h1. installing thttpd and tor to create a .onion website File locations on my home Linux computer: * zwdqwr2p2xwkpbyv.onion ** powered by thttpd ** doc root: /usr/local/www/data * localhost site ** powered by nginx and Wren ** directories in /var/www *** Wren *** sessionids *** markup ** doc root: /var/www/Wren/root hr. june 1, 2016 whew. took a while. a lot of fussing. by i have an onion website running on my linux computer in my home. zwdqwr2p2xwkpbyv.onion hr. installing on my home linux computer. http://www.acme.com/software/thttpd downloaded thttpd-2.27.tar.gz su to root tar -zxvf thttpd-2.27.tar.gz cd into directory ./configure make make install hr. my files: /usr/local/sbin/thttpd /usr/local/www/thttpd_config /usr/local/sbin/thttpd_wrapper /usr/local/www/data/index.html hr. https://www.torproject.org/docs/tor-hidden-service.html.en http://nekhbet.com/nginx_onion.shtml https://www.deepdotweb.com/2013/10/19/how-to-safely-host-your-own-tor-hidden-service/ /home/veery/tor/tor-browser_en-US/Browser/TorBrowser/Data/Tor https://gitweb.torproject.org/tor.git/tree/src/config/torrc.sample.in http://tor.stackexchange.com/questions/6662/my-hidden-service-doesnt-load-unless-the-tor-browser-is-open-on-the-server http://stackoverflow.com/questions/13060096/why-tor-cant-access-localhost-pages https://wiki.archlinux.org/index.php/tor http://tor.stackexchange.com/questions/1065/what-happened-to-torrc-in-tor-browser-bundle kill -USR1 `cat /var/run/tor/tor.pid` /usr/sbin/tor --defaults-torrc /usr/share/tor/tor-service-defaults-torrc --hush hr. http://www.onlamp.com/pub/a/bsd/2005/10/13/thttpd.html?page=3 http://linux.derkeiler.com/Newsgroups/comp.os.linux/2005-11/0109.html http://www.acme.com/software/thttpd/notes.html https://www.pantz.org/software/thttpd/thttpdconfig.html http://nginxlibrary.com/running-cgi-scripts-using-thttpd/ http://www.techrepublic.com/article/use-thttpd-as-your-web-server-when-apache-is-overkill/ https://calomel.org/thttpd.html https://ubuntuforums.org/showthread.php?t=1648470 hr. sudo apt-get install tor created directory called: hidden_service in /var/lib/tor while in /var/lib/tor chown -R debian-tor:debian-tor hidden_service vim /usr/share/tor/tor-service-defaults-torrc add two lines: HiddenServiceDir /var/lib/tor/hidden_service/ HiddenServicePort 80 127.0.0.1:8080 tor daemon log file: /var/log/tor/log ps aux | grep tor start up tor if not already running: /usr/sbin/tor --defaults-torrc /usr/share/tor/tor-service-defaults-torrc --hush or restart tor daemon kill -USR1 `cat /var/run/tor/tor.pid` then in the hidden_service directory, two new files will be created: private_key hostname the hostname file contains the .onion address that points to the website hosted by the thttpd install above. hr. creating a new hostname and key. http://tor.stackexchange.com/questions/3360/how-do-i-replace-my-existing-onion-hostname-on-a-working-site-with-a-new-hostna delete the two files and then restart the tor service. the hostname and private_key files will be automatically generated. hr. pros and cons of a custom .onion name http://security.stackexchange.com/questions/29772/how-do-you-get-a-specific-onion-address-for-your-hidden-service https://timtaubert.de/blog/2014/11/using-the-webcrypto-api-to-generate-onion-names-for-tor-hidden-services/ q. You can brute-force .onion names matching a specific pattern using tools like Shallot or Scallion. Those will generate key pairs until they find one resulting in a matching URL. That is usably fast for 1-5 characters. Finding a 6-character pattern takes on average 30 minutes and for just 7 characters you might need to let it run for a full day. q.. hr. git clone my wren web publishing app. hr. http://jothut.com/cgi-bin/junco.pl/blogpost/21154/14May2015/Installing-nodejs-nginx-mysql-junco-and-ghost-on-Digital-Ocean-Droplet#Installing-Nginx installed nginx installed fastcgi **** do this and not the first method mentioned in the above install doc: apt-get install nginx spawn-fcgi fcgiwrap q. update 20nov2013 - problems with cgi app executing another cgi app on same server. seems to be a problem with fast cgi. trying a different wrapper mentioned here: https://library.linode.com/web-servers/nginx/perl-fastcgi/ubuntu-12.04-precise-pangolin q.. the above link redirects to here: https://www.linode.com/docs/websites/nginx/nginx-and-perlfastcgi-on-ubuntu-12-04-lts-precise-pangolin/ edit: /etc/init.d/fcgiwrap and change the following: FCGI_CHILDREN="1" to FCGI_CHILDREN="5" comment out: FCGI_SOCKET="/var/run/$NAME.socket" and add: FCGI_PORT="8999" FCGI_ADDR="127.0.0.1" ensure user and group match the web server daemon user and group. service fcgiwrap restart ps aux | grep cgi br. installed wren, which meant installing perl modules perl -MCPAN -e 'install HTML::Template' this is a big install that takes a few minutes. perl -MCPAN -e 'install JSON::Any' perl -MCPAN -e 'install JSON::XS' moron. i should have installed only JSON::PP instead of the two json modules above. perl -MCPAN -e 'install WWW::Mailgun' hr. /etc/init.d /usr/local/etc/rc.d --- not used h2. Elsewhere http://www.propub3r6espa33w.onion https://www.propublica.org/nerds/item/a-more-secure-and-anonymous-propublica-using-tor-hidden-services https://www.wired.com/2016/01/propublica-launches-the-dark-webs-first-major-news-site/ https://www.propublica.org/podcast/item/why-propublica-joined-the-dark-web br. https://facebookcorewwwi.onion/ https://www.wired.com/2014/10/facebook-tor-dark-site/ https://www.facebook.com/notes/protect-the-graph/making-connections-to-facebook-more-secure/1526085754298237 https://www.facebook.com/notes/facebook-over-tor/1-million-people-use-facebook-over-tor/865624066877648 https://news.ycombinator.com/item?id=11549839 br. https://www.deepdotweb.com/2015/02/16/interview-sigaint-darknet-email-admin/ br. http://jothut.com/cgi-bin/junco.pl/replies/71772 br. My .onion site that's running on Linux in our household. I don't always have the computer on. I need a raspberrypi for a dedicated machine. !https://c2.staticflickr.com/8/7111/27326573122_d96b0ea39d.jpg! "larger image":https://c2.staticflickr.com/8/7111/27326573122_d96b0ea39d_c.jpg hr. http://bgaxaar7xx6dpptt.onion/2016/01/24/setting-up-your-wordpress-blog-as-a-tor-hidden-service/