internal/Internal-Services.md
... ...
@@ -101,7 +101,7 @@ Some [Advanced Direct Connect](https://en.wikipedia.org/wiki/Advanced_Direct_Con
101 101
102 102
### Tor
103 103
104
-Entry points to the Tor network are available on dn42. See [Tor](/internal/services/Tor) for more details.
104
+Entry points to the Tor network are available on dn42. See [Tor](/internal/Tor) for more details.
105 105
106 106
### Telegram
107 107
internal/Tor.md
... ...
@@ -0,0 +1,38 @@
1
+[Tor](https://torproject.org/) ([dn42 mirror](http://tor.e-utp.dn42/)) is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
2
+
3
+# Tor Bridges
4
+
5
+Tor bridges allow for the Tor client to connect to a specific IP address and validate the fingerprint to permit safe connections into the Tor network for networks that do not directly access the public Internet, for example hosts that only have dn42 connections. The following bridges are currently available for use:
6
+
7
+| Name | Bandwidth | Contact | Protocol | Fingerprint | Info |
8
+|-----------------------|-----------|------------------|----------|------------------------------------------|------------------------------------|
9
+| photon.flat.dn42:8443 | 500kB/s | [email protected] | obfs4 | 83B02FB88253A7FD313B7912B12B05AF2A42D3B9 | Limited to 100GB transfer per week |
10
+| gouda.flat.dn42:8443 | 500kB/s | [email protected] | obfs4 | DF8CA08A9BED62B319D1E52610510959374444A2 | |
11
+| tor.napshome.dn42:8443 | 3000KB/s+ | [email protected] | obfs4 | 71C924A772F69451FE97FE5A9025DEDDEF3DB664 | |
12
+| tor.napshome.dn42:9001 | 3000KB/s+ | [email protected] | plain | 71C924A772F69451FE97FE5A9025DEDDEF3DB664 | |
13
+
14
+# Anycast Tor
15
+
16
+There is an anycast address, 172.22.0.94 and fd42:d42:d42:9001::1 aka tor.dn42, that provides the following services:
17
+
18
+| Service | Port |
19
+|---------|----------|
20
+| ORPort | 9001/tcp |
21
+| DirPort | 9030/tcp |
22
+| SOCKS | 9050/tcp |
23
+
24
+It should be noted that the host providing the SOCKS services is able to see *all* of the traffic going through it, you will not be protected for the portion of the journey between your machine and the Tor service. There is also no guarantee that the SOCKS proxy even provides a Tor service, it may simply just be a SOCKS proxy and you have no means by which to verify it.
25
+
26
+There is also unfortunately no means by which to tell Tor to use a specific IP address as the entry point for a plain relay and while in theory you could connect to the ORPort and have a safe connection to Tor, there is no configuration option available for this.
27
+
28
+# Tor SOCKS Proxies
29
+
30
+_Note that the same warnings above also apply to the following proxies._
31
+
32
+| Proxy URL | Bandwidth | Contact |
33
+|---------------------------------------|-------------|-------------|
34
+| socks5://tor.napshome.dn42:9050 | 100+ Mbit/s | Napsterbater|
35
+
36
+| Offline | | |
37
+|---------------------------------------|-------------|-------------|
38
+| socks5://172.20.11.33:9050 | 100 Mbit/s | twink0r |
internal/services/Tor.md
... ...
@@ -1,38 +0,0 @@
1
-[Tor](https://torproject.org/) ([dn42 mirror](http://tor.e-utp.dn42/)) is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
2
-
3
-# Tor Bridges
4
-
5
-Tor bridges allow for the Tor client to connect to a specific IP address and validate the fingerprint to permit safe connections into the Tor network for networks that do not directly access the public Internet, for example hosts that only have dn42 connections. The following bridges are currently available for use:
6
-
7
-| Name | Bandwidth | Contact | Protocol | Fingerprint | Info |
8
-|-----------------------|-----------|------------------|----------|------------------------------------------|------------------------------------|
9
-| photon.flat.dn42:8443 | 500kB/s | [email protected] | obfs4 | 83B02FB88253A7FD313B7912B12B05AF2A42D3B9 | Limited to 100GB transfer per week |
10
-| gouda.flat.dn42:8443 | 500kB/s | [email protected] | obfs4 | DF8CA08A9BED62B319D1E52610510959374444A2 | |
11
-| tor.napshome.dn42:8443 | 3000KB/s+ | [email protected] | obfs4 | 71C924A772F69451FE97FE5A9025DEDDEF3DB664 | |
12
-| tor.napshome.dn42:9001 | 3000KB/s+ | [email protected] | plain | 71C924A772F69451FE97FE5A9025DEDDEF3DB664 | |
13
-
14
-# Anycast Tor
15
-
16
-There is an anycast address, 172.22.0.94 and fd42:d42:d42:9001::1 aka tor.dn42, that provides the following services:
17
-
18
-| Service | Port |
19
-|---------|----------|
20
-| ORPort | 9001/tcp |
21
-| DirPort | 9030/tcp |
22
-| SOCKS | 9050/tcp |
23
-
24
-It should be noted that the host providing the SOCKS services is able to see *all* of the traffic going through it, you will not be protected for the portion of the journey between your machine and the Tor service. There is also no guarantee that the SOCKS proxy even provides a Tor service, it may simply just be a SOCKS proxy and you have no means by which to verify it.
25
-
26
-There is also unfortunately no means by which to tell Tor to use a specific IP address as the entry point for a plain relay and while in theory you could connect to the ORPort and have a safe connection to Tor, there is no configuration option available for this.
27
-
28
-# Tor SOCKS Proxies
29
-
30
-_Note that the same warnings above also apply to the following proxies._
31
-
32
-| Proxy URL | Bandwidth | Contact |
33
-|---------------------------------------|-------------|-------------|
34
-| socks5://tor.napshome.dn42:9050 | 100+ Mbit/s | Napsterbater|
35
-
36
-| Offline | | |
37
-|---------------------------------------|-------------|-------------|
38
-| socks5://172.20.11.33:9050 | 100 Mbit/s | twink0r |