• It's become mail2dizum

    From Gabx@Use-Author-Supplied-Address-Header@[127.1] to alt.privacy.anon-server,alt.privacy,sci.crypt on Thu Sep 11 14:22:03 2025
    From Newsgroup: alt.privacy

    https://mail2news.virebent.art has changed its name to https://mail2dizum.virebent.art for consistency with the application name and to avoid confusion.

    Anyone using the old address will be automatically redirected to the new URL.

    Enjoy mail2dizum at https://mail2dizum.virebent.art.

    P.S.
    The onion 'smtp server' you see doesn't work.
    Use *xilb7y4kj6u6qfo45o3yk2kilfv54ffukzei3puonuqlncy7cn2afwyd.onion* on port 25 in the smtp server custom field at the bottom of the web interface specifying port number this way *.onion:25.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Thu Sep 11 16:40:17 2025
    From Newsgroup: alt.privacy

    Gabx wrote:
    https://mail2news.virebent.art has changed its name to https://mail2dizum.virebent.art for consistency with the application name and to avoid confusion.

    Anyone using the old address will be automatically redirected to the new URL.

    Enjoy mail2dizum at https://mail2dizum.virebent.art.

    P.S.
    The onion 'smtp server' you see doesn't work.
    Use *xilb7y4kj6u6qfo45o3yk2kilfv54ffukzei3puonuqlncy7cn2afwyd.onion* on port 25 in the smtp server custom field at the bottom of the web interface specifying port number this way *.onion:25.


    I have forgotten to specify to use port 4443 for all https addresses you
    see on this post.

    https://mail2dizum.virebent.art:4443

    https://mail2news.virebent.art:4443 [still working]

    Sorry again.

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@Victor@virebent.tcpreset to alt.privacy.anon-server,alt.privacy,sci.crypt on Thu Sep 11 15:03:47 2025
    From Newsgroup: alt.privacy

    I removed dkudsc3rn7r4m2gdvje6vmcnmglmt2m6whc3oazd65oyi7mvfbgfnzqd.onion.

    Now xilb7y4kj6u6qfo45o3yk2kilfv54ffukzei3puonuqlncy7cn2afwyd.onion:25 is the default onion smtp server and recompiled the mail2dizum.com code, wow !!!

    Gabx

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fred@Fred@marcon.org to alt.privacy.anon-server,alt.privacy,sci.crypt on Thu Sep 11 10:13:45 2025
    From Newsgroup: alt.privacy

    On Thu, 11 Sep 2025 14:22:03 +0000 (UTC), Gabx <Use-Author-Supplied-Address-Header@[127.1]> wrote:


    https://mail2dizum.virebent.art

    I get the following for the above site with FFx and Tor
    -----
    Secure Connection Failed

    An error occurred during a connection to mail2dizum.virebent.art.. PR_END_OF_FILE_ERROR

    Error code: PR_END_OF_FILE_ERROR

    The page you are trying to view cannot be shown because the
    authenticity of the received data could not be verified.
    Please contact the website owners to inform them of this problem.
    ----
    What ain't I understanding?
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fred@Fred@marcon.org to alt.privacy.anon-server,alt.privacy,sci.crypt on Thu Sep 11 10:16:55 2025
    From Newsgroup: alt.privacy

    On Thu, 11 Sep 2025 10:13:45 -0500, Fred@marcon.org wrote:

    On Thu, 11 Sep 2025 14:22:03 +0000 (UTC), Gabx ><Use-Author-Supplied-Address-Header@[127.1]> wrote:


    https://mail2dizum.virebent.art

    I get the following for the above site with FFx and Tor
    -----
    Secure Connection Failed

    An error occurred during a connection to mail2dizum.virebent.art.. >PR_END_OF_FILE_ERROR

    Error code: PR_END_OF_FILE_ERROR

    The page you are trying to view cannot be shown because the
    authenticity of the received data could not be verified.
    Please contact the website owners to inform them of this problem.
    ----
    What ain't I understanding?

    I should have added that the old site

    https://m2usenet.virebent.art/

    Still shows in both browsers.

    ? (Sorry if the question is an ignorant one. But I'm an ignorant non
    tech.)
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Thu Sep 11 17:24:30 2025
    From Newsgroup: alt.privacy

    Fred@marcon.org wrote:
    On Thu, 11 Sep 2025 14:22:03 +0000 (UTC), Gabx <Use-Author-Supplied-Address-Header@[127.1]> wrote:


    https://mail2dizum.virebent.art

    I get the following for the above site with FFx and Tor
    -----
    Secure Connection Failed

    An error occurred during a connection to mail2dizum.virebent.art.. PR_END_OF_FILE_ERROR

    Error code: PR_END_OF_FILE_ERROR

    The page you are trying to view cannot be shown because the
    authenticity of the received data could not be verified.
    Please contact the website owners to inform them of this problem.
    ----
    What ain't I understanding?


    Hi,
    as i specified in the reply to my own post i have missed to specify port number 4443.
    The actual address is https://mail2dizum.virebent.art:4443
    mail2dizum uses letsencrypt ca.
    Certificates are verified for chrome, brave, firefox, mulvad, torbrowser browsers.

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Thu Sep 11 17:27:13 2025
    From Newsgroup: alt.privacy

    Fred@marcon.org wrote:
    I should have added that the old site

    https://m2usenet.virebent.art/

    Still shows in both browsers.

    ? (Sorry if the question is an ignorant one. But I'm an ignorant non
    tech.)


    You are totaly wrong.
    Read all my posts, please!

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202509.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.privacy,sci.crypt on Thu Sep 11 18:47:25 2025
    From Newsgroup: alt.privacy

    https://mail2news.virebent.art has changed its name to https://mail2dizum.virebent.art
    for consistency with the application name and to avoid confusion.


    Still can't be accessed with TOR browser, message as follows...

    Warning: Potential Security Risk Ahead

    Tor Browser detected a potential security threat and did not continue to mail2dizum.virebent.art. If you visit this site, attackers could try to steal information like your passwords, emails, or credit card details.

    What can you do about it?

    The issue is most likely with the website, and there is nothing you can do to resolve it.

    If you are on a corporate network or using antivirus software, you can reach out to the support teams for assistance. You can also notify the websiterCOs administrator about the problem.

    Someone could be trying to impersonate the site and you should not continue.

    Websites prove their identity via certificates. Tor Browser does not trust mail2dizum.virebent.art:4443 because its certificate issuer is unknown, the certificate is self-signed, or the server is not sending the correct intermediate certificates.

    Error code: SEC_ERROR_UNKNOWN_ISSUER

    Past this in your TOR browser...

    about:certificate?cert=MIIEEjCCA5egAwIBAgIRAN2b%2B8tkoO5Ct4Y26tPwOcgwCgYIKoZIzj0EAwMwSzELMAkGA1UEBhMCQVQxEDAOBgNVBAoTB1plcm9TU0wxKjAoBgNVBAMTIVplcm9TU0wgRUNDIERvbWFpbiBTZWN1cmUgU2l0ZSBDQTAeFw0yNTA5MTEwMDAwMDBaFw0yNTEyMTAyMzU5NTlaMCIxIDAeBgNVBAMTF21haWwyZGl6dW0udmlyZWJlbnQuYXJ0MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEaMVRO%2FzG30Mf7cgqmwDqT5WgpogLl5vWXeJipjY32MbUdhP6EyG1J7AZY92fWzfGGwW0Ck1iP7EAmE5rKFGJH6OCAoMwggJ%2FMB8GA1UdIwQYMBaAFA9r5kvOOUeu9n6QHnnwMJGSyF%2BjMB0GA1UdDgQWBBRYWTtj3eg3drcO2zWgobbFryyeLTAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH%2FBAIwADAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwSQYDVR0gBEIwQDA0BgsrBgEEAbIxAQICTjAlMCMGCCsGAQUFBwIBFhdodHRwczovL3NlY3RpZ28uY29tL0NQUzAIBgZngQwBAgEwgYgGCCsGAQUFBwEBBHwwejBLBggrBgEFBQcwAoY%2FaHR0cDovL3plcm9zc2wuY3J0LnNlY3RpZ28uY29tL1plcm9TU0xFQ0NEb21haW5TZWN1cmVTaXRlQ0EuY3J0MCsGCCsGAQUFBzABhh9odHRwOi8vemVyb3NzbC5vY3NwLnNlY3RpZ28uY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHYA3dzKNJXX4RYF55Uy%2Bsef%2BD0cUN%2FbADoUEnYKLKy7yCoAAAGZOQ8qfAAABAMARzBFAiEA4ZejPwt02RCSQo3Bv9z6I4jcnqGDl48aWDia5XgMztsCICNirmGdh9odRcbhogpZ9cqR7DgRs6TsG4sj99Is1KT2AHYADeHyMCvTDcFAYhIJ6lUu%2FEd0fLHX6TDvDkIetH5OqjQAAAGZOQ8qngAABAMARzBFAiAIAyHAWMzX23V5OzhYdx7RNoYTiWIHeo6PYWRaNeqj4wIhAL9p3h9WofU9H%2FiZM3%2F31TKNwCIDpoXKD1mnNne7%2BjzmMCIGA1UdEQQbMBmCF21haWwyZGl6dW0udmlyZWJlbnQuYXJ0MAoGCCqGSM49BAMDA2kAMGYCMQCfORz0jxAhcqgNL4k6klvjOWCrK8b%2B0Hnc%2BV71tiLt1LjTS9exvJhabReQr%2F8jhqUCMQDc1Ogdo2LlAEpbEd7PooK%2B%2FoZ9aTCbnV9yJ9xoC5gu8YpUSJ%2BBdVqzYdZTijfUsdQ%3D


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn3 Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Thu Sep 11 21:35:27 2025
    From Newsgroup: alt.privacy

    In article <20250911142203.D80443E631@mail.tcpreset.net> Gabx wrote:

    https://mail2news.virebent.art has changed its name to https://mail2dizum.virebent.art for consistency with the application name and to avoid confusion.

    Anyone using the old address will be automatically redirected to the new URL.

    Enjoy mail2dizum at https://mail2dizum.virebent.art.

    I'm sure Alex de Joode gave you explicit permission to use his
    "dizum" term in your address. Or did you illegally hijack it
    to attract attention and mislead potential users?

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy,alt.privacy.anon-server,sci.crypt on Thu Sep 11 22:53:33 2025
    From Newsgroup: alt.privacy

    Yamn3 Remailer wrote:
    In article <20250911142203.D80443E631@mail.tcpreset.net> Gabx wrote:

    https://mail2news.virebent.art has changed its name to https://mail2dizum.virebent.art for consistency with the application name and to avoid confusion.

    Anyone using the old address will be automatically redirected to the new URL.

    Enjoy mail2dizum at https://mail2dizum.virebent.art.

    I'm sure Alex de Joode gave you explicit permission to use his
    "dizum" term in your address. Or did you illegally hijack it
    to attract attention and mislead potential users?


    Why should Alex care about permission? It is more like giving
    a honor to Alex, because Gab's web service uses Dizum and acts
    therefore as a proxy.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Thu Sep 11 23:51:35 2025
    From Newsgroup: alt.privacy

    Yamn3 Remailer wrote:
    I'm sure Alex de Joode gave you explicit permission to use his
    "dizum" term in your address. Or did you illegally hijack it
    to attract attention and mislead potential users?

    i have a cat i called dizum as well !
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Victor@gabx@virebent.tcpreset to mail2news on Fri Sep 12 10:16:11 2025
    From Newsgroup: alt.privacy

    Let me clarify the situation to avoid any misunderstandings.
    First, my software has been called "mail2dizum" on GitHub from the beginning, this isn't a recent name change to capitalize on Alex's work.
    The web interface name change simply brings it in line with the actual software name for consistency.

    Second, and most importantly, mail2dizum is not a competing mail2news service. It's specifically a proxy/wrapper that interfaces with Alex de Joode's dizum service.

    It doesn't operate independently, it relies entirely on Alex's infrastructure. This is why the name "mail2news" was actually misleading, as it suggested an autonomous service when it's really a frontend to dizum.

    Alex de Joode has been properly credited from day one.

    On the main page of mail2dizum.virebent.art, there's a direct link to dizum.com/Alex's blog, acknowledging his work and the underlying service that makes mail2dizum possible.

    The name change reflects the technical reality: this is a tool that specifically works with dizum, not a generic mail2news gateway.

    Rather than trying to mislead users, the new name is more accurate about what the service actually does, it proxies requests to Alex's dizum service.

    I hope this clarifies any confusion about the intent behind the name change.

    Gabx

    --- Digital Signature --- ghN+lSAxhFHUFoB0O8Gc9NLJRxp1SeM3qm/W5Ye6RODpZwWPOY+wAUCsTbvfia+/bsJrVCIW4SU14AH5JA+3Dw==


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Fri Sep 12 14:11:35 2025
    From Newsgroup: alt.privacy

    Victor <gabx@virebent.tcpreset> wrote:
    It doesn't operate independently, it relies entirely on Alex's infrastructure. and primarily the Tor network.
    This is why the name "mail2news" was actually misleading, as it suggested an autonomous service when it's really a frontend to dizum.
    mail2dizum is ambiguous, as it may also mean the dizum remailer.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Fri Sep 12 15:43:21 2025
    From Newsgroup: alt.privacy

    Yamn Remailer wrote:
    mail2dizum is ambiguous, as it may also mean the dizum remailer.

    If you say so ....
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 15:47:58 2025
    From Newsgroup: alt.privacy

    Gabx wrote:
    https://mail2news.virebent.art has changed its name to https://mail2dizum.virebent.art for consistency with the application name and to avoid confusion.

    Anyone using the old address will be automatically redirected to the new URL.

    Enjoy mail2dizum at https://mail2dizum.virebent.art.

    P.S.
    The onion 'smtp server' you see doesn't work.
    Use *xilb7y4kj6u6qfo45o3yk2kilfv54ffukzei3puonuqlncy7cn2afwyd.onion* on port 25 in the smtp server custom field at the bottom of the web interface specifying port number this way *.onion:25.

    Let someone criticize me for something sensible.

    I'm no longer responding to bullshit comments, especially on this last
    topic.

    I won't feed you with explanations on useless topics like this one and
    the others to come, because the factory of those who hate without
    question is always in production.

    Fuck you!
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 15:53:53 2025
    From Newsgroup: alt.privacy

    Gabx wrote:
    Gabx wrote:
    https://mail2news.virebent.art has changed its name to
    https://mail2dizum.virebent.art for consistency with the application
    name and to avoid confusion.

    Anyone using the old address will be automatically redirected to the
    new URL.

    Enjoy mail2dizum at https://mail2dizum.virebent.art.

    P.S.
    The onion 'smtp server' you see doesn't work.
    Use *xilb7y4kj6u6qfo45o3yk2kilfv54ffukzei3puonuqlncy7cn2afwyd.onion*
    on port 25 in the smtp server custom field at the bottom of the web
    interface specifying port number this way *.onion:25.

    Let someone criticize me for something sensible.

    I'm no longer responding to bullshit comments, especially on this last topic.

    I won't feed you with explanations on useless topics like this one and
    the others to come, because the factory of those who hate without
    question is always in production.

    Fuck you!

    I'm not a closed-minded person, nor am I a sociopath.
    I enjoy answering questions, suggestions, and criticisms.

    I don't like talking to people who don't really want to listen but
    simply want to smear my work.

    I don't like talking to people who criticize without knowing what's
    going on.

    I don't like talking to people who can't do anything with their lives
    other than criticize those who work hard and put themselves out there.

    That said, I repeat my *fuck you*

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Soul Patch@soul.patch@127.0.0.1 to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 15:00:33 2025
    From Newsgroup: alt.privacy

    On Fri, 12 Sep 2025 15:53:53 +0200
    Gabx <info@tcpreset.invalid> wrote:

    I don't like talking to people who can't do anything with their lives
    other than criticize those who work hard and put themselves out there.

    This seems to be the main purpose of the Internet ;) If you are trying to accomplish something or build something the troll zombies are there to bust your kneecaps and kick you while you're down.

    Anyway, I'm trying to figure out the best way to run INN news server totally hidden behind TOR so it can be peered behind TOR encrypted tunnels and hidden services. I'm researching and tinkering to lower the amount of friction for doing such a complicated task. Then I would like to create a script wizard that automatically installs and configures on Debian.

    news.software.nntp
    Message-ID: <109teo9$139dq$1@paganini.bofh.team>

    If you or anyone else has ideas please chime in.
    --
    Soul Patch

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 22:50:17 2025
    From Newsgroup: alt.privacy

    Soul Patch wrote:
    On Fri, 12 Sep 2025 15:53:53 +0200
    Gabx <info@tcpreset.invalid> wrote:

    I don't like talking to people who can't do anything with their lives
    other than criticize those who work hard and put themselves out there.

    This seems to be the main purpose of the Internet ;) If you are trying to accomplish something or build something the troll zombies are there to bust your kneecaps and kick you while you're down.

    The important thing is to stay focused on your goals.

    I feel technically vulnerable, always.
    I have to stay humble and learn, that's my philosophy.

    I also think we can learn from trolls.
    I'm also for always replying to every post, everyone deserves
    communication.

    But I'm not here on this planet to be an example.

    It's nice to argue the point of saying "fuck you" to certain idiots.

    Anyway, I'm trying to figure out the best way to run INN news server totally hidden behind TOR so it can be peered behind TOR encrypted tunnels and hidden services.
    If I understand correctly, you don't just want your server to be
    reachable by onion address from Usenet clients, but you want it also accessible to peers using its onion address.

    That seems impossible to me, actually.
    Unless your peers are using Tor themselves.

    Something like this i think:

    torsocks innfeed

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Mike Easter@MikeE@ster.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 13:57:05 2025
    From Newsgroup: alt.privacy

    Gabx wrote:
    I also think we can learn from trolls.

    Yes; but barely/scarcely.

    I'm also for always replying to every post, everyone deserves
    communication.

    I don't think so.
    --
    Mike Easter
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 22:58:30 2025
    From Newsgroup: alt.privacy

    Gabx wrote:
    Soul Patch wrote:
    Anyway, I'm trying to figure out the best way to run INN news server
    totally hidden behind TOR so it can be peered behind TOR encrypted
    tunnels and hidden services.
    If I understand correctly, you don't just want your server to be
    reachable by onion address from Usenet clients, but you want it also accessible to peers using its onion address.

    That seems impossible to me, actually.
    Unless your peers are using Tor themselves.

    Something like this i think:

    torsocks innfeed

    I'll venture a guess.
    Try using socat to redirect all incoming connections through the onion address, like this:

    socat TCP4-LISTEN:9119,fork SOCKS4:127.0.0.1:abc123def456.onion:119,socksport=9050

    Just an idea, I expect to be insulted, lol!!!

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 23:02:04 2025
    From Newsgroup: alt.privacy

    Mike Easter wrote:
    Gabx wrote:
    I also think we can learn from trolls.

    Yes; but barely/scarcely.

    You learn what not to do, ever.

    I'm also for always replying to every post, everyone deserves
    communication.

    I don't think so.

    In theory, I'd like that, that's it!

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Sat Sep 13 00:23:25 2025
    From Newsgroup: alt.privacy

    I recently adopted acme.sh, which by default used zerossl certificates,
    a CA not recognized by all browsers.

    I have set letsencrypt as the default CA for acme.sh, and the problem
    was solved.

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From nob...@"nob..."@yamn.paranoici.org to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 23:14:28 2025
    From Newsgroup: alt.privacy

    I have set letsencrypt as the default CA for acme.sh,
    and the problem was solved.

    Well done Gabx! Everybody happy?

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Soul Patch@soul.patch@127.0.0.1 to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 21:20:30 2025
    From Newsgroup: alt.privacy

    On Fri, 12 Sep 2025 22:50:17 +0200
    Gabx <info@tcpreset.invalid> wrote:

    Soul Patch wrote:
    On Fri, 12 Sep 2025 15:53:53 +0200
    Gabx <info@tcpreset.invalid> wrote:

    I don't like talking to people who can't do anything with their lives
    other than criticize those who work hard and put themselves out there.

    This seems to be the main purpose of the Internet ;) If you are trying to accomplish something or build something the troll zombies are there to bust your kneecaps and kick you while you're down.

    The important thing is to stay focused on your goals.

    No argument there. Grab on like a bulldog that won't let go.

    I feel technically vulnerable, always.
    I have to stay humble and learn, that's my philosophy.

    I also think we can learn from trolls.
    I'm also for always replying to every post, everyone deserves
    communication.

    Until they don't.

    But I'm not here on this planet to be an example.

    It's nice to argue the point of saying "fuck you" to certain idiots.

    I prefer to kill them with kindness. If that doesn't work I use killfile filters.

    Anyway, I'm trying to figure out the best way to run INN news server totally hidden behind TOR so it can be peered behind TOR encrypted tunnels and hidden services.
    If I understand correctly, you don't just want your server to be
    reachable by onion address from Usenet clients, but you want it also accessible to peers using its onion address.

    Yes, it must be 100% TOR addressable only with no clearnet connections.

    That seems impossible to me, actually.
    Unless your peers are using Tor themselves.

    It does seem impossible but it is just really hard and convoluted. I've done routing like this long ago in the past with other networked programs. And you are right that the other peers must also use TOR. That is the point--a NNTP network with all peers hidden behind TOR and no clearnet exits (ideally).

    Something like this i think:

    torsocks innfeed

    Torsocks is insecure and can leak data. It only uses ENV variables which can be disregarded by bad software and scripts, especially anything that is statically compiled. Onionix is better, but does serve the bidirectional port path problem, and doesn't live in Debian repositories which is a deal-breaker since it would force users to be programmers and compile stuff, the very kind of thing I want to avoid. I'm trying to lower the bar to entry rather than raise it.
    --
    Soul Patch

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Soul Patch@soul.patch@127.0.0.1 to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 21:17:33 2025
    From Newsgroup: alt.privacy

    On Fri, 12 Sep 2025 22:58:30 +0200
    Gabx <info@tcpreset.invalid> wrote:

    Gabx wrote:
    Soul Patch wrote:
    Anyway, I'm trying to figure out the best way to run INN news server
    totally hidden behind TOR so it can be peered behind TOR encrypted
    tunnels and hidden services.
    If I understand correctly, you don't just want your server to be
    reachable by onion address from Usenet clients, but you want it also accessible to peers using its onion address.

    That seems impossible to me, actually.
    Unless your peers are using Tor themselves.

    Something like this i think:

    torsocks innfeed

    I'll venture a guess.
    Try using socat to redirect all incoming connections through the onion address, like this:

    socat TCP4-LISTEN:9119,fork SOCKS4:127.0.0.1:abc123def456.onion:119,socksport=9050

    Just an idea, I expect to be insulted, lol!!!

    I like it. Nothing to insult here. It's actually a clever angle.

    I though about routing through a pair of TOR hidden services, using one as an outbound and the other as a loopback target. This would significantly slow things down, but really, it's not like there are going to be tens of thousands of people beating down the door to post.

    Another though I have is that all peers can set up authenticated loopback proxies for their other peers. This would target hybrid clearnet and TOR peering and cut half the onion network latency. But it is also an extra point of failure.
    --
    Soul Patch

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Soul Patch@soul.patch@127.0.0.1 to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Sep 12 21:57:44 2025
    From Newsgroup: alt.privacy

    On Fri, 12 Sep 2025 21:17:33 -0500
    Soul Patch <soul.patch@127.0.0.1> wrote:

    On Fri, 12 Sep 2025 22:58:30 +0200
    Gabx <info@tcpreset.invalid> wrote:

    Gabx wrote:
    Soul Patch wrote:
    Anyway, I'm trying to figure out the best way to run INN news server
    totally hidden behind TOR so it can be peered behind TOR encrypted
    tunnels and hidden services.
    If I understand correctly, you don't just want your server to be reachable by onion address from Usenet clients, but you want it also accessible to peers using its onion address.

    That seems impossible to me, actually.
    Unless your peers are using Tor themselves.

