Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 27 |
Nodes: | 6 (0 / 6) |
Uptime: | 46:12:28 |
Calls: | 632 |
Calls today: | 3 |
Files: | 1,187 |
D/L today: |
24 files (29,813K bytes) |
Messages: | 176,482 |
I know how to configure TOR and INN behind a hidden service address.
What I don't know is how to prevent DNS host/IP leakage from INN.
Do any INN component(s) bypass inn.conf to report the actual IP and hostname from DNS or /etc/hosts?
If there is any IP or hostname leakage how might I configure to prevent this?
On 11.09.25 04:14, Soul Patch wrote:
I know how to configure TOR and INN behind a hidden service address.
What I don't know is how to prevent DNS host/IP leakage from INN.
Do any INN component(s) bypass inn.conf to report the actual IP and hostname from DNS or /etc/hosts?
If there is any IP or hostname leakage how might I configure to prevent this?
What is IP or hostname leakage? To whom should it leak to?
INN needs connections from/to other peers via ip or dns.
You most likely will not find anyone here peering via TOR.
You can connect readers via TOR and that's it.
I know how to configure TOR and INN behind a hidden service address.
What I don't know is how to prevent DNS host/IP leakage from INN.
Do any INN component(s) bypass inn.conf to report the actual IP and hostname from DNS or /etc/hosts?
If there is any IP or hostname leakage how might I configure to prevent this?
On Wed, 10 Sep 2025 22:14:51 -0500
Soul Patch <soul.patch@127.0.0.1> wrote:
I know how to configure TOR and INN behind a hidden service address.
What I don't know is how to prevent DNS host/IP leakage from INN.
Do any INN component(s) bypass inn.conf to report the actual IP and hostname from DNS or /etc/hosts?
If there is any IP or hostname leakage how might I configure to prevent this?
If I configure shell proxy variables in ${PATHNEWS}/innshellvars will the INN binaries honor and use those proxy variables?
It is just a matter of figuring out how.
On 11.09.25 21:54, Soul Patch wrote:
It is just a matter of figuring out how.
Setting up incoming "reader" connections via TOR hidden service is easy.
You only have to make sure they arrive via a local ip or interface that
works with ACL and is not 127.0.0.1.
this can be done with haproxy:
``` haproxy.cfg
frontend nntp1563
mode tcp
bind :::1119
bind :::1563 ssl crt /etc/haproxy/fully.pem
default_backend local119b
backend local119b
mode tcp
source 172.16.9.136
server reader-nyc-vlan 172.16.9.136:119 maxconn 128
```
EOF haproxy.cfg
To get incoming peering working you'd have to setup unique hidden
services for every of your peers and route each of them to a unique
haproxy frontend port which maps to a unique backend with a unique
local/vlan as source ip or setting up incoming.conf will not work.
Now figure out how to connect INNfeed via TOR socks to other peers,
where each of your peers needs it's own .onion address and haproxy setup
to have ACL/incoming.conf working
AI says:
...
On 12.09.25 21:46, Billy G. wrote:
AI says:
...
Hit send but missed some text.
- iptables won't work: TOR is not a transparent proxy.
~ socat: no idea, try it
+ tsocks / pchains: run innfeed via any might be worth a try
I think AI is unable to grok that there are four ports and an extra PREROUTE directive at play:
innd <incoming preroute> [tor hidden service port]
innd <incoming re-route> [port 119]
innd <outgoing preroute> [tor socks proxy]
nnrpd <incoming> [reader port]
the idea:
fetch https://github.com/InterNetNews/inn.git and check innfeed code /inn/refs/heads/main/innfeed
do you see any calls that could bypass the proxy?
All the methods in mind are a mite convoluted.
This message has been sent via tcp2tor, telnet and IHAVE to peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion
alias news.tcpreset.net :D
On 12.09.25 05:17, Soul Patch wrote:
All the methods in mind are a mite convoluted.
Maybe problem solved.
