ansible-role-hidden-service
Install and configure one or multiple Tor Hidden Services.
Hostname and private key will be generated if not supplied as variable.
Hint: It may take up to one minute, until the service is announced in the tor network and reachable.
Be careful: Using the default 127.0.0.1 as Hidden Service IP-address could possibly leak meta data: https://help.riseup.net/en/security/network-security/tor/onionservices-best-practices#be-careful-of-localhost-bypasses
Supports Next Gen Onion Services only if tor version >= 0.3.2.1!
# defaults file for hidden-service
hidden_service_active: True
hidden_service_ipaddr: 127.0.0.1
hidden_service_tor_apt_state: present
hidden_service_services:
ssh:
hidden_service_hostname:
hidden_service_ports:
- [22, 22]
hidden_service_authorized_clients: []
hidden_service_private_key:
hidden_services_configuration:
SocksPort: 9050
SocksPolicy: "reject *"
# List of auth cookies for connecting to Authenticated Tor Hidden Services.
#
hidden_service_hid_serv_auth: []
hidden_service_monit_enabled: False
Download latest release with ansible-galaxy
ansible-galaxy install systemli.hidden-service
- hosts: servers
roles:
- { role: systemli.hidden-service }
hidden_service_active: True
hidden_service_ipaddr: 192.168.3.12
hidden_service_services:
ssh:
hidden_service_hostname:
hidden_service_ports:
- [22, 22]
hidden_service_private_key:
mail:
hidden_service_hostname:
hidden_service_ports:
- [25, 25] #[redirected_from, redirected_to]
- [587,587]
hidden_service_private_key:
examplewithhostname:
hidden_service_hostname: onionurl.onion
hidden_service_ports:
- [25, 25]
- [587,587]
hidden_service_private_key: |
-----BEGIN RSA PRIVATE KEY-----
the
private
key
-----END RSA PRIVATE KEY-----
absenthiddenservice:
hidden_service_state: absent
hidden_service_hostname: onionurl.onion
hidden_service_ports:
- [25, 25]
- [587,587]
hidden_service_private_key: |
-----BEGIN RSA PRIVATE KEY-----
the
private
key
-----END RSA PRIVATE KEY-----
#
# nextgeneration hiddenservice only available in tor >= 0.3.2.1
# https://trac.torproject.org/projects/tor/wiki/doc/NextGenOnions#Howtosetupyourownprop224service
#
nextgenhiddenservice:
hidden_service_hostname:
hidden_service_version: 3
hidden_service_ports:
- [25, 25]
- [587,587]
hidden_service_private_key:
#
# Example for torrc with special hidden service configurations
# such as Sandboxing, custom data directory, auth cookies ...
hidden_service_services:
ssh:
hidden_service_ports:
- [22, 22]
hidden_service_authorized_clients:
- admin
hidden_services_configuration:
SocksPort: 9050
SocksPolicy: "reject *"
RunAsDaemon: 1
# Enabling Sandbox for the first time may prevent
# the tor service from restarting. Make sure your
# SSH connection is not over Tor when enabling it.
Sandbox: 1
FetchDirInfoEarly: 1
FetchDirInfoExtraEarly: 1
DataDirectory: /var/lib/tor
# Hosts that specified `hidden_service_authorized_clients` will generate
# auth cookies for restricted access. Collect those values from the
# hostname file and add them to the torrc for intended clients, e.g.
# the Ansible controller, via the list var below.
hidden_service_hid_serv_auth:
- "r7w3xdf3r5smxokv.onion p0xMVci7ffeQFA4IWkcBxR # client: admin"
For developing and testing the role we use Travis CI and Vagrant. On the local environment you can easily test the role with
vagrant up trusty
# other available releases are precise, wheezy and jessie
GPLv3