    Something like this i think:

    torsocks innfeed

    I'll venture a guess.
    Try using socat to redirect all incoming connections through the onion address, like this:

    socat TCP4-LISTEN:9119,fork SOCKS4:127.0.0.1:abc123def456.onion:119,socksport=9050

    Just an idea, I expect to be insulted, lol!!!

    I like it. Nothing to insult here. It's actually a clever angle.

    I though about routing through a pair of TOR hidden services, using one as an outbound and the other as a loopback target. This would significantly slow things down, but really, it's not like there are going to be tens of thousands of people beating down the door to post.

    Another though I have is that all peers can set up authenticated loopback proxies for their other peers. This would target hybrid clearnet and TOR peering and cut half the onion network latency. But it is also an extra point of failure.

    --
    Soul Patch


    So far it seems it might be possible to create a separate onion address for each incoming peer, then use named pipes with netcat for bidirectional exchange on the same loopback IP.

    Probably simpler is the bind=${IP} parameter in SOCAT with a IP-based netfilter. The same port can be used on different localhost IP addresses, allowing bidirectional forking based upon which IP/port pair the traffic enters. So if traffic is coming in on IP_A it can be forwarded to INN on IP_B. And if traffic is leaving INN on IP_B it can be routed to the socks proxy by netfilter.
    --
    Soul Patch

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Billy G.@contact-5c2e-000@pugleaf.net to alt.privacy.anon-server,alt.privacy,sci.crypt on Sat Sep 13 10:48:15 2025
    From Newsgroup: alt.privacy

    On 13.09.25 03:20, Soul Patch wrote:
    Torsocks is insecure and can leak data. It only uses ENV variables which can be disregarded by bad software and scripts, especially anything that is statically compiled.


    is INN(feed) statically compiled? I'd think: no.
    review calls in INN codebase and see what's in use...
    or jump to mid of the message here and try the idea.

    explain the magic how tsocks or proxychains work .

    Excellent question! Yes, tsocks and proxychains do work somewhat
    "magically" by intercepting network calls at the system level.

    Here's how they accomplish this:

    ## **The Magic: LD_PRELOAD and Function Interception**

    Both tools use a technique called **library preloading** via the
    `LD_PRELOAD` environment variable:

    ```bash
    # What proxychains actually does internally:
    LD_PRELOAD=./libproxychains.so.3 innfeed

    # What tsocks does:
    LD_PRELOAD=/usr/lib/libtsocks.so innfeed
    ```

    ## **How Function Interception Works**

    1. **Normal application flow:**
    ```c
    // Application calls standard socket functions
    int socket_fd = socket(AF_INET, SOCK_STREAM, 0);
    connect(socket_fd, &server_addr, sizeof(server_addr)); // Direct connection ```

    2. **With proxychains/tsocks:**
    ```c
    // The preloaded library intercepts the connect() call
    int connect(int sockfd, const struct sockaddr *addr, socklen_t addrlen) {
    // This is now the proxychains/tsocks version, not the system one!

    // Extract destination from original connect() call
    char *dest_ip = inet_ntoa(((struct sockaddr_in*)addr)->sin_addr);
    int dest_port = ntohs(((struct sockaddr_in*)addr)->sin_port);

    // Instead of connecting directly, connect to SOCKS proxy
    struct sockaddr_in proxy_addr;
    proxy_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); // Proxy IP
    proxy_addr.sin_port = htons(9050); // Proxy port

    // Connect to proxy instead
    int result = real_connect(sockfd, (struct sockaddr*)&proxy_addr, sizeof(proxy_addr));

    // Send SOCKS handshake to proxy with real destination
    socks5_handshake(sockfd, dest_ip, dest_port);

    return result; // App thinks it connected directly!
    }
    ```

    ## **Step-by-step Process**

    1. **Library Loading**: When you run `proxychains innfeed`, the system
    loads the proxychains library before any other libraries
    2. **Symbol Interception**: The library provides its own versions of
    network functions like `connect()`, `bind()`, `gethostbyname()`
    3. **Transparent Redirection**: When innfeed calls
    `connect("news.server.com", 119)`, it actually gets the proxychains version
    4. **SOCKS Protocol**: The intercepted function connects to the SOCKS
    proxy and tells it to connect to the real destination
    5. **Data Tunneling**: All subsequent data flows through the proxy tunnel

    ## **What Gets Intercepted**

    ```c
    // Common functions that get replaced:
    connect() // TCP connections
    bind() // Sometimes for local binding
    gethostbyname() // DNS lookups (can be redirected too)
    getaddrinfo() // Modern DNS lookups
    send()/recv() // Sometimes for additional processing
    ```

    ## **Why It Works**

    - **Dynamic Linking**: Most applications use dynamic linking, so
    function calls go through the dynamic linker
    - **LD_PRELOAD Priority**: Libraries in LD_PRELOAD are checked first for symbols
    - **Same Function Signatures**: The replacement functions have identical signatures to the originals
    - **Application Ignorance**: The application never knows its calls are
    being intercepted

