Skip to main content


 
My offsite #backup can now be placed any place with internet access and can be reached as long as Tor works for maintenance and for backup without Tor as long as at least IPv4 or IPv6 works outbound.
Also a great use for #Tor.
This is one of the best use-cases for hidden services. I use the same technique for many of my own services. It's great that I don't have to worry about setting up all sorts of weird port-forwarding rules in my firewall to be able to access my stuff on the inside. I just keep a list of .onion URLs in my password manager for the stuff I need to be able to get hold of.

Exactly right, I do it similar, easy to use and quickly setup.

details? 😀

echo "deb http://deb.torproject.org/torproject.org stretch main"|sudo tee /etc/apt/sources.list.d/tor.list
sudo apt-get update
sudo apt-get install dirmngr
sudo gpg --keyserver keyserver.ubuntu.com --recv A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89
sudo gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
sudo apt-get install tor tor-arm gpgv2 deb.torproject.org-keyring

echo 'SOCKSPort 9050
RunAsDaemon 1
ControlPort 9051
ExitPolicy reject *:* # no exits allowed
HiddenServiceDir /var/lib/tor/sshd/
HiddenServicePort 22 127.0.0.1:22
CookieAuthentication 1'|sudo tee /etc/tor/torrc

sudo systemctl enable tor --now




If you want to be able to run "arm" with your user then run "sudo usermod -a -G debian-tor $your_user".

sudo cat /var/lib/tor/sshd/hostname will output the .onion of the device.

"ssh $your_user@xyz.onion will open a ssh connection even if the computer is behind a firewall (as long as tor found some way t... Show more...

I saw I should include some line breaks....


echo "deb http://deb.torproject.org/torproject.org stretch main"|sudo tee /etc/apt/sources.list.d/tor.list

sudo apt-get update

sudo apt-get install dirmngr

sudo gpg --keyserver keyserver.ubuntu.com --recv A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89

sudo gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -

sudo apt-get install tor tor-arm gpgv2 deb.torproject.org-keyring

echo 'SOCKSPort 9050
RunAsDaemon 1
ControlPort 9051
ExitPolicy reject *:* # no exits allowed
HiddenServiceDir /var/lib/tor/sshd/
HiddenServicePort 22 127.0.0.1:22
CookieAuthentication 1'|sudo tee /etc/tor/torrc

sudo systemctl enable tor --now



*each line contains a new command*

If you want to be able to run "arm" with your user then run "sudo usermod -a -G debian-tor $your_user".

sudo cat /var/lib/tor/sshd/hostname will output the .onion of the device.

"ssh $your_use... Show more...

Thank you very much!
I will give it a try this weekend! 😀