On 12/03/2018 10:42 PM, Nathaniel Suchy wrote: <SNIP>
> You mentioned "HiddenServiceAuthorizeClient", a feature I did not know about. > I'm going to figure out if this is possible to implement on the SSH System as > that would solve some concerns about a leaked onion address. Could you > elaborate a bit more on this functionality? <SNIP> I've just used basic authentication. In the .onion server torrc: $ sudo nano /etc/tor/torrc ... HiddenServiceDir /var/lib/tor/foo HiddenServiceAuthorizeClient basic [16-chracter-string] HiddenServicePort 22 127.0.0.1:22 ... $ sudo cat /var/lib/tor/foo/hostname [v2-hostname].onion [22-character-string] # client: [16-chracter-string] The client ID must be 16 alphanumeric characters. Then you use the 22 character string in the client torrc. In the client: $ sudo nano /etc/tor/torrc ... HidServAuth [v2-hostname].onion [22-character-string] ... -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk