Загрузка данных


systemctl status tor
● tor.service - Anonymizing overlay network for TCP (multi-instance-master)
     Loaded: loaded (/lib/systemd/system/tor.service; enabled; vendor preset: enabled)
     Active: active (exited) since Mon 2026-05-11 23:23:23 +07; 3h 40min ago
    Process: 3276 ExecStart=/bin/true (code=exited, status=0/SUCCESS)
   Main PID: 3276 (code=exited, status=0/SUCCESS)
        CPU: 3ms

May 11 23:23:23 server systemd[1]: Starting Anonymizing overlay network for TCP (multi-instance-master)...
May 11 23:23:23 server systemd[1]: Finished Anonymizing overlay network for TCP (multi-instance-master).
root@server:~# sudo cat /var/lib/xenforo_hidden/hostname
cat: /var/lib/xenforo_hidden/hostname: No such file or directory
root@server:~# sudo cat /var/lib/tor/xenforo_hidden/hostname
6vhk-----.onion
root@server:~# curl -I http://127.0.0.1:8080
HTTP/1.1 403 Forbidden
Server: nginx/1.18.0 (Ubuntu)
Date: Mon, 11 May 2026 20:09:49 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive

root@server:~# ss -lntp | grep 8080
LISTEN 0      511        127.0.0.1:8080       0.0.0.0:*    users:(("nginx",pid=3271,fd=6),("nginx",pid=3270,fd=6))
root@server:~# sudo grep -E 'HiddenService|SocksPort' /etc/tor/torrc
## configure one below. Set "SocksPort 0" if you plan to run Tor only
SocksPort 9050 # Default: Bind to localhost:9050 for local connections.
#SocksPort 192.168.0.1:9100 # Bind to this address:port too.
## all (and only) requests that reach a SocksPort. Untrusted users who
## can access your SocksPort may be able to learn about the connections
## HiddenServicePort x y:z says to redirect requests on port x to the
HiddenServiceDir /var/lib/tor/xenforo_hidden/
HiddenServiceVersion 3
HiddenServicePort 80 127.0.0.1:8080
root@server:~# sudo ls -la /var/lib/tor/xenforo_hidden/
total 24
drwx------ 3 debian-tor debian-tor 4096 May 10 22:39 .
drwx------ 5 debian-tor debian-tor 4096 May 11 23:23 ..
drwx------ 2 debian-tor debian-tor 4096 May 10 22:39 authorized_clients
-rw------- 1 debian-tor debian-tor   63 May 10 22:39 hostname
-rw------- 1 debian-tor debian-tor   64 May 10 22:39 hs_ed25519_public_key
-rw------- 1 debian-tor debian-tor   96 May 10 22:39 hs_ed25519_secret_key
root@server:~# curl -H "Host: 6vhk-----.onion" http://127.0.0.1:8080 -I
HTTP/1.1 403 Forbidden
Server: nginx/1.18.0 (Ubuntu)
Date: Mon, 11 May 2026 20:12:42 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive