From f876a87690c9c701a5916a5a182ff829b53390cd Mon Sep 17 00:00:00 2001 From: intelbot Date: Fri, 24 Jun 2016 18:26:57 -0400 Subject: [PATCH] Initial push containing dockerfile and scripts to build image --- Dockerfile | 81 +++++++++ LICENSE | 340 ++++++++++++++++++++++++++++++++++++ config/tor-apt-sources.list | 2 + config/torr.working | 86 +++++++++ config/torrc | 49 ++++++ config/torrc.da | 40 +++++ docker-compose.yml | 50 ++++++ scripts/da_fingerprint | 12 ++ scripts/docker-entrypoint | 117 +++++++++++++ 9 files changed, 777 insertions(+) create mode 100644 Dockerfile create mode 100644 LICENSE create mode 100644 config/tor-apt-sources.list create mode 100644 config/torr.working create mode 100644 config/torrc create mode 100644 config/torrc.da create mode 100644 docker-compose.yml create mode 100755 scripts/da_fingerprint create mode 100755 scripts/docker-entrypoint diff --git a/Dockerfile b/Dockerfile new file mode 100644 index 0000000..f692e3a --- /dev/null +++ b/Dockerfile @@ -0,0 +1,81 @@ +# +# Dockerfile for the Private Tor Network +# +# This is a dockerfile to build a Debian host and +# compile a version of tor from the Tor apt repos. +# NOTE: This is a modification of chriswayg's solid +# base. +# +# Usage: +# This works best using a docker compose command so you can run the +# necessary other servers for it to talk to. But if you want o run +# manually: +# +# docker run --rm -it -e ROLE=DA antitree/tor-server /bin/bash + +FROM debian:jessie +MAINTAINER Antitree antitree@protonmail.com + +# Sets the nickname if you didn't set one, default ports, and the path +# where to mount the key material used by the clients. +ENV TOR_NICKNAME=Tor4 \ + TERM=xterm \ + TOR_ORPORT=7000 \ + TOR_DIRPORT=9030 \ + TOR_DIR=/tor + +# Add the official torproject.org Debian Tor repository +# - this will always build/install the latest stable version +COPY ./config/tor-apt-sources.list /etc/apt/sources.list.d/ + +# Build & Install: +# - add the gpg key used to sign the packages +# - install build dependencies (and nano) +# - add a 'builder' user for compiling the package as a non-root user +# - build Tor in ~/debian-packages and install the new Tor package +# - backup torrc & cleanup all dependencies and caches +# - adds only 13 MB to the Debian base image (without obfsproxy, which adds another 60 MB) +# TODO: Allow selection of which version of tor to build +RUN gpg --keyserver keys.gnupg.net --recv 886DDD89 && \ + gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add - && \ + apt-get update && \ + build_deps="build-essential fakeroot devscripts quilt libssl-dev zlib1g-dev libevent-dev \ + asciidoc docbook-xml docbook-xsl xmlto dh-apparmor libseccomp-dev dh-systemd \ + libsystemd-dev pkg-config dh-autoreconf hardening-includes" && \ + DEBIAN_FRONTEND=noninteractive apt-get -y --no-install-recommends install $build_deps \ + obfsproxy \ + tor-geoipdb \ + init-system-helpers \ + pwgen \ + nano && \ + adduser --disabled-password --gecos "" builder && \ + su builder -c 'mkdir -v ~/debian-packages; cd ~/debian-packages && \ + apt-get -y source tor && \ + cd tor-* && \ + debuild -rfakeroot -uc -us' && \ + dpkg -i /home/builder/debian-packages/tor_*.deb && \ + mv -v /etc/tor/torrc /etc/tor/torrc.default && \ + deluser --remove-home builder && \ + apt-get -y purge --auto-remove $build_deps && \ + apt-get clean && rm -r /var/lib/apt/lists/* + +# Copy the base tor configuration file +COPY ./config/torrc* /etc/tor/ + +# Copy docker-entrypoint and the fingerprint script +COPY ./scripts/ /usr/local/bin/ + +# Persist data (Usually don't want this) +#VOLUME /etc/tor /var/lib/tor + +# Create the shared directory +RUN mkdir ${TOR_DIR} + +# ORPort, DirPort, ObfsproxyPort +# TODO make these match the env variables +# TODO is this necessary anymore? +EXPOSE 9001 9030 54444 + +ENTRYPOINