TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Why offer an Onion Address rather than just encourage browsing-over-Tor?

250 点作者 kettunen大约 3 年前

15 条评论

bauruine大约 3 年前
If you are running an onion service but don&#x27;t need to hide the server IP, like you do if you also provide clearnet access to the same server, you should enable single hop mode [0] to reduce the load on the Tor network and also speed up the connections. This way your server directly connects the introduction and rendezvous points while the client still stays anonymous with a 3 hop circuit.<p>[0]: Search for HiddenServiceSingleHopMode on <a href="https:&#x2F;&#x2F;2019.www.torproject.org&#x2F;docs&#x2F;tor-manual.html.en" rel="nofollow">https:&#x2F;&#x2F;2019.www.torproject.org&#x2F;docs&#x2F;tor-manual.html.en</a> or just use the following config options<p>SOCKSPort 0<p>HiddenServiceNonAnonymousMode 1<p>HiddenServiceSingleHopMode 1
评论 #30625221 未加载
评论 #30625488 未加载
评论 #30625726 未加载
评论 #30632241 未加载
评论 #30625319 未加载
nextaccountic大约 3 年前
&gt; Using onion services mitigates attacks that can be executed by possibly-malicious “Tor Exit Nodes” — which, though rare, are not nonexistent<p>Is there any evidence that the majority of exit nodes aren&#x27;t malicious? There&#x27;s only 300 or so in the US, 300 or so in Germany, and in other countries even less. What would it take for three letter agencies to compromise most of it?<p>I mean, suppose all of the existing nodes weren&#x27;t malicious. Could a government agency plausibly run 1000 exit nodes in a way that doesn&#x27;t give away they are government-run? This would make the majority of exit nodes malicious.
评论 #30624466 未加载
评论 #30625646 未加载
评论 #30624351 未加载
评论 #30624352 未加载
评论 #30625175 未加载
评论 #30624770 未加载
p4bl0大约 3 年前
It is possible to advertise your .onion address and offer automatic redirect to it for Tor Browser users using the &quot;Onion-Location&quot; HTTP header. Example with my personal home page:<p><pre><code> $ curl -I https:&#x2F;&#x2F;pablo.rauzy.name&#x2F; HTTP&#x2F;1.1 200 OK Server: nginx&#x2F;1.14.2 Date: Thu, 10 Mar 2022 14:04:44 GMT Content-Type: text&#x2F;html; charset=utf-8 Content-Length: 2843 Last-Modified: Sun, 23 Jan 2022 22:21:41 GMT Connection: keep-alive Onion-Location: http:&#x2F;&#x2F;c2fk5i7jqn7am7nfo7eb7hwrkclyj3jj4qcwgdh6ievp7v5ie4gd3mid.onion&#x2F; </code></pre> It would be interesting to try to see if the Tor Browser has a TOFU policy and warn its user if the onion address change after they visited the site once.<p>If it is the case then you combine the ease of access of typing a normal domain name and the Onion security through an HSTS equivalent mechanism.
评论 #30632656 未加载
linuxandrew大约 3 年前
I think the avoiding exit nodes part is probably the most important to me. Exit nodes have always been problematic - from memory about 20% of relays have an exit flag but most of the traffic is directed to the most performant relays. Tor actively discourages using the network for file sharing because of the exit node bottleneck.<p>I think there are probably some uses of the Tor network that aren&#x27;t fully realised yet - file sharing (something similar to I2P) which avoids the exit node using onion addressing and chat applications (like Briar which uses onion addresses, or Secure Scuttlebutt).<p>As for web traffic, it is nice to offer an onion address. I wonder if websites could offer an &quot;upgrade&quot; to onion addresses, similar to how IPFS does?
评论 #30624852 未加载
评论 #30624957 未加载
nonrandomstring大约 3 年前
I think some comments here are misunderstanding the intent of the article. For those saying TLS already solves... it is not advocating Tor as a replacement for transport layer security, indeed most Tor users also use TLS (and site certs) with little overhead.<p>No, the article is asking how you could, as a website owner, make things easier on Tor users and yourself! It starts with the assumption that you care, and want to help users who require better privacy.<p>It answers, though not in detail, the many HN readers who invariably post replies concerning Tor that &quot;All my abuse comes through Tor&quot;.<p>Creating an .onion address mitigates that significantly.
评论 #30624890 未加载
noname120大约 3 年前
This article beats around the bush but never explains why Onion addresses solve these issues.<p>From Wikipedia:<p>&gt; Addresses in the onion TLD are […] automatically generated based on a public key when an onion service is configured.<p>&gt; 256-bit ed25519 public key along with a version number and a checksum of the key and version number<p>That&#x27;s all you need to know.
shp0ngle大约 3 年前
&gt; The first benefits are authenticity and availability: if you are running Tor Browser and if you click&#x2F;type in exactly the proper Onion address, you are guaranteed to be connected to what you expect — or not at all.<p>What? Writing raw onion addresses is like writing raw IPv6 addresses. Nobody can remember then and check them.<p>What is easier<p>&gt; <a href="https:&#x2F;&#x2F;nytimes.com" rel="nofollow">https:&#x2F;&#x2F;nytimes.com</a><p>or<p>&gt; ej3kv4ebuugcmuwxctx5ic7zxh73rnxt42soi3tdneu2c2em55thufqd.onion
评论 #30625240 未加载
评论 #30624756 未加载
评论 #30624730 未加载
Sami_Lehtinen大约 3 年前
&gt; “.onion” address demands that the person is using a TorBrowser<p>Actually this is not true. Tor runs as SOCKS5 proxy, and you can use any browser or application with it.
bawolff大约 3 年前
I think the only legit reason (assuming your clearnet site is using HSTS) is that .onion site reduces the risks of users screwing up. And i suppose better performance if you don&#x27;t have to use exit bandwidth (i would guess, dont actually know)<p>Users are bad at security. If they fail to set up tor, .onion links don&#x27;t work, so it acts as a barrier against users shooting themselves in the foot.<p>This is counterbalanced by higher phishing risks.
评论 #30624891 未加载
评论 #30627699 未加载
JulianMorrison大约 3 年前
Hiding the server IP is probably quite important when you want to get around nation states trying to blockade factual information.
djdjfhsje33edh大约 3 年前
Another good reason is that Twitter launching an onion address has given Tor a lot of positive press in the mainstream media for a change.
badrabbit大约 3 年前
Heh. An article for a two word answer: Tor exits.
Tepix大约 3 年前
One reason that i haven&#x27;t mentioned today is forcing users to use tor by <i>only</i> publishing a .onion address.
rosndo大约 3 年前
Most of the technical points listed here are pretty much entirely mitigated by TLS. Exit nodes can of course deny access to specific sites, but hidden services suffer from comparable (or worse) issues.<p>There are no other practical attacks that malicious exit nodes could execute against sites using TLS and HSTS preload lists. If you’re a website administrator, fixing those things should be your priority before implementing onion addresses.<p>Onion addresses also come with slight drawbacks. They’re difficult for users and more vulnerable to phishing. Hidden services are also extremely vulnerable to CPU-based DoS attacks.
评论 #30624688 未加载
moltke大约 3 年前
It&#x27;s much harder to deanonymize people who are connecting to hidden services because they don&#x27;t have to use exit relays which are often illegal to run.