Creating an Invisible Darknet Server for Secure Remote Access (Tor "Stealth" Hidden Service)

แชร์
ฝัง
  • เผยแพร่เมื่อ 9 ก.พ. 2019
  • This video is a demonstration on how to leverage Tor's unique network architecture to allow for NAT traversal with strong authentication and encryption when remotely accessing your SSH Server from behind a Firewall/NAT.
    If you find these videos useful, please consider liking, subscribing and sharing to support the channel. Thank you!
    Follow me: / ipvzero
    Network Automation Scripts: github.com/IPvZero/IPvZero/

ความคิดเห็น • 72

  • @cryptohackorxz
    @cryptohackorxz 4 ปีที่แล้ว

    great video, i have a SSH server too aprovisioning in Tor Network

  • @xB-yg2iw
    @xB-yg2iw 2 ปีที่แล้ว

    This was a great video thank you!

  • @predator2483
    @predator2483 5 ปีที่แล้ว +3

    Awesome video!!

    • @IPvZero
      @IPvZero  5 ปีที่แล้ว +1

      Thanks, man! Appreciate your feedback!

  • @zuberskyyy4120
    @zuberskyyy4120 3 ปีที่แล้ว

    all the best to norway!

  • @jonathynblythe8096
    @jonathynblythe8096 4 ปีที่แล้ว

    Hey, great! Thank's a lot!

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว

      Thanks for watching, Jonathyn!

    • @jonathynblythe8096
      @jonathynblythe8096 4 ปีที่แล้ว

      @@IPvZero You know what just occurred to me... why not just buy a server computer, have VPN routers behind it, use a TOR bridge, use Ubuntu or Debian for the OS, and do it that way? If you have something like Verizon Fios at your home, would that slow your internet down? Or, I'm not sure. I'm very new to the whole notion of TOR. I'm just thinking it might be easier for the layman to just buy a whole server tower.

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว

      @@jonathynblythe8096 Hey Jonathyn. In order to get the NAT traversal (ie no need to open ports on your home firewall) you would have to configure a Hidden Service. Simply using a Tor bridge would not involve vital components such as persistant outbound connections to Introduction Points, etc, which would be required for this effect. And configuring a regular hidden service can be scanned and found. The point here is that no one can even discover the service, even if they know the URL, or the IP address. Since the server will only open once the client has a correctly configured cookie.
      I know it's a little confusing but I hope that helps haha :)
      -John

    • @jonathynblythe8096
      @jonathynblythe8096 4 ปีที่แล้ว

      @@IPvZero Wow, that's amazing. I've never even heard of anything like this until now. So someone can put a phpbb forum on this server for the world to access? In other words, host your very own website and not be traced?

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว

      @@jonathynblythe8096 Correct. People with the address will be able to reach your introduction point, which is just a random node in the Tor network. For the connection to open, they must have the authentication cookie must be present but the actual hidden service will open a connection to the request via another completely random node in the network (the Rendezvous Point). If you're interested you can read more here:
      WIRED: www.wired.com/2016/07/now-can-hide-smart-home-darknet/
      SYMANTEC: www.symantec.com/connect/blogs/tor-hidden-services-home-device-and-services-security-and-privacy
      Have fun exploring :)
      -John

  • @broadrama43
    @broadrama43 4 ปีที่แล้ว +1

    Wow thank you very much! Very good explanation
    Do you know if there is actually a way to display content from a Tor Hidden Service over a reverse server in a normal browser?
    For example, I enter the IP from the reverse server in a normal browser, the reverse server connects over tor to the hidden service, the page loads and behaves exactly as if I had visited the page via Tor.
    I would be very happy about an answer :)