// tcp2tor - General TCP proxy tool for go-pugleaf
// This tool creates a local TCP listener that forwards raw TCP
connections through a SOCKS5 proxy
https://github.com/go-while/go-pugleaf/tree/testing-001/cmd/tcp2tor
./tcp2tor -target peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion:119 -listen-host 127.2.3.4 -listen-port 11119
2025/09/18 01:27:02 Starting tcp2tor (version dev-20250918)
2025/09/18 01:27:02 Configuration:
2025/09/18 01:27:02 Listen: 127.2.3.4:11119
2025/09/18 01:27:02 Target: peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion:119
2025/09/18 01:27:02 SOCKS5 Proxy: 127.0.0.1:9050
2025/09/18 01:27:02 Timeout: 30 seconds
2025/09/18 01:27:02 rLo SOCKS5 proxy connection test successful
2025/09/18 01:27:02 tcp2tor proxy listening on 127.2.3.4:11119
2025/09/18 01:27:02 Forwarding connections to peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion:119
through SOCKS5 proxy 127.0.0.1:9050
telnet 127.2.3.4 11119
Trying 127.2.3.4...
Connected to 127.2.3.4.
Escape character is '^]'.
200 news.tcpreset.net InterNetNews server INN 2.6.4 ready (transit mode)
quit
205 Bye!
Connection closed by foreign host.
testing executable:
https://reader-nyc.newsdeef.eu/storage/tcp2tor https://reader-nyc.newsdeef.eu/storage/tcp2tor.sha256
sha256: 5fb1f9e10e7042d3baa264ac6086a9a00f07d95d50ed21bfd4cf1b6677c3d035 bytes: 2412836 (du -b tcp2tor)
I think AI is unable to grok that
I'm not tcpreset but I can confirm it works :D
On 18.09.25 03:00, Billy G. wrote:
This message has been sent via tcp2tor, telnet and IHAVE to
peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion
alias news.tcpreset.net :D
On 18.09.25 02:41, Billy G. wrote:
On 12.09.25 05:17, Soul Patch wrote:https://web.archive.org/web/20250918013736/https://reader-nyc.newsdeef.eu/storage/tcp2tor
All the methods in mind are a mite convoluted.
Maybe problem solved.
// tcp2tor - General TCP proxy tool for go-pugleaf
// This tool creates a local TCP listener that forwards raw TCP
connections through a SOCKS5 proxy
https://github.com/go-while/go-pugleaf/tree/testing-001/cmd/tcp2tor
./tcp2tor -target
peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion:119
-listen-host 127.2.3.4 -listen-port 11119
2025/09/18 01:27:02 Starting tcp2tor (version dev-20250918)
2025/09/18 01:27:02 Configuration:
2025/09/18 01:27:02 Listen: 127.2.3.4:11119
2025/09/18 01:27:02 Target:
peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion:119
2025/09/18 01:27:02 SOCKS5 Proxy: 127.0.0.1:9050
2025/09/18 01:27:02 Timeout: 30 seconds
2025/09/18 01:27:02 rLo SOCKS5 proxy connection test successful
2025/09/18 01:27:02 tcp2tor proxy listening on 127.2.3.4:11119
2025/09/18 01:27:02 Forwarding connections to
peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion:119
through SOCKS5 proxy 127.0.0.1:9050
telnet 127.2.3.4 11119
Trying 127.2.3.4...
Connected to 127.2.3.4.
Escape character is '^]'.
200 news.tcpreset.net InterNetNews server INN 2.6.4 ready (transit mode)
quit
205 Bye!
Connection closed by foreign host.
testing executable:
https://reader-nyc.newsdeef.eu/storage/tcp2tor
https://reader-nyc.newsdeef.eu/storage/tcp2tor.sha256
sha256: 5fb1f9e10e7042d3baa264ac6086a9a00f07d95d50ed21bfd4cf1b6677c3d035
bytes: 2412836 (du -b tcp2tor)
## newsfeeds ## peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion\
:*,$DEFAULT,$NOBINARY/!local\
:Ap,Tm,<65536:innfeed!
## innfeed.conf ##
peer peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion {
ip-name: peannyjkqwqfynd24p6dszvtchkq7hfkwymi5by5y332wmosy5dwfaqd.onion
force-ipv4: true
max-connections: 1
port-number: 11119
}