    ## **Limitations**

    ```bash
    # Won't work with:
    - Statically linked binaries (no dynamic linking)
    - Applications that bypass standard socket calls
    - Programs that use raw sockets
    - Applications with security restrictions on LD_PRELOAD
    ```

    ## **You Can See It in Action**

    ```bash
    # See what functions are being intercepted
    strace -e trace=connect proxychains curl http://example.com

    # You'll see the connect() going to 127.0.0.1:9050 instead of example.com:80 ```

    So yes, it's "magic" in that the application has no idea its network
    calls are being rerouted, but it's accomplished through well-established
    Unix mechanisms for library interposition!

    the idea?

    innfeed is started in INN2. Looking at your `/etc/news/newsfeeds` entry:

    ```
    # innfeed funnel master.
    innfeed!\
    :!*\
    :Tc,Wnm*:/usr/lib/news/bin/innfeed
    ```

    This is the **funnel master** entry that tells `innd` how to start
    innfeed. The key part is:
    - `Tc,Wnm*` - flags for the feed type
    - `:/usr/lib/news/bin/innfeed` - the actual command to execute

    ## To add proxy support via proxychains:

    You'd modify this line to:

    ```
    # innfeed funnel master with proxy support
    innfeed!\
    :!*\
    :Tc,Wnm*:/usr/bin/proxychains /usr/lib/news/bin/innfeed
    ```

    ## Or with environment variables:

    ```
    # innfeed funnel master with proxy via env vars
    innfeed!\
    :!*\
    :Tc,Wnm*:/bin/sh -c "LD_PRELOAD=/usr/lib/libproxychains.so.4 /usr/lib/news/bin/innfeed"
    ```

    ## Alternative approach - wrapper script:

    Create `/usr/local/bin/innfeed-proxy`:
    ```bash
    #!/bin/bash
    exec proxychains /usr/lib/news/bin/innfeed "$@"
    ```

    Then modify newsfeeds:
    ```
    innfeed!\
    :!*\
    :Tc,Wnm*:/usr/local/bin/innfeed-proxy
    ```

    After modifying `/etc/news/newsfeeds`, you need to:
    1. Run `ctlinnd reload newsfeeds 'Added proxy support'`
    2. Or restart innd

    This way, every time innd spawns innfeed, it will automatically go
    through your proxy configuration.
    --
    .......
    Billy G. (go-while)
    https://pugleaf.net
    @Newsgroup: rocksolid.nodes.help
    irc.pugleaf.net:6697 (SSL) #lounge
    discord: https://discord.gg/rh2tGMJWwV
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Soul Patch@soul.patch@127.0.0.1 to alt.privacy.anon-server,alt.privacy,sci.crypt on Sat Sep 13 18:49:48 2025
    From Newsgroup: alt.privacy

    On Sat, 13 Sep 2025 10:48:15 +0100
    "Billy G." <contact-5c2e-000@pugleaf.net> wrote:
    On 13.09.25 03:20, Soul Patch wrote:
    Torsocks is insecure and can leak data. It only uses ENV variables which can be disregarded by bad software and scripts, especially anything that is statically compiled.


    is INN(feed) statically compiled? I'd think: no.
    review calls in INN codebase and see what's in use...
    or jump to mid of the message here and try the idea.

    explain the magic how tsocks or proxychains work .

    Excellent question! Yes, tsocks and proxychains do work somewhat
    "magically" by intercepting network calls at the system level.

    Here's how they accomplish this:

    ## **The Magic: LD_PRELOAD and Function Interception**

    Both tools use a technique called **library preloading** via the
    `LD_PRELOAD` environment variable:

    ```bash
    # What proxychains actually does internally:
    LD_PRELOAD=./libproxychains.so.3 innfeed

    # What tsocks does:
    LD_PRELOAD=/usr/lib/libtsocks.so innfeed
    ```

    ## **How Function Interception Works**

    1. **Normal application flow:**
    ```c
    // Application calls standard socket functions
    int socket_fd = socket(AF_INET, SOCK_STREAM, 0);
    connect(socket_fd, &server_addr, sizeof(server_addr)); // Direct connection ```

    2. **With proxychains/tsocks:**
    ```c
    // The preloaded library intercepts the connect() call
    int connect(int sockfd, const struct sockaddr *addr, socklen_t addrlen) {
    // This is now the proxychains/tsocks version, not the system one!

