Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rule suggestions #8

Open
jutozex opened this issue Jun 12, 2014 · 81 comments
Open

Rule suggestions #8

jutozex opened this issue Jun 12, 2014 · 81 comments

Comments

@jutozex
Copy link
Contributor

jutozex commented Jun 12, 2014

I will post any rule suggestions here in future. Anyone else could use here too.

bitmessage.ch -> bitmessage.i2p

@colinmahns
Copy link
Collaborator

Thanks for the post, can't believe I didn't catch bitmessage's eepsite earlier!

If you find anymore suggestions, please feel free to add them here or make a pull request :)

@jutozex
Copy link
Contributor Author

jutozex commented Jun 13, 2014

I think it was added recently.

According to the admin, it is still experimental, I have found that after sending an email it tries to request from bitmessage.ch instead of bitmessage.i2p. So this rule should fix such problems too

@jutozex
Copy link
Contributor Author

jutozex commented Jun 13, 2014

  • kognitionskyrkan.xml proof http://kognitionskyrkan.nu/1.0/
  • bitcoincigs.xml proof https://bitcointalk.org/index.php?topic=193243.0
  • *.darktor.com and *.onion.cab as a tor2web alternative (tor2web.xml)
  • wtfismyip.com -> tmkloc6vhxos3nde.onion
  • Bitmessage i2p proof is the link from the onion (which requires another proof-check), better change it to main domain
  • projectpm.xml has a typo: "http://http://projpmcxufvim7be.onion/"
  • projectpm.xml: wiki.echelon2.org is forgotten. add the <target and replace (www.)? with (www.|wiki.)?
  • I think the rules under the unverified-rules folder shouldn't be off by default, if the user installs them, accepts the responsibility and it would be hard to turn them on one by one. And I don't think most rules need verification, I believe general/information websites should be on by default without need of verification (as long as the content is same), but if any kind of risk is involved, for example the keyserver rule, some marketplace (bitcoincigs) or some other bitcoin service, then it should be separated. The unverified but included rules should be listed under documentation.

So I also think that it's not even necessary that the hidden service's owner is the same as the original website. Such situations are generally people supporting the content by mirroring it as hidden service.

  • As a good example I'm suggesting a rule to redirect geohot.com -> wdnqg3ehh3hvalpe.onion

@colinmahns
Copy link
Collaborator

kognitionskyrkan.xml proof http://kognitionskyrkan.nu/1.0/

bitcoincigs.xml proof https://bitcointalk.org/index.php?topic=193243.0

Thanks for finding these. Kognitionskyrkan has been a tough one to find,

*.darktor.com and *.onion.cab as a tor2web alternative (tor2web.xml)

wtfismyip.com -> tmkloc6vhxos3nde.onion

I'll look into these two later today when I get the time.

Also, did you edit out two adult links from this post? The email from github had two hidden services you labeled as "adult". Anyway, I wanted to add that I don't think we (Chris and myself) should be in the business of barring rules based on a site's content. We aren't trying to be the morality police, rather just supplying a way to try and keep anonymity for all users. There are sites that we have rules to that I don't think people should go to, but I'm not going to try and make it difficult for them.

Bitmessage i2p proof is the link from the onion (which requires another proof-check), better change it to main domain

projectpm.xml has a typo: "http://http://projpmcxufvim7be.onion/"

projectpm.xml: wiki.echelon2.org is forgotten. add the <target and replace (www.)? with (www.|wiki.)?

Wow, thanks for pointing those out. It's a good thing we have you around, I clearly shouldn't be trusted behind a keyboard ;) Good catch on projectpm not redirecting wiki.* too.

I think the rules under the unverified-rules folder shouldn't be off by default, if the user installs them, accepts the responsibility and it would be hard to turn them on one by one. And I don't think most rules need verification, I believe general/information websites should be on by default without need of verification (as long as the content is same), but if any kind of risk is involved, for example the keyserver rule, some marketplace (bitcoincigs) or some other bitcoin service, then it should be separated. The unverified but included rules should be listed under documentation.

