Browse Source

update tor section of the manual

tags/v2.5.0-rc1
Shivaram Lingamneni 3 years ago
parent
commit
042d1320cd
1 changed files with 3 additions and 3 deletions
  1. 3
    3
      docs/MANUAL.md

+ 3
- 3
docs/MANUAL.md View File

@@ -981,21 +981,21 @@ Tor provides end-to-end encryption for onion services, so there's no need to ena
981 981
 
982 982
 The second way is to run Oragono as a true hidden service, where the server's actual IP address is a secret. This requires hardening measures on the Oragono side:
983 983
 
984
-* Oragono should not accept any connections on its public interfaces. You should remove any listener that starts with the address of a public interface, or with `:`, which means "listen on all available interfaces". You should listen only on `127.0.0.1:6667` and a Unix domain socket such as `/hidden_service_sockets/oragono.sock`.
984
+* Oragono should not accept any connections on its public interfaces. You should remove any listener that starts with the address of a public interface, or with `:`, which means "listen on all available interfaces". You should listen only on `127.0.0.1:6667` and a Unix domain socket such as `/hidden_service_sockets/oragono_tor_sock`.
985 985
 * In this mode, it is especially important that all operator passwords are strong and all operators are trusted (operators have a larger attack surface to deanonymize the server).
986 986
 * Onion services are at risk of being deanonymized if a client can trick the server into performing a non-Tor network request. Oragono should not perform any such requests (such as hostname resolution or ident lookups) in response to input received over a correctly configured Tor listener. However, Oragono has not been thoroughly audited against such deanonymization attacks --- therefore, Oragono should be deployed with additional sandboxing to protect against this:
987 987
   * Oragono should run with no direct network connectivity, e.g., by running in its own Linux network namespace. systemd implements this with the [PrivateNetwork](https://www.freedesktop.org/software/systemd/man/systemd.exec.html) configuration option: add `PrivateNetwork=true` to Oragono's systemd unit file.
988 988
   * Since the loopback adapters are local to a specific network namespace, and the Tor daemon will run in the root namespace, Tor will be unable to connect to Oragono over loopback TCP. Instead, Oragono must listen on a named Unix domain socket that the Tor daemon can connect to. However, distributions typically package Tor with its own hardening profiles, which restrict which sockets it can access. Below is a recipe for configuring this with the official Tor packages for Debian:
989 989
 
990 990
 1. Create a directory with `0777` permissions such as `/hidden_service_sockets`.
991
-1. Configure Oragono to listen on `/hidden_service_sockets/oragono.sock`, and add this socket to `server.tor-listeners.listeners`.
991
+1. Configure Oragono to listen on `/hidden_service_sockets/oragono_tor_sock`, with `tor: true`.
992 992
 1. Ensure that Oragono has no direct network access as described above, e.g., with `PrivateNetwork=true`.
993 993
 1. Next, modify Tor's apparmor profile so that it can connect to this socket, by adding the line `  /hidden_service_sockets/** rw,` to `/etc/apparmor.d/local/system_tor`.
994 994
 1. Finally, configure Tor with:
995 995
 
996 996
 ````
997 997
 HiddenServiceDir /var/lib/tor/oragono_hidden_service
998
-HiddenServicePort 6667 unix:/hidden_service_sockets/oragono.sock
998
+HiddenServicePort 6667 unix:/hidden_service_sockets/oragono_tor_sock
999 999
 # DO NOT enable HiddenServiceNonAnonymousMode
1000 1000
 ````
1001 1001
 

Loading…
Cancel
Save