Re: [tor-dev] Putting onion services behind a third-party TCP proxy

2019-08-19 Thread Pop Chunhapanya
Hi Tim, > TCPProxy protocol host:port > > > Tor will use the given protocol to make all its OR (SSL) connections > through a TCP proxy on host:port, rather than connecting directly to > servers. You may want to set FascistFirewall to restrict the set of ports > you might try to connect to, if

Re: [tor-dev] Putting onion services behind a third-party TCP proxy

2019-08-15 Thread Pop Chunhapanya
Hi Tim, The only protocol supported right now 'haproxy'. This option is only for > clients. (Default: none) > I think TCPProxy option is more generic than HTTPSProxy, Socks4Proxy and Socks5Proxy. Why don't we also allow https, socks4, and socks5 instead of just haproxy?

Re: [tor-dev] Putting onion services behind a third-party TCP proxy

2019-08-15 Thread Pop Chunhapanya
> So I'm thinking putting the tor daemon behind some third party TCP proxy > that will protect me from this kind of DDoS attack. > > What do you think if I want to implement a feature that forward all the > onion service traffic to the TCP proxy before going to the Tor network? > > The protocol

[tor-dev] Putting onion services behind a third-party TCP proxy

2019-08-14 Thread Pop Chunhapanya
Hi all, When deploying an onion service, I noticed some problem that the ip address of my machine that runs tor daemon is exposed to the Tor network which is vulnerable to the DDoS attack if someone knows my ip address. So I'm thinking putting the tor daemon behind some third party TCP proxy