I created the unverified rules just as an incubator of sorts for rules that haven't been verified. Removing the default_off on them is a good idea since a user now has to go out of their way to add those rules, however I don't like the idea that we should just add unverified rules because the "content" is the same or because they aren't that "risky". I think we should strive to only include rules that meet our criteria in the default install rather than rules that might be okay.

So I also think that it's not even necessary that the hidden service's owner is the same as the original website. Such situations are generally people supporting the content by mirroring it as hidden service.

As a good example I'm suggesting a rule to redirect geohot.com -> wdnqg3ehh3hvalpe.onion

I personally don't like this, since it will alter the content the user expects vs what they receive. In that example you cited, what if Geohot changes his personal site and has something a user might want to see? If we link to a mirror (especially the mirror cited in that example) we will be receiving whatever the owner of that hidden service wants to serve, rather than what the user is expecting. Also, what if that hidden service mirror is malicious in any way? I think it's safer to hardline this.

Please keep the contributions coming by the way!

@jutozex
Copy link
Contributor Author

jutozex commented Jun 13, 2014

About the adult links, I've by chance found another very similar site with a hidden service, clearly from the same owners, which had sets of almost naked underage children, so I thought better not even add the previous two as to not support them

@chris-barry
Copy link
Owner

That was a good call. As long as it doesn't feature obviously underage
children it shouldn't be an issue adding anything.

Chris Barry

On Jun 13, 2014, at 13:46, jutozex notifications@github.com wrote:

About the adult links, I've by chance found another very similar site with
a hidden service, clearly from the same owners, which had sets of almost
naked underage children, so I thought better not even add the previous two
as to not support them


Reply to this email directly or view it on GitHub
#8 (comment)
.

@jutozex
Copy link
Contributor Author

jutozex commented Jun 13, 2014

As an improvement, the proof links could be archived and linked to protect for future.

Some services: http://webcitation.org/ https://archive.today/ https://archive.org/web/

@jutozex
Copy link
Contributor Author

jutozex commented Jun 13, 2014

http://pastebin.com/BF7yJKtY is a 2 year old paste, not technically but logically it is a proof of wtfismyip.xml.

Other than that, for current or future rules we can try to get a proof by using the contact options. Maybe they will add a link to the website, or send a gpg signed message to be used as proof of ownership.

@colinmahns
Copy link
Collaborator

I'd rather rely on a primary source as proof rather than something like a pastebin.

I'll be happy to send an email out to the guys at WTF Is My IP. I've reached out to several of the sites already, but only a handful have responded. Hopefully they respond.

@jutozex
Copy link
Contributor Author

jutozex commented Jun 13, 2014

proof of bbseyes: https://twitter.com/bbseyes/status/422416817659707392

But I cannot reach the hidden site.

@colinmahns
Copy link
Collaborator

If I recall correctly, they were one of the sites that hasn't responded to me... But at least we can verify their site :)

@jutozex
Copy link
Contributor Author

jutozex commented Jun 13, 2014

http://maximaculpa.me/sin/365/ proof of maximaculpa. But the correct address is nsmgu2mglfj7za6s.onion. Actually the first two characters of the address on the rule is missing

@colinmahns
Copy link
Collaborator

Ah this was a good find, I just pushed it. Thanks!

I think I got the current one from one of the hidden wikis. Not that it matters now of course.

@jutozex
Copy link
Contributor Author

jutozex commented Jun 13, 2014

I think the searx addresses are just independent instances of the software, like https://github.com/asciimoo/searx/wiki/Searx-instances

@colinmahns
Copy link
Collaborator

Heard back from WTF Is My IP, it's confirmed that they host that hidden service, but the site creators expressed that the hidden service is more of a joke. I've attatched the email.

As a result of this, I think it's safe to say it should be default off to preserve the intended functionality.

That's a good fine about searx, I guess if we can verify that each instance has a hidden service run by the same guys/girls, it's okay to add to the main set of rules. I think I saw one or two that meet our criteria, so I'll add them in a little bit.

@jutozex
Copy link
Contributor Author

jutozex commented Jun 15, 2014

https://searx.gliderswirley.org/ -> qfz67iw4xz7qwfab.onion

@colinmahns
Copy link
Collaborator

Added, thanks.

@jutozex
Copy link
Contributor Author

jutozex commented Jun 18, 2014

Despite the fact that it is usable as an anonymous mail provider, if their real intention is to rob people's bitcoins, should we delete the newly added Mailtor rule?

When I was testing it, I saw the so called wallet functionality but I felt it was a scam.

And today I found this reddit: https://www.reddit.com/r/TOR/comments/28hyyj/mailtor_onion_email_and_bitcoin_wallet_scam_2000/

@chris-barry
Copy link
Owner

As far as I see it, these rules are only here to provide a mapping from clear->hidden service. It's each user's responsibility to make sure they're using services which don't rob them (assuming that reddit poster is not lying).

@colinmahns
Copy link
Collaborator

Glad you posted that link. I probably wouldn't have seen it until much later, if at all.

The possible inclusion of scams is something I've thought about, but haven't written anything about it yet. I think that we should apply the same rules we already have for rulesets, with the addition that if we find confirmation that the site is a scam, we give it a default_off="$REASON" and throw a link to the scam confirmation in EVIDENCE.md.

Or we can just leave default_off to continue being what it is, for dead rules and leave scam sites mixed in with regular rules. We aren't out to tell people what we think they should do, even as indirectly as to keep them away from a bad site. This project exists more to catalog as many clear > hidden sites as possible.

TL;DR - If Chris likes either of my proposals for how to handle, we'll go down that route.

@chris-barry
Copy link
Owner

Colin: we seem to be agreeing, kinda. I don't really have an opinion about on/off. I just feel it shouldn't be excluded.

@chris-barry
Copy link
Owner

jutozex: how should I cite you in AUTHORS.md ?

@colinmahns
Copy link
Collaborator

Chris: I don't think they should be excluded either, I am just wondering how we should include them in the default install. There's decent arguments for both sides.

I'm leaning more to keeping them default on, since we shouldn't be the ones responsible for the user's actions while using the rules, or responsible for keeping them "protected" from scams and the like.

@jutozex
Copy link
Contributor Author

jutozex commented Jun 19, 2014

No need for citing, this is just a randomly created nickname. But if you want the file to look more crowded :) just add jutozex

@jutozex
Copy link
Contributor Author

jutozex commented Jun 19, 2014

I think we can move the 3 unverified rules to the rules folder (and indymediakeyserver to dead-rules, at least temporarily), I think nobody would oppose this.

Considering the content, there is no motivation for anyone to host the hidden service with bad intent for a long time without any warning anywhere on the main website or anywhere else.

And I think, including mailtor.xml means we should also move these unverified rules to rules folder. They couldn't make more harm

@jutozex
Copy link
Contributor Author

jutozex commented Jun 19, 2014

By the way, my answer on stackexchange made its way into the Tor Blog :)

https://blog.torproject.org/

@colinmahns
Copy link
Collaborator

I think we can move the 3 unverified rules to the rules folder (and indymediakeyserver to dead-rules, at least temporarily), I think nobody would oppose this.

I'm not crazy about moving unverified rules into the main mix, since I really do like having that buffer. Verified doesn't mean "safe to use", but "confirmed to not be a bad actor/actress". Remember, Donald Trump has a "verified" twitter account ;)

I understand the point you are making with these three specific services however. I won't stand in the way of these three making it back into the main rules directory.

Indymedia's key server is unique because not only is it dead, but it can't be verified thanks to it being dead. So yeah, I think putting it in dead-rules/ is acceptable.

By the way, my answer on stackexchange made its way into the Tor Blog :)

Warning, Youtube link of my reaction

This is so cool.

