How can I simulate hidden service (onion service) using Shadow? #3253
-
Hi! First of all, we have been studying this wonderful simulator for a while and would like to thank for your hard work in maintaining this project. My team is working to evaluate the effectiveness of some attacks against hidden services, using Shadow. We could find some hints from this old archive, but it is out-dated and not compatible with the current version of Shadow. It seems that we can build our configuration file from the ground up by referring to the old archive. However, before doing so, we want to make sure that this is not reinventing the wheel. Is there any updated, publicly available configuration file (i.e., shadow.yaml file)? Thank you :) |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 20 replies
-
By the way, we have checked several artifacts from recent studies (e.g., explainwf), but we couldn't figure out how to configure the hidden service, unfortunately :( |
Beta Was this translation helpful? Give feedback.
-
Yes, you should use tornettools to help you generate new Tor network configurations that can run in shadow. There are several steps involved as explained in the README of that project. You can use the |
Beta Was this translation helpful? Give feedback.
Yes, you should use tornettools to help you generate new Tor network configurations that can run in shadow. There are several steps involved as explained in the README of that project. You can use the
onion
options during the generate step to configure hidden services: seetornettools generate --help
for more details.