Thank you, you're the best of us.
Nanochan
I am going to look for a vulnerability
server's down
it's not, fucking retard, works perfectly fine for me on the hidden service
You can probably do a XSS attack using the log page if you have a board owner or admin account.
it was possible, but I've fixed it now, thanks for pointing it out
regardless, I made a board owner account (board owner of /test/)
username: xss
password: 123456
p. cool. I was able to post these "tor on openbsd" intructions to nano /g/ without any trouble. tor 8ch wouldn't take the post from surf though. Probably need TorBrowser for 8ch, or some extra captcha juggling.
$ pkg_add tor
edit /etc/tor/torrc:
uncomment SOCKSPort (127.0.0.1:9050)
add "ORPort 0" to disable relaying (skip this if you can afford it and want greater discalaimability -- the ability to say "nah I have no idea how those packets came from my machine")
uncomment ExitRelay (0)
pkg_add polipo
edit /etc/polipo/torrc:
uncomment socksParentProxy (localhost:9050) and socksProxyType (socks5)
uncomment one of the memory options
uncomment localDocumentRoot to disable web server
$ rcctl enable tor
$ rcctl start tor
$ rcctl enable polipo
$ rcctl start polipo
want nyx? not necessary but can use to confirm configuration and monitor tor. If you followed above, second line should read "Relaying Disabled, Control Port (password): 9051"
$ pkg_add nyx
edit /etc/tor/torrc:
uncomment ControlPort (9051)
uncomment HashedControlPassword (generate with tor --hash-password)
$ rcctl restart tor
$ nyx
once polipo and tor are running, you'll want to use polipo as an HTTP proxy, so it can then use tor as a SOCKS proxy, so tor can then make a connection through the tor network. On your end, all you need is to set an environment variable for w3m/surf. You probably don't want these set all the time, so better to make a script.
HTTP_PROXY=127.0.0.1:8123 w3m nanochanxv2lxnqi.onion
http_proxy=127.0.0.1:8123 surf nanochanxv2lxnqi.onion
example script to support just "script_name blah.onion" usage:#! /bin/sh http_proxy=127.0.0.1:8123 exec surf $1
speaking of code blocks...-- Turn nanochan-formatting into html.function post.nano2html(text) local text = "\n" .. text .. "\n"; text = text:gsub(">>(%d+)", ">>%1"); text = text:gsub(">>>/([%d%l]-)/", ">>>/%1/"); text = text:gsub("(https?://)(.-)%s", "%1%2 "); text = text:gsub("\n>(.-)\n", "\n>%1\n"); text = text:gsub("\n<(.-)\n", "\n<%1\n"); text = text:gsub("%(%(%((.-)%)%)%)", "(((%1)))"); text = text:gsub("==(.-)==", "%1"); text = text:gsub("%*%*(.-)%*%*", "%1"); text = text:gsub("~~(.-)~~", "%1"); text = text:gsub("__(.-)__", "%1"); text = text:gsub("'''(.-)'''", "%1"); text = text:gsub("''(.-)''", "%1"); text = text:gsub("\n", ""); return text;end
not the worst piece of spaghetti I've written...
any reccomendations on how to do it better?
I think it's fine. Anything else is going to look about as ugly. If performance is ever a problem, you can just use some PCRE bindings.
it lacks a code block though