Upload folder using huggingface_hub
Browse filesThis view is limited to 50 files because it contains too many changes. See raw diff
- tasks.parquet +3 -0
- tor-0000/environment/Dockerfile +0 -5
- tor-0000/instruction.md +0 -2
- tor-0000/task.toml +0 -18
- tor-0001/environment/Dockerfile +0 -5
- tor-0001/instruction.md +0 -2
- tor-0001/task.toml +0 -18
- tor-0002/environment/Dockerfile +0 -5
- tor-0002/instruction.md +0 -2
- tor-0002/task.toml +0 -18
- tor-0003/environment/Dockerfile +0 -5
- tor-0003/instruction.md +0 -2
- tor-0003/task.toml +0 -18
- tor-0004/environment/Dockerfile +0 -5
- tor-0004/instruction.md +0 -2
- tor-0004/task.toml +0 -18
- tor-0005/environment/Dockerfile +0 -5
- tor-0005/instruction.md +0 -2
- tor-0005/task.toml +0 -18
- tor-0006/environment/Dockerfile +0 -5
- tor-0006/instruction.md +0 -2
- tor-0006/task.toml +0 -18
- tor-0007/environment/Dockerfile +0 -5
- tor-0007/instruction.md +0 -2
- tor-0007/task.toml +0 -18
- tor-0008/environment/Dockerfile +0 -5
- tor-0008/instruction.md +0 -2
- tor-0008/task.toml +0 -18
- tor-0009/environment/Dockerfile +0 -5
- tor-0009/instruction.md +0 -2
- tor-0009/task.toml +0 -18
- tor-0010/environment/Dockerfile +0 -5
- tor-0010/instruction.md +0 -2
- tor-0010/task.toml +0 -18
- tor-0011/environment/Dockerfile +0 -5
- tor-0011/instruction.md +0 -2
- tor-0011/task.toml +0 -18
- tor-0012/environment/Dockerfile +0 -5
- tor-0012/instruction.md +0 -2
- tor-0012/task.toml +0 -18
- tor-0013/environment/Dockerfile +0 -5
- tor-0013/instruction.md +0 -2
- tor-0013/task.toml +0 -18
- tor-0014/environment/Dockerfile +0 -5
- tor-0014/instruction.md +0 -2
- tor-0014/task.toml +0 -18
- tor-0015/environment/Dockerfile +0 -5
- tor-0015/instruction.md +0 -2
- tor-0015/task.toml +0 -18
- tor-0016/environment/Dockerfile +0 -5
tasks.parquet
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:7bb9190146ba21c17f9bcab39b43284526fe0af3a4b59d9cd27777759d695e5d
|
| 3 |
+
size 13251
|
tor-0000/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0000/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
Hidden Services usually have a long-ish string of alphanumeric characters for their .onion address, and this is generated by Tor as part of the Hidden Service Configuration. How did some Hidden Services get 'memorable' .onion addresses such as Tor Wiki - torwikignoueupfm.onion A mirror of The Hidden Wiki - wikitjerrta4qgz4.onion (notice it starts with wiki )
|
|
|
|
|
|
|
|
|
tor-0000/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0001/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0001/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
There are some detailed instructions for setting up a Tor site at torproject.org 1 . It seems that it would be most secure to use a dedicated machine for this task if possible. I've read elsewhere that thttpd might be preferable to Apache and its likely more secure to go with a GNI/Linux over Windows. Any thoughts on this? Is there a "standard" distro and/or web-server that would be best-suited for this task? Or is that merely a matter of personal preference? Also, what are appropriate and effective security practices, both technical and operational? What can we learn from the recent compromises of Freedom Hosting (perhaps the largest .onion hosting provider) and the Silk Road? According to Wired 2 , "the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July". The article notes that "[i]t’s not clear how the FBI took over the servers". However, the comment that "the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords" is suggestive. As details come out in the trial, it would be prudent to identify relevant technical and/or operational failures. In the case of the Silk Road, it's clear from the Maryland complaint 3 that vulnerabilities in Tor were not instrumental in the site's compromise. Even so, did technical and/or operational failures contribute to the takedown, and how might they be corrected? As new hidden service sites fill these market niches, at least some of the underlying technical and/or operational improvements may become public. There is much to learn about doing this right.
