mkp224o
onionmx
Our great sponsors
mkp224o | onionmx | |
---|---|---|
26 | 5 | |
1,122 | 191 | |
- | 0.0% | |
6.8 | 0.0 | |
2 months ago | over 1 year ago | |
C | Ruby | |
Creative Commons Zero v1.0 Universal | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mkp224o
- Hello, how do I generate a domain name like I want?
-
Vanity address generator
mkp224o has worked fine for me. Older tools like Shallot and Eschalot don't support v3 addresses, and so are no longer usable.
-
Website stops working after changing onion adress
I’m hosting a site on a Raspberry Pi 4B (8GB Ram) with Nginx. I wanted to make it accessible on tor with a custom vanity address so I used a program called mkp224o to generate an address.
-
[Need Help] trying to add vanity .onion domain to my bitcoin core full node, but it generates a new one every time it runs
I thought that it would be cool to have a vanity v3 domain of some kind, so I've used mkp224o to generate one (bitcoinABC...DEF.onion, from now on I'll refer to this as .onion
-
I have questions about Tor v3 vanity address generator.
https://gitlab.torproject.org/tpo/onion-services/onionmine based on https://github.com/cathugger/mkp224o/
-
Reddit Onion Service Launch
Yup, https://github.com/cathugger/mkp224o was used. I'll props https://gitlab.torproject.org/tpo/onion-services/onionmine as well which is a new project to consolidate the entire minting process.
- How do some sites have a slightly customised onion address?
-
Using onionshare to host a site with a vanity address generated with mkp224o
So I realized that I could give a custom private key to get a custom .onion address. Then I used mkp224o to brute force some
- Custom wallet address
-
I generated some 15-17 char vanity domains
mkp224o
onionmx
-
Configuring email service in TOR
This readme is quite insightful.
- Onionmx: Mail Delivery over Tor
-
.onion email not found
For anyone curious, onion to onion (and even non-onion to onion) works today if the involved SMTP servers know how to handle it. For example, the OnionMX project. https://github.com/ehloonion/onionmx
-
Modern XMPP
Great question! onion vhosts ([email protected] addresses) don't need that, as long as your client can resolve onion addresses (Gajim/Conversations have good tor integration, otherwise Tor's AutomapHostsOnResolve will do the trick systemwide but in that case your client may complain that the domain doesn't support TLS or with a wrong certificate).
"Advanced" connection settings is required when the vhost you are connecting to doesn't match the hostname you need to reach on the network. For example, if you're reaching your server over a VPN/SSH/IPSEC tunnel.
Another example is if you wish to login as [email protected] by reaching foobar.onion. This is useful if you want to be part of the broader Jabber federation, in which not every host supports federation over onion addresses (i'd be curious to make stats about that) but it still gives you the security guarantees of Tor when reaching your server (though not for server-to-server connections).
Onion name discovery for automatically upgrading to onion routing when Tor is available client-side is not yet specified within the XMPP ecosystem. Onion discovery in the HTTP ecosystem is usually done via Onion-Location HTTP header (HTTPS only), in the email ecosystem they use _onion-mx DNS SRV records: see https://gitweb.torproject.org/tor-browser-spec.git/tree/prop... and https://github.com/ehloonion/onionmx/blob/master/SRV.md respectively
Implementing something similar XMPP side would be easy. Prosody already has a community mod_onions, but currently only supports a static map of hosts to their onion addresses. It could use some love: https://modules.prosody.im/mod_onions.html
Another problem we face from a UX perspective for onion services is that currently XMPP server implementations are very strict about which node/resource messages are intended for, and to my knowledge none support aliasing systems as we have in the email world. In this specific example application of aliases, there's currently no way (that i know of) to have the same account across .org/.onion domains and having servers to know it's the same account in a federated manner, eg. to prevent you from adding the same person twice to your contact list.
All in all there's interesting challenges and none of them is really hard so if you'd like to get involved or just let us know about your ideas and expectations, feel free to drop by xmpp:[email protected]?join
What are some alternatives?
tor-v3-vanity - A TOR v3 vanity url generator designed to run on an NVIDIA GPU.
snikket-server - Image builder for Snikket server
nano-vanity - A NANO vanity address generator (supports OpenCL)
manifesto - A public statement about ubiquitous encryption on the federated XMPP network.
eschalot - It is important to stress that we have not written this piece of software (see LICENSE)
Movim - Movim - Decentralized social platform
minisign - A dead simple tool to sign files and verify digital signatures.
manifesto - The Extensible Web Manifesto
Shallot - Shallot allows you to create customized .onion addresses for your hidden service. (p.s. I didn't write Shallot!)
tfc - Tinfoil Chat - Onion-routed, endpoint secure messaging system
ed25519 - Minimal ed25519 Haskell package, binding to the ref10 SUPERCOP implementation.
manifesto - The OpenTF Manifesto expresses concern over HashiCorp's switch of the Terraform license from open-source to the Business Source License (BSL) and calls for the tool's return to a truly open-source license.