-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This looks really cool, thanks for all of your hard work! Comrade Ringo Kamens Domenik Bork wrote: > Hey list, > > a few of you may know me from IRC, ohers may not. I'm one of this years > Google Summer of Code students. My project is about implementing Vidalia > support for Hidden Services with User Authorization, according to the > Tor proposal 121-hs-authorization of Karsten Loesing. > A Hidden Service is a service that is reachable by a .onion adress, but > the IP-Adress of the service provider is hidden. My goal is now to let > Vidalia configure those Hidden Services, give a Service provider the > possibility to create User Authorization data(.onion adress and a > descriptor cookie) for each user he wants to access the service. > Additionally there should be the option to store authorization data > needed to access other hidden services in Vidalia. So a Service Provider > has then the opportunity to create individual authorization data for > single users and it would be no problem to exclude users from a service > if he wants to let them no longer access the service. > > As a few of you may have noticed I uploaded the first prototype of my > Google Summer of Code Project. This prototype includes the complete > functionality explained above with all the communication to/from Tor as > well as persistent storage of the configuration. > > Within this Mail I give you a little How2 for the installation of my > Vidalia branch and the correct Tor branch you need to run it with User > Authorization. > > Here starts the little installation help: > > Tor related: > 1)Download the newest version of Karstens Tor branch (svn co > https://tor-svn.freehaven.net/svn/tor/branches/121-hs-authorization/) > 2)start a terminal and switch into the directory of 121-hs-authorization > 3)type in the following command lines > 1. ./autogen.sh [Enter] > 2. ./configure [Enter] > 3. make > 4) if everything worked fine there shoul be the Tor binary in > /121-hs-authorization/src/or/ > > Vidalia related: > 1)Download the newest branch of my Vidalia branch (svn co > https://svn.vidalia-project.net/svn/vidalia/branches/hidden-services) > 2)start a terminal and switch into the directory of hidden-services branch > 3)type in the following command lines > 1. cmake . && make [Enter] > 4)if everything worked fine there should be a Vidalia binary in > hidden-services/src/vidalia/ > 5)click on the binary to start Vidalia > 6)click on settings and then on „General“ to configure the path to the > Tor executable in that way that it points to the 121-hs-authorization > version > 7)click on „Save“ > 8)click on „Stop Tor“ > 9)click on „Start Tor“ > 10)now the new Tor version should be started and you can start > configuring Hidden Services with/without User Authorization etc by > clicking on „Settings“ and then „Services“. > > Possible configurations of Hidden Services: > • normal Hidden Service with one single adress for all users > • Hidden Service with User Authorization to easily include/exclude > single users while the service is still reachable with the „old“ adress > by other users who are configured. > • Store the Authorization Data you need to access Hidden Services. > > I would really appreciate it if I can find a few people who are > interested in testing it and giving me some feedback or/and bug reports. > Remember, this is just the first prototype and there are bugs and things > i'm going to change in the next weeks. So this test phase is thought to > give some feedback about the look and feel, whether the communication > to/from Tor works as it should etc.. GUI stuff. > > Best regards, > > - --Domenik > >
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFIcpikmBTzXUpNYqQRAln2AKCSV53gheuM6er7HM1QFOaw+nOx1gCeMwNq 9U0pUtWopElyVKUFrAnmYR8= =JEOa -----END PGP SIGNATURE-----