@justsomeguyyouknow
Copy link

Hi, I have some questions.
I already have a website with .onion support (can connect both clearnet and darknet).

My questions are:

For Evidence

In order to make sure all of the clearnet to hidden mappings are correct, proper evidence is required. Proper evidence can consist of:

A link on the clearnet site.
A tag in the HTML similar to <link rel="x-tor-hidden-service" href="sweetsite.onion">.
A signed email from the owner of the site saying it is real.
A link on Twitter by the verified site owner saying so.

A link on the clearnet site.
OK.

A tag in the HTML similar to .
So I'll add this tag to top page.

A signed email from the owner of the site saying it is real.
What is this? "Email body" or "Email address"? I don't want any spam, so I don't want to make my mail address public.

A link on Twitter
You know, NSA is watching. I don't use Twitter. (If you believe I'm a paranoid, you're wrong. http://prism-break.org)

@jutozex
Copy link
Contributor Author

jutozex commented Jun 19, 2014

If there's a link on the clearnet site, that's enough. What's the address, I will quickly add it.

@chris-barry
Copy link
Owner

You don't have to use all three. Any will be convincing enough

Chris Barry

On Jun 19, 2014, at 1:00, justsomeguyyouknow notifications@github.com
wrote:

Hi, I have some questions.
I already have a website with .onion support (can connect both clearnet and
darknet).

My questions are:

For Evidence

In order to make sure all of the clearnet to hidden mappings are correct,
proper evidence is required. Proper evidence can consist of:

A link on the clearnet site.
A tag in the HTML similar to .
A signed email from the owner of the site saying it is real.
A link on Twitter by the verified site owner saying so.

A link on the clearnet site.
OK.

A tag in the HTML similar to .
So I'll add this tag to top page.

A signed email from the owner of the site saying it is real.
What is this? "Email body" or "Email address"? I don't want any spam, so I
don't want to make my mail address public.

A link on Twitter
You know, NSA is watching. I don't use Twitter. (If you believe I'm a
paranoid, you're wrong. http://prism-break.org)


Reply to this email directly or view it on GitHub
#8 (comment)
.

@colinmahns
Copy link
Collaborator

Cool, I will add these later tonight.

Thanks again juto :)

On July 17, 2014 5:58:03 PM EDT, jutozex notifications@github.com wrote:

and zimmermann.mayfirst.org/


Reply to this email directly or view it on GitHub:
#8 (comment)

Sent from my Android device with K-9 Mail. Please excuse my brevity.

@jutozex
Copy link
Contributor Author

jutozex commented Jul 24, 2014

for flibusta onion and i2p rules

proxy.flibusta.net is another address

@jutozex
Copy link
Contributor Author

jutozex commented Jul 24, 2014

http://blog.coinkite.com/post/92733188841/coinkite-has-an-onion-for-tor
gcvqzacplu4veul4.onion

wiki.project-pm.org to projectpm.xml

@jutozex
Copy link
Contributor Author

jutozex commented Jul 25, 2014

Mayfirst's Keyserver isn't dead.

kavkazcenter needs www s

@jutozex
Copy link
Contributor Author

jutozex commented Jul 25, 2014

http://www.onionindex.com/
onionindexcg2tsk.onion

@colinmahns
Copy link
Collaborator

Okay, should've gotten everything you posted today.

Please check my code if you have time!

@jutozex
Copy link
Contributor Author

jutozex commented Jul 25, 2014

Ok.

apparently mayfirst keyserver has both zimmerman.mayfirst.org and zimmermann.mayfirst.org. you could add the latter.

you created onion-flibusta.xml but there is also a flibusta.xml. the rule regex doesn't include www.proxy.flibusta.net. also there is flibusta.xml for i2p.

@colinmahns
Copy link
Collaborator

Thanks for the heads up! Will do this tonight when I get some time.

On July 25, 2014 3:28:49 PM EDT, jutozex notifications@github.com wrote:

Ok.

apparently mayfirst keyserver has both zimmerman.mayfirst.org and
zimmermann.mayfirst.org. you could add the latter.

you created onion-flibusta.xml but there is also a flibusta.xml. the
rule regex doesn't include www.proxy.flibusta.net. also there is
flibusta.xml for i2p.


Reply to this email directly or view it on GitHub:
#8 (comment)

Sent from my Android device with K-9 Mail. Please excuse my brevity.

@colinmahns
Copy link
Collaborator

Forgot to push a few commits. Everything should be in order, but please correct me if it's not!

@jutozex
Copy link
Contributor Author

jutozex commented Aug 1, 2014

https://ruggedinbox.com/
s4bysmmsnraf7eut.onion

You can also find at least 2 new securedrop addresses on google. But I'm just wondering if it is ok to redirect these pages because the content isn't exactly the same, I mean a little additional info on clearweb, including the ones currently in xml

@chris-barry
Copy link
Owner

Juto: I'm gonna add Rugged Inbox soon.

About the Securedrop instances, I think we should try to add them. It seems like an ideal service to have. Freedom of the Press Foundation keeps a nice list of publicly known instances http://freepress3xxs3hk.onion/securedrop/directory . They even PGP sign the list!

The ones that concern me are the ones that have landing pages on non-root domain.

@colinmahns
Copy link
Collaborator

I'm also for adding Securedrop instances.

The content on the clear sites typically is instructions on how to connect to that securedrop instance by downloading the Tor browser and typing in the *.onion address. Interestingly, WildLeaks actually redirects you to the hidden service if they see you connect from Tor, which is why we started adding them. I'm open to discussion on this policy though, on whether we should or shouldn't.

@jutozex
Copy link
Contributor Author

jutozex commented Aug 20, 2014

anonguide.xml
https://anonguide.cyberguerrilla.org
yuxv6qujajqvmypv.onion

@jutozex
Copy link
Contributor Author

jutozex commented Aug 20, 2014

europa.xml was short-lived. dead

@colinmahns
Copy link
Collaborator

Adding and fixing these now. Thanks!

@colinmahns
Copy link
Collaborator

Thanks for your input, welcome to the project! :)

I believe this domain was suggested previously in this thread. IIRC, the odd numbered port will not work in the confines in the rule, but I can test it again later today.

@jutozex
Copy link
Contributor Author

jutozex commented Dec 6, 2014

@colinmahns
Copy link
Collaborator

Awesome! Just enabled the rule + added proof.

Nice to see you again juto :)

@jutozex
Copy link
Contributor Author

jutozex commented Dec 7, 2014

I'm always around here, happy to watch all the progress.

@jutozex
Copy link
Contributor Author

jutozex commented Dec 22, 2014

Found this, but hidden service is offline at the moment

http://bittext.ch/help/ http://bittexttizfec375.onion/

@colinmahns
Copy link
Collaborator

Just added it. Thanks for the suggestion!

I'll push a new build of the extension later today, so this site (among others that have been added) will be included.

@jutozex
Copy link
Contributor Author

jutozex commented Jan 9, 2015

@colinmahns
Copy link
Collaborator

Added!

@jutozex
Copy link
Contributor Author

jutozex commented Jan 19, 2015

encyclopediadramatica.es moved to encyclopediadramatica.se

@jutozex
Copy link
Contributor Author

jutozex commented Feb 28, 2015

onion.city as another tor2web alternative

@jutozex
Copy link
Contributor Author

jutozex commented Apr 18, 2015

hello again, btdigg.org now has a hidden service btdigg63cdjmmmqj.onion

@chris-barry
Copy link
Owner

BTDigg: 248f8cc

@jutozex
Copy link
Contributor Author

jutozex commented Apr 22, 2015

I guess the i2p rule didn't need a fix, the reference already included a dot.

These are some recent tor2web alternatives though some might be dead.

onion.direct
torstorm.org
connect2tor.org
door2tor.org
toradvisor.org

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants
@nogweii @chris-barry @colinmahns @jutozex @justsomeguyyouknow @ckanth1 and others