Deniability - Isolating on-premise hidden services (VM-based restrictive networking) #66
Labels
No Label
/!\ On Priority - High Quality Tutorial
? Impossible Currently ?
Complex
Doable
Simple
To be improved / simplified / finished / fixed
pushed to prod (1 month external review)
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: nihilist/blog-contributions#66
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
1.5) VM decoy tor traffic (outside of the deniable encryption volume)
Requires:
-(at minimum 2 wan) dual wan config as showcased in https://blog.nowhere.moe/opsec/failover-wan/index.html
-power failover setup as showcased in https://blog.nowhere.moe/opsec/failovers/index.html
-linux homeserver https://blog.nowhere.moe/opsec/linux/index.html
-qemu hypervisor https://blog.nowhere.moe/opsec/hypervisorsetup/index.html
-pfsense qemu VM as showcased in https://blog.nowhere.moe/opsec/pf_virt/index.html
-isolated LAN network for the VMs also as showcased in https://blog.nowhere.moe/opsec/pf_virt/index.html
Starting from a setup where you have:
-a pfsense VM
-an isolated LAN network
-and a debian VM in that LAN network
-a HDD with a VC hidden volume of 100GB (pfsense 20gb, debian 60gb)
To be showcased:
-how to move that debian VM in a veracrypt hidden container (shut it down and then move it in there)
-clone that debian VM to another debian VM B
-rename debian VM A to "Tor bridge VM (with VPN)"
-rename debian VM B to "hidden service VM 1"
-setup mullvadVPN on that VM for a "serverside -> VPN -> tor -> clients" setup
-Then mention the automating deniability protection w/ emergency shutdown script as showcased in https://blog.nowhere.moe/opsec/physicalsecurity/index.html
-How to setup the firewall on the pfsense VM to only allow the "Tor Bridge VM (with VPN)" to access the WAN, and how to restrict any other host in the LAN network (such as the "Hidden service VM 1") to only access the "tor bridge VM"
-then on the "tor bridge (with vpn) VM" setup the tor bridge, with a mullvad connection ( "serverside -> VPN -> tor -> clients" setup)
-Then setup tor on the hidden service VM, and configure it to use the "tor bridge VM" as the bridge to connect to tor.
-Then setup the actual hidden service (on some basic local nginx service on port 80) saying "welcome to blahblah.onion"