|
|
|
|
|
|
|
|
|
tor-0001/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0002/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0002/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
If I do tor-browser_en-US/App/Firefox/firefox-bin http://example.com it opens in my regular Firefox browser. Is there a way to make a launcher/script that opens a link in the Tor Browser?
|
|
|
|
|
|
|
|
|
tor-0002/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0003/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0003/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
I have a working installation of Tor. I am able to both access hidden services and proxy my clear-net traffic through Tor. My main source of traffic so far has been HTTP. I would like to know how I can use Tor to access remote computers through the use of SSH. I would like answers for the major operating systems: Windows, Linux/Unix, Mac OS X. Further, can programs such as rsync be made to use the Tor network?
|
|
|
|
|
|
|
|
|
tor-0003/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0004/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0004/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
Sometimes I'm working in a small office. Colleagues asked me to try Tor and I thought about setting up SOCKSListenAddress thus allowing them to use my onion client. Can this harm my anonymity in any way and makes it maybe more sense that everyone install their own client?
|
|
|
|
|
|
|
|
|
tor-0004/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0005/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0005/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
Can ReachableAddresses be on separate lines? Like this: ReachableAddresses accept *:80 ReachableAddresses accept *:443 Or does it have to fit into one? Like this: ReachableAddresses accept *:443, accept *:80
|
|
|
|
|
|
|
|
|
tor-0005/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0006/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0006/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
Currently it seems there are no torproject.org "officially sanctioned" solutions for iOS. However, there is a browser called OnionBrowser that passes check.torproject.org and is able to access hidden services on the tor network. So my question is, do we know how secure it is compared to running tor from Vidalia or even Orbot? Aside from the following warnings provided by OnionBrowser: Caveats: HTML5 tags will leak -related DNS queries and data transfer outside of Tor. Javascript cannot be disabled, HTML5 Geolocation API cannot be disabled. I guess one concern I have is how often the other tor software is updated and the inherent lag with availability of updates from both the developer and the App Store itself. Otherwise is there anything I should know about using this to access Tor? Is it ill-advised in scenarios where security or anonymity is important?
|
|
|
|
|
|
|
|
|
tor-0006/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0007/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0007/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
The Debian/Ubuntu packages from deb.torproject.org [ docs ] do not work on the Raspberry Pi when running Raspbian : $ tor --version Illegal instruction Why, and how can I still run Tor versions newer than what ships with Raspbian ?
|
|
|
|
|
|
|
|
|
tor-0007/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0008/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0008/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
I know .onion addresses are a (partial) hash of a descriptor which contains a public RSA key , so I was wondering: it is possible to see the public key that is found when connecting to a .onion hidden service using Tor? While in general it is a dangerous idea to use the same cryptographic key for different algorithms, there are many statistical reasons why knowing the public key is interesting. For example, looking for low-entropy keys by checking if the key is used by others or looking for common prime factors .
|
|
|
|
|
|
|
|
|
tor-0008/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0009/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0009/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
I am considering running an exit relay. Unfortunately this opens possibility of legal issues and traffic restrictions from my Internet Service Provider. See Abuse FAQ and Legal FAQ . There is a nice blog article recommending what to do: Tips for Running an Exit Node with Minimal Harassment . I can set the exit policy to limit potentially problematic ports and and IP addresses reachable from the exit relay using ExitPolicy option in torrc . I can limit the bandwidth by using *Bandwidth* options in torrc . I should not perform security inspection on the traffic leaving the Tor network because it is being considered bad. See May I do security inspection on exit relays? Are there other means which I can use to limit possible malicious traffic leaving my exit relay?
|
|
|
|
|
|
|
|
|
tor-0009/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0010/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0010/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
Is the following the equivalent of using FascistFirewall 1 ? ReachableAddresses accept *:80 ReachableAddresses accept *:443 I ask this because it seems that FascistFirewall will someday be deprecated (like FirewallPorts is) for the more versatile and less-provocatively named ReachableAddresses .
|
|
|
|
|
|
|
|
|
tor-0010/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0011/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0011/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
Even if I put the following, it still only makes IPv4 connections to the outside world: ORPort [::]:9001 IPv6Only OutboundBindAddress [::] Bridge [ ]:9001 ClientUseIPv6 1 ClientPreferIPv6ORPort 1 I'm using tor-0.2.4.17rc. How can I fix this problem?
|
|
|
|
|
|
|
|
|
tor-0011/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0012/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0012/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
Suppose I have a Linux machine (for example Debian) with more than one public IPs, sufficient bandwidth, memory and CPU resources. How may I run more than one Tor relay instance in that single machine? Should there be different users that start every instance? How about the different torrc configuration files? Finally are there any implications from running two or more relays in a single machine ?
|
|
|
|
|
|
|
|
|
tor-0012/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0013/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0013/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
Seeing that I find the technical side of it extremely interesting, I want to try to set up a Tor hidden service. For this I am following the Torproject instructions . I installed Tor, have it running, installed a LAMP server, and then edited the /etc/tor/torrc file with the following lines: HiddenServiceDir /home/hubbtwea/hidden_service/ HiddenServicePort 80 127.0.0.1:80 Restarting tor (with sudo /etc/init.d/tor_restart ) should then create the folder /home/hubbtwea/hidden_service/ with two files in it. Restarting goes fine: * Stopping tor daemon... [ OK ] * Starting tor daemon... [ OK ] but afterwards, there is no folder created in my home dir. I then try to restart Tor again (with the same command) and then it says the following: * Stopping tor daemon... [fail] * Starting tor daemon... [ OK ] It seems to be able to start, but not to stop (I wouldn't know why), and there is still no hidden_service folder created in my home folder. Does anybody know what I could be doing wrong here?
|
|
|
|
|
|
|
|
|
tor-0013/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0014/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0014/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
Why is it still required have two open ports, DirPort and OrPort , for a relay? Imagine such a situation. A Tor user with unlimited network traffic and with that kind great bandwidth stay behind a NAT router without the ability to forward two ports, or e.g. no external IP address in the provider's VPN configuration, or public modern Wi-Fi cafe , etc... It is obvious that the anonymity of a relay operator, while browsing, is much better than the client's. This should be enabled by default for high-bandwidth connections. Why do I point out the possibility of incoming traffic to such a middle-relay? I'm just fortuitously found for myself, that the onion hidden service isn't required in any open ports. In the same way, with only one hop , not a three hops, any relay behind the NAT router would share its bandwidth with the network. That means, the bandwidth of the whole network will grow 100 times and the anonymity of such clients-middle-relays will grow! Complexity of code for this is +100 lines at maximum. Current state is: 5,000 relays vs 500,000 clients, 1 x 100. Under "Middle-relay", I mean ExitPolicy reject *:*
|
|
|
|
|
|
|
|
|
tor-0014/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0015/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0015/instruction.md
DELETED
|
@@ -1,2 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
I was editing an IT Security stack exchange question to add geolocation information to a Tor question and I noticed that one of the 10 hard coded directory authorities is ambiguous about its location: Is Faravahar of ./src/or/config.c at Line 859 hosted in Mauritius as implied by Tor whois or in Washington D.C. as implied by standard geolocation services ? This could of course just be the usual differences between the location of a NIC registrar and an actual server; but then why is Faravahar (154.35.32.5) the only hard coded node using a registrar not of the node's hosting country? I'm curious.
|
|
|
|
|
|
|
|
|
tor-0015/task.toml
DELETED
|
@@ -1,18 +0,0 @@
|
|
| 1 |
-
|
| 2 |
-
version = "1.0"
|
| 3 |
-
|
| 4 |
-
[agent]
|
| 5 |
-
timeout_sec = 900.0
|
| 6 |
-
|
| 7 |
-
[metadata]
|
| 8 |
-
author_name = "Sandboxes"
|
| 9 |
-
author_email = "sandboxes@sandboxes.com"
|
| 10 |
-
difficulty = "medium"
|
| 11 |
-
category = "sandbox"
|
| 12 |
-
tags = [
|
| 13 |
-
"sandbox",
|
| 14 |
-
]
|
| 15 |
-
|
| 16 |
-
[verifier]
|
| 17 |
-
restart_environment = false
|
| 18 |
-
timeout_sec = 720.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tor-0016/environment/Dockerfile
DELETED
|
@@ -1,5 +0,0 @@
|
|
| 1 |
-
FROM ubuntu:24.04
|
| 2 |
-
|
| 3 |
-
WORKDIR /app
|
| 4 |
-
|
| 5 |
-
RUN apt-get update && apt-get install -y python3 python3-pip && rm -rf /var/lib/apt/lists/*
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|