diff options
author | Roger Dingledine <arma@torproject.org> | 2005-07-23 11:02:33 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2005-07-23 11:02:33 +0000 |
commit | d63a54980f7939113e08bfe6f12152ce4ac07d5d (patch) | |
tree | 068f69a933d8f9e2927495ca484b5f1f24e00d34 /doc/tor-doc.html | |
parent | a4510dce66eb474c0fcd14485d8a6cd35d8c14df (diff) | |
download | tor-d63a54980f7939113e08bfe6f12152ce4ac07d5d.tar tor-d63a54980f7939113e08bfe6f12152ce4ac07d5d.tar.gz |
make the hidden-service section of tor-doc obsolete
svn:r4654
Diffstat (limited to 'doc/tor-doc.html')
-rw-r--r-- | doc/tor-doc.html | 75 |
1 files changed, 4 insertions, 71 deletions
diff --git a/doc/tor-doc.html b/doc/tor-doc.html index 987d8dfdb..76add9c45 100644 --- a/doc/tor-doc.html +++ b/doc/tor-doc.html @@ -378,79 +378,12 @@ otherwise it is listed only by its fingerprint.</p> <a name="hidden-service"></a> <h2>Configuring a hidden service</h2> -<p>Tor allows clients and servers to offer hidden services. That is, -you can offer a web server, SSH server, etc., without revealing your IP to its -users. You can even have your application listen on localhost only, yet -remote Tor connections can access it. This works via Tor's rendezvous -point design: both sides build a Tor circuit out, and they meet in -the middle.</p> - -<p>If you're using Tor and <a href="http://www.privoxy.org/">Privoxy</a>, -you can <a href="http://6sxoyfb3h2nvok2d.onion/">go to the hidden wiki</a> -to see hidden services in action.</p> - -<p>To set up a hidden service, edit the middle part of your torrc. (See -<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ#torrc">this -FAQ entry</a> for help.) Then run Tor. It will -create each HiddenServiceDir you have configured, and it will create a -'hostname' file which specifies the url (xyz.onion) for that service. You -can tell people the url, and they can connect to it via their Tor client, -assuming they're using a proxy (such as Privoxy) that speaks SOCKS 4A.</p> - -<p>Let's consider an example. -Assume you want to set up a hidden service to allow people to access your -Apache web server through Tor. By doing this, they can access your server -but won't know who they are connecting to. You want clients to use the -standard port 80 when accessing your server. However, if your Apache -server is actually running on port 8080 locally, client connections need -to be redirected.</p> - -<p><b>HiddenServiceDir</b> is a directory where Tor will store information -about that hidden service. In particular, Tor will create a file here named -<i>hostname</i> which will tell you the onion URL. You don't need to add any -files to this directory.</p> - -<p><b>HiddenServicePort</b> is where you specify a virtual port and where -to redirect connections to this virtual port. For instance, you tell -Tor there's a virtual port 80 and then redirect traffic to your local -webserver at 127.0.0.1:8080.</p> - -<p>Example lines from a torrc file</p> - -<pre> -HiddenServiceDir /usr/local/etc/tor/hidden_service/ -HiddenServicePort 80 127.0.0.1:8080 -</pre> - -<p>This tells Tor to store its files in <tt>/usr/local/etc/tor/hidden_service/</tt> -and allow people to connect to your onion address on port 80. It -will then redirect requests to your localhost webserver on port 8080. +<p> +We've moved this section over to the new <a +href="http://tor.eff.org/doc/tor-hidden-service.html">Tor Hidden Service +Howto</a>. Hope you like it. </p> -<p>To let people access your hidden service, look at the file -<tt>/usr/local/etc/tor/hidden_service/hostname</tt> which will tell you what the -hostname is (such as xyz.onion). Then, as long as they have Tor and Privoxy -configured, they can access your webserver with a web browser by connecting -to http://xyz.onion/</p> - -<p>You can have multiple tor hidden services by repeating Dir and Ports:</p> - -<pre> -HiddenServiceDir /usr/local/etc/tor/hidden_service/ -HiddenServicePort 80 127.0.0.1:8080 - -HiddenServiceDir /usr/local/etc/tor/other_hidden_service/ -HiddenServicePort 6667 127.0.0.1:6667 -HiddenServicePort 22 127.0.0.1:22 -</pre> - -<p>The above example will allow people to connect to the hostname in -<tt>/usr/local/etc/tor/hidden_service/hostname</tt> for an HTTP server and -to a different hostname in -<tt>/usr/local/etc/tor/other_hidden_service/hostname</tt> for an IRC and -SSH server. To an end user, this appears to be two separate hosts with -one running an HTTP server and another running an IRC/SSH server.</p> - <a name="own-network"></a> <h2>Setting up your own network</h2> |