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว +1

      Hey, Broad Rama! Thanks so much!
      re: the Reverse Proxy. I've never attempted such a configuration so I'd need to properly look into it!
      If you don't mind me asking, what would be the use case?
      I only ask because the implementation would be pretty insecure in that the Reverse Proxy operator would have full visibility of your Tor traffic. If you were operating the reverse proxy yourself and then this particular issue wouldn't be such a problem. If you were simply trying to enter the Tor network unnoticed (ie hiding your use from an ISP) then I would recommend using Obs4proxy bridges. If you just simply want a way to visit a Tor hidden service but don't want to download the Tor browser your local machine, you can access Onion addresses from a normal browser uses Tor2Web, however I would strongly discourage this as it can't be considered secure!
      EDIT: Also, if you just have reservations about downloading Tor on your local machine, then downloading Tails OS on to a USB will allow you to boot from a USB in a forensically sound environment (with additional security hardening features).
      I'll have a google around though since I'm curious to the answer too haha.
      Thanks again.
      -John

    • @broadrama43
      @broadrama43 4 ปีที่แล้ว

      @@IPvZero Many thanks for your response!
      I already know your mentioned points, google has helped me with that already :D
      The actual purpose would be that the backend server don't see IPs of users, the users don't see the IP of the actual backend and that without the need to install Tor or something else.
      I've already tried it with Nginx and HAProxy, but I have not gotten it to work yet.
      And yes, I'm aware that such a setup is actually totally overkill, but this is also true for the SSH connection via Tor :'D
      It's just really interesting to know what's technically possible and since you're a real pro in the network area, I just thought I'd ask :)

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว +1

      Haha that's cool, man. I like to geek out on the technical possibilities too.
      If I'm understanding the use case correctly, it would basically be providing the Tor anonymity, without requiring the user base to install Tor (ie more user friendly). A normal user would request the reverse proxy server from a normal browser, the proxy would forward the request to the real server via Tor, thus, would have all the Tor security benefits? Would that be right?
      Apologies if I'm misunderstanding.
      If so, I'm unsure how to ensure the anonymity of the user. Whilst the backend server wouldn't see the user's IP address , the reverse proxy would. As such, the reverse proxy would in effect get to see the entire Tor transmission, as well as having the real IP address of the user through to relay the traffic back. Assuming the reverse proxy and the backend server are run by the same people, by default the backend server gets the users full logs, albeit indirectly from the proxy server. If the reverse proxy was run by and intermediary then the intermediary gets all the Tor traffic effectively in decrypted form, plus the user's IP address, whilst the backend server's actual location remaining hidden, as it only announces its presence via its cryptographic public key, rather than IP address.
      If the goal is anonymity for both user and server, then you really want to be running the Tor software at the end points of the connection (client computer and server). Again, apologies if I'm misunderstanding haha!
      -John

    • @broadrama43
      @broadrama43 4 ปีที่แล้ว

      @@IPvZero Yes, you interpreted my message correctly but the reverse proxy would of course be hosted by the same person.
      Maybe I did not express myself correctly, but a reverse proxy can see the IPs because the traffic is not analyzed and also not logged, so that should not be a problem.
      It's more about that the backend server enjoying the full hidden service and even can be accessed over the normal web :)

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว +2

      @@broadrama43 Ah okay, I see! I reckon you could achieve what you're looking for using some HTTP proxy like Polipo.
      However, I would caution that doing so would reduce the strength of the anonymity of both clients and server. Let's say for example your use-case was to provide a user-friendly website where people could post sensitive government leaks. The government could deanonymise the "hidden service" simply by investigating who owns the publicly available IP address of the Reverse Proxy relaying all of the traffic. That IP address would be public and the registration details could be obtained just like a normal clearnet website. Now they've found you. By contrast, having your clients use Tor on their own computer like a normal hidden service, they can contact the server via its cryptographic public key (since the .onion address is simply a hash of the public key appended to the .onion suffix). That way, users can reach the server without ever knowing any IP addresses. By introducing a public IP address through which to contact the server, a key Tor strength would be circumvented. Similarly, attackers could simply monitor inbound connections of the clearnet traffic going to the relay server (since it's IP address would be public), and be able to infer every IP address connected to the relay server is accessing your government leaks website, and would compromise the users. So the users would also be vulnerable to identification. And whilst they would get an increase in usability from not having to download Tor, they would subject to the bad aspect of Tor which is poor performance. Each connection would require going through multiple hops (your onion circuit hop count, plus an additional hop for the entrance via the relay), so in that sense user experience would be limited, but without the strength of Tor's proper anonymity.
      Even from the point of view of a denial of service attack, the setup would become more vulnerable. Whilst you can certainly DDOS an onion address, it requires that the attack be large enough to knock multiple high bandwidth nodes offline (your Introduction Points). Whereas if your entrance is a public relay server, they can take down access to the site simply by attacking that.
      Unfortunately, security and anonymity are difficult and don't go hand-in-hand with being very user-friendly.
      Just look at PGP for example hahaha!
      Again, by all means try it out for experimental purposes, just be aware of the weaknesses if security and anonymity are high priorities! Traffic correlation attacks have always been Tor's weakness, so introducing a public entry point could cause problems!
      Hope that's been helpful man :)
      -John

  • @Y2-_
    @Y2-_ ปีที่แล้ว

    So, if I understand correctly. It is entierly free to configure a server on the darknet? In my use case I would like to host a vpn on that darknet server. This seems very possible in my eyes.... Is it?

  • @shrey356
    @shrey356 2 ปีที่แล้ว

    Can you please recommend any book on the same… it would mean great to me

  • @enderstime6902
    @enderstime6902 4 ปีที่แล้ว

    hey which operating system are you using?

    • @simeondermaats
      @simeondermaats 4 ปีที่แล้ว

      It looks like Ubuntu 18.04 to me

  • @KenSherman
    @KenSherman ปีที่แล้ว

    6:00
    The top "RENDEZVOUS" point says "RENDENVOUS"? Surprised no one "point"ed that out.
    6:50
    Noticed the "Rubbish Bin 🚮". 😆
    L🤍ve the heavy accent too.

  • @whatsigmund
    @whatsigmund 9 หลายเดือนก่อน +1

    Thanks for vid. How can i make a GET request to my onion site?

    • @scarthebadguy
      @scarthebadguy 9 หลายเดือนก่อน

      Were you able to get this to work? Having trouble because some of these configuration don't work anymore

    • @whatsigmund
      @whatsigmund 9 หลายเดือนก่อน

      @@scarthebadguy i wasnt able to set up authorized user, but wo it, ssh worked. The new formst is on the tor forum page, to set up auth user. Also needs config to load tor on reboot, for server

    • @whatsigmund
      @whatsigmund 9 หลายเดือนก่อน

      @@scarthebadguy also, its very very slow. I wanted to see if i could use it to upload files from off site, too slow for that. Vpn that allows port forwarding is a better option, but its a paid service. So, still looking for a solution.

  • @reddragon7600
    @reddragon7600 2 ปีที่แล้ว

    Do one where you just open a server on the darknet.

    • @Harlem55
      @Harlem55 2 ปีที่แล้ว +1

      All you would do is declare hiddenservicedir and port in Torrc.

  • @Antonis24
    @Antonis24 ปีที่แล้ว

    This guide is for Tor v2 and does not work for Tor v3. Can you update it?

    • @scarthebadguy
      @scarthebadguy 9 หลายเดือนก่อน

      Were you ever able to get it? If so do you have a link to an article

  • @eggventlivestudio3283
    @eggventlivestudio3283 4 ปีที่แล้ว

    how to connect a node js api through tor ssh connection? maybe some link for documentation ? ^^

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว +1

      Hey, Z! I've not actually done that myself. I'd need to talk a look around and do some investigoogling. If I find anything concrete I'll post it :)
      Thanks for watching!
      -John

    • @eggventlivestudio3283
      @eggventlivestudio3283 4 ปีที่แล้ว

      @@IPvZero Thank you a lot for your reply.

    • @Harlem55
      @Harlem55 2 ปีที่แล้ว

      The problem with that is that in all practicallity- JS is not really usable for hidden services because most people using a hidden service also use noscript.

    • @xB-yg2iw
      @xB-yg2iw 2 ปีที่แล้ว +1

      Assuming I am understanding right, you mean a Rest API over http written in node JS? I think you would just need to add another hidden service configuration in the torrc, with the local port your API runs on

  • @patrickdowning3509
    @patrickdowning3509 4 ปีที่แล้ว

    I keep getting " cat: /var/lib/tor/hidden_service/hostname: No such file or directory "
    when trying to print .onion address, my torrc file is configured to have that as the HiddenServiceDir any suggestions?

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว +1

      Hey, Patrick. I ran into a similar problem in the video at around 14 min 45! The way I solved it was to restart the tor service by issuing the command "sudo systemctl restart tor.service". After restarting the service I could then issue the "sudo cat" command followed by the file path and get the onion address. In my case it's "sudo cat /var/lib/tor/ssh/hostname". Not sure if you're having the same issue but try that and let me know if you get it working or still having problems!
      -John

    • @jacobstrokus3712
      @jacobstrokus3712 4 ปีที่แล้ว

      @@IPvZero Hi, I'm getting the same problem listed above. I restarted the tor service using the command mentioned and still no luck. I'm using command "sudo cat /var/lib/tor/ssh/hostname" and when I cd into the tor file nothing is in there, my torrc file is configured properly as shown in the video. Help would be greatly appreciated! Thanks

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว

      @@jacobstrokus3712 Hey, Jacob. I'll quickly spin up a couple of VMs and try and the process again in case there is some type of bug and get back to you. Can I ask, what distro are you using, Ubuntu?
      -John

    • @jacobstrokus3712
      @jacobstrokus3712 4 ปีที่แล้ว

      @@IPvZero Hi John, Thanks for quick reply. I am running Kali, Could the problem be that I am root and not a user? I noticed from the video you were not root but instead using sudo to execute commands with root permissions. I will create a user and try commands again and see if that works. Thanks,
      Jacob

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว

      @@jacobstrokus3712 Very possibly, Tor tries to block root users for security, so very well maybe that issue! I'm spinning up a Ubuntu machine just now and see how that goes. I'm curious now haha. Let me know how you get on!
      -John

  • @logangraham2956
    @logangraham2956 3 ปีที่แล้ว

    could you do one with nginx using tor.
    i don't really care about the security aspect .
    i'd just love to use a .onion site so i don't have to be reliant on a domain name register for my services name.
    i don't know if its possible or not but i'd also love for normal browsers to be able to access my service through the same .onion address

  • @Novo_Naselje_Kurvo
    @Novo_Naselje_Kurvo 4 ปีที่แล้ว

    Hello brother pls where can i send you message pls give e mail

  • @Novo_Naselje_Kurvo
    @Novo_Naselje_Kurvo 4 ปีที่แล้ว

    BROTHER PLS NEED YOUR E MAIL TO ASK YOU SOMETHING PLSSSSSSSSSS

    • @IPvZero
      @IPvZero  4 ปีที่แล้ว

      Hey man, you can email me at ipvzero@gmail.com

    • @Novo_Naselje_Kurvo
      @Novo_Naselje_Kurvo 4 ปีที่แล้ว

      @@IPvZero thanks a loot i send you an email

  • @h-disconnected6612
    @h-disconnected6612 3 ปีที่แล้ว +3

    Now give it 2fa from an authenticator just outa spite

  • @hacks4geeks
    @hacks4geeks 3 ปีที่แล้ว

    Da faq english you speak, man?

    • @IPvZero
      @IPvZero  3 ปีที่แล้ว +8

      Regular English. Scottish accent.