All Projects → cathugger → Mkp224o

cathugger / Mkp224o

Licence: other
vanity address generator for tor onion v3 (ed25519) hidden services

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Mkp224o

Hosting
This is a setup for a Tor based shared web hosting server
Stars: ✭ 254 (-36.34%)
Mutual labels:  tor
Torwall
Tallow - Transparent Tor for Windows
Stars: ✭ 346 (-13.28%)
Mutual labels:  tor
Go Libtor
Self-contained Tor from Go
Stars: ✭ 368 (-7.77%)
Mutual labels:  tor
Toriptables2
Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor network.
Stars: ✭ 287 (-28.07%)
Mutual labels:  tor
Debian Privacy Server Guide
Guide to using a remote Debian server for security and privacy services
Stars: ✭ 338 (-15.29%)
Mutual labels:  tor
Ricochet
Anonymous peer-to-peer instant messaging
Stars: ✭ 3,570 (+794.74%)
Mutual labels:  tor
narnia
🚧 EXPERIMENTAL 🚧 Secure hidden service webserver
Stars: ✭ 24 (-93.98%)
Mutual labels:  tor
Warezz
It's illegal cuz they can't tax you!
Stars: ✭ 386 (-3.26%)
Mutual labels:  tor
Docker Onion Nmap
Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.
Stars: ✭ 345 (-13.53%)
Mutual labels:  tor
Kadence
⚠️ KADENCE HAS MOVED TO GITLAB ⚠️
Stars: ✭ 363 (-9.02%)
Mutual labels:  tor
Gokey
A simple vaultless password manager in Go
Stars: ✭ 305 (-23.56%)
Mutual labels:  ed25519
Thgtoa
The Hitchhiker’s Guide to Online Anonymity
Stars: ✭ 326 (-18.3%)
Mutual labels:  tor
Katana
A Python Tool For google Hacking
Stars: ✭ 355 (-11.03%)
Mutual labels:  tor
Tor Browser Selenium
Tor Browser automation with Selenium.
Stars: ✭ 267 (-33.08%)
Mutual labels:  tor
Ed25519 Dalek
Fast and efficient ed25519 signing and verification in Rust.
Stars: ✭ 383 (-4.01%)
Mutual labels:  ed25519
ruantiblock
Использование tor или VPN для доступа к заблокированным сайтам
Stars: ✭ 20 (-94.99%)
Mutual labels:  tor
Freshonions Torscraper
Fresh Onions is an open source TOR spider / hidden service onion crawler hosted at zlal32teyptf4tvi.onion
Stars: ✭ 348 (-12.78%)
Mutual labels:  tor
Jwt
Go JWT signing, verifying and validating
Stars: ✭ 394 (-1.25%)
Mutual labels:  ed25519
Dockerfiles
Discontinued. Fork at your will.
Stars: ✭ 384 (-3.76%)
Mutual labels:  tor
Tribler
Privacy enhanced BitTorrent client with P2P content discovery
Stars: ✭ 3,915 (+881.2%)
Mutual labels:  tor

mkp224o - vanity address generator for ed25519 onion services

This tool generates vanity ed25519 (hidden service version 3, formely known as proposal 224) onion addresses.

Requirements

  • C99 compatible compiler (gcc and clang should work)
  • libsodium (including headers)
  • GNU make
  • GNU autoconf (to generate configure script, needed only if not using release tarball)
  • UNIX-like platform (currently tested in Linux and OpenBSD, but should also build under cygwin and msys2).

For debian-like linux distros, this should be enough to prepare for building:

apt install gcc libsodium-dev make autoconf

Building

./autogen.sh to generate configure script, if it's not there already.

./configure to generate makefile; in *BSD platforms you probably want to use ./configure CPPFLAGS="-I/usr/local/include" LDFLAGS="-L/usr/local/lib".

On AMD64 platforms, you probably also want to pass something like --enable-amd64-51-30k to configure script for faster key generation; run ./configure --help to see all available options.

Finally, make to start building (gmake in *BSD platforms).

Usage

Generator needs one or more filters to work.

It makes directory with secret/public keys and hostname for each discovered service. By default root is current directory, but that can be overridden with -d switch.

Use -s switch to enable printing of statistics, which may be useful when benchmarking different ed25519 implementations on your machine.

Use -h switch to obtain all available options.

I highly recommend reading OPTIMISATION.txt for performance-related tips.

FAQ and other useful info

  • How do I generate address?

    Once compiled, run it like ./mkp224o neko, and it will try creating keys for onions starting with "neko" in this example; use ./mkp224o -d nekokeys neko to not litter current directory and put all discovered keys in directory named "nekokeys".

  • How do I make tor use generated keys?

    Copy key folder (though technically only hs_ed25519_secret_key is required) to where you want your service keys to reside:

    sudo cp -r neko54as6d54....onion /var/lib/tor/nekosvc
    

    You may need to adjust ownership and permissions:

    sudo chown -R tor: /var/lib/tor/nekosvc
    sudo chmod -R u+rwX,og-rwx /var/lib/tor/nekosvc
    

    Then edit torrc and add new service with that folder.
    After reload/restart tor should pick it up.

  • Generate addresses with 1-2 and 7-9 digits?

    Onion addresses use base32 encoding which does not include 0,1,8,9 numbers.
    So no, that's not possible to generate these, and mkp224o tries to detect invalid filters containing them early on.

  • How long is it going to take?

    Because of probablistic nature of brute force key generation, and varience of hardware it's going to run on, it's hard to make promisses about how long it's going to take, especially when the most of users want just a few keys.
    See this issue for very valuable discussion about this.
    If your machine is powerful enough, 6 character prefix shouldn't take more than few tens of minutes, if using batch mode (read OPTIMISATION.txt) 7 characters can take hours to days.
    No promisses though, it depends on pure luck.

  • Will this work with onionbalance?

    It appears that onionbalance supports loading usual hs_ed25519_secret_key key so it should work.

Contact

For bug reports/questions/whatever else, email cathugger at cock dot li.
PGP key, if needed, can be found at http://cathug2kyi4ilneggumrenayhuhsvrgn6qv2y47bgeet42iivkpynqad.onion/contact.html.

Acknowledgements & Legal

To the extent possible under law, the author(s) have dedicated all copyright and related and neighboring rights to this software to the public domain worldwide. This software is distributed without any warranty. You should have received a copy of the CC0 Public Domain Dedication along with this software. If not, see CC0.

  • keccak.c is based on Keccak-more-compact.c
  • ed25519/{ref10,amd64-51-30k,amd64-64-24k} are adopted from SUPERCOP
  • ed25519/ed25519-donna adopted from ed25519-donna
  • Idea used in worker_fast() is stolen from horse25519
  • base64 routines and initial YAML processing work contributed by Alexander Khristoforov (heios at protonmail dot com)
  • Passphrase-based generation code and idea used in worker_batch() contributed by foobar2019
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].