    // Extract destination from original connect() call
    char *dest_ip = inet_ntoa(((struct sockaddr_in*)addr)->sin_addr);
    int dest_port = ntohs(((struct sockaddr_in*)addr)->sin_port);

    // Instead of connecting directly, connect to SOCKS proxy
    struct sockaddr_in proxy_addr;
    proxy_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); // Proxy IP
    proxy_addr.sin_port = htons(9050); // Proxy port

    // Connect to proxy instead
    int result = real_connect(sockfd, (struct sockaddr*)&proxy_addr, sizeof(proxy_addr));

    // Send SOCKS handshake to proxy with real destination
    socks5_handshake(sockfd, dest_ip, dest_port);

    return result; // App thinks it connected directly!
    }
    ```

    ## **Step-by-step Process**

    1. **Library Loading**: When you run `proxychains innfeed`, the system
    loads the proxychains library before any other libraries
    2. **Symbol Interception**: The library provides its own versions of
    network functions like `connect()`, `bind()`, `gethostbyname()`
    3. **Transparent Redirection**: When innfeed calls `connect("news.server.com", 119)`, it actually gets the proxychains version 4. **SOCKS Protocol**: The intercepted function connects to the SOCKS
    proxy and tells it to connect to the real destination
    5. **Data Tunneling**: All subsequent data flows through the proxy tunnel

    ## **What Gets Intercepted**

    ```c
    // Common functions that get replaced:
    connect() // TCP connections
    bind() // Sometimes for local binding
    gethostbyname() // DNS lookups (can be redirected too)
    getaddrinfo() // Modern DNS lookups
    send()/recv() // Sometimes for additional processing
    ```

    ## **Why It Works**

    - **Dynamic Linking**: Most applications use dynamic linking, so
    function calls go through the dynamic linker
    - **LD_PRELOAD Priority**: Libraries in LD_PRELOAD are checked first for symbols
    - **Same Function Signatures**: The replacement functions have identical signatures to the originals
    - **Application Ignorance**: The application never knows its calls are
    being intercepted

    ## **Limitations**

    ```bash
    # Won't work with:
    - Statically linked binaries (no dynamic linking)
    - Applications that bypass standard socket calls
    - Programs that use raw sockets
    - Applications with security restrictions on LD_PRELOAD
    ```

    ## **You Can See It in Action**

    ```bash
    # See what functions are being intercepted
    strace -e trace=connect proxychains curl http://example.com

    # You'll see the connect() going to 127.0.0.1:9050 instead of example.com:80 ```

    So yes, it's "magic" in that the application has no idea its network
    calls are being rerouted, but it's accomplished through well-established
    Unix mechanisms for library interposition!

    the idea?

    innfeed is started in INN2. Looking at your `/etc/news/newsfeeds` entry:

    ```
    # innfeed funnel master.
    innfeed!\
    :!*\
    :Tc,Wnm*:/usr/lib/news/bin/innfeed
    ```

    This is the **funnel master** entry that tells `innd` how to start
    innfeed. The key part is:
    - `Tc,Wnm*` - flags for the feed type
    - `:/usr/lib/news/bin/innfeed` - the actual command to execute

    ## To add proxy support via proxychains:

    You'd modify this line to:

    ```
    # innfeed funnel master with proxy support
    innfeed!\
    :!*\
    :Tc,Wnm*:/usr/bin/proxychains /usr/lib/news/bin/innfeed
    ```

    ## Or with environment variables:

    ```
    # innfeed funnel master with proxy via env vars
    innfeed!\
    :!*\
    :Tc,Wnm*:/bin/sh -c "LD_PRELOAD=/usr/lib/libproxychains.so.4 /usr/lib/news/bin/innfeed"
    ```

    ## Alternative approach - wrapper script:

    Create `/usr/local/bin/innfeed-proxy`:
    ```bash
    #!/bin/bash
    exec proxychains /usr/lib/news/bin/innfeed "$@"
    ```

    Then modify newsfeeds:
    ```
    innfeed!\
    :!*\
    :Tc,Wnm*:/usr/local/bin/innfeed-proxy
    ```

    After modifying `/etc/news/newsfeeds`, you need to:
    1. Run `ctlinnd reload newsfeeds 'Added proxy support'`
    2. Or restart innd

    This way, every time innd spawns innfeed, it will automatically go
    through your proxy configuration.



    --
    .......
    Billy G. (go-while)
    https://pugleaf.net
    @Newsgroup: rocksolid.nodes.help
    irc.pugleaf.net:6697 (SSL) #lounge
    discord: https://discord.gg/rh2tGMJWwV
    Excellent. No dinking around with fragile NAT and netfilter rules, greatly lowering the entry bar to up and running. This is probably the simplest possible solution.
    FYI there is a highly secure alternative to torsocks and proxychains called oniux.
    "Introducing oniux: Kernel-level Tor isolation for any Linux app" https://blog.torproject.org/introducing-oniux-tor-isolation-using-linux-namespaces/
    This uses Linux namespaces to prohibit tunnel leaks.
    Another option is to use the netfiltering and netname options of firejail.
    From this thread I have learned that we can run a network of INN2 peers completely isolated behind onion services. Now it is time for the mad scientists to get to work generating a golem. Let's create a network Frankenstein!
    --
    Soul Patch
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Mon Sep 15 01:08:27 2025
    From Newsgroup: alt.privacy

    Soul Patch wrote:
    "Introducing oniux: Kernel-level Tor isolation for any Linux app"

    https://blog.torproject.org/introducing-oniux-tor-isolation-using-linux-namespaces/

    This uses Linux namespaces to prohibit tunnel leaks.

    I quote !
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2