • Core.onion, one long-standing introductory hub to the web of onions
  • InspecTor / ExcludeNodes generator, tab-keeping on glitchy or spurious exit nodes
  • Freedom Hosting, free hidden web hosting with PHP and MySQL. During October 2011, hacktivist collective Anonymous downed the servers of Freedom Hosting as part of OpDarknet, a campaign against child pornography.[2] Anonymous stated in media releases that Freedom Hosting had refused to remove such sites as "Lolita City" and "Hard Candy," which it found to contain 100 GB of child porn. Anonymous released 1500 user names from these sites and invited the FBI and Interpol to follow up.[3]
  • The Tor Library, small library of books in PDF and other common formats
  • talk.masked, an anon-post board
  • SquareBoard - Random, publicly browseable, image upload
  • TorStatusNet, StatusNet on tor (twitter-like clone).

References

  1. ^ "tor2web.org: visit anonymous websites". Retrieved 2009-09-16.
  2. ^ "#OpDarknet Major Release and Timeline," Oct. 15, 2011, http://pastebin.com/T1LHnzEW
  3. ^ "Anonymous Back in Action: Targets Child Porn Web Sites, Releases User Names," International Business Times, Oct. 23, 2011. http://www.ibtimes.com/articles/235991/20111023/anonymous-hacking-group-targets-child-porn-web-sites-releases-user-names-lolita-city-child-pornograp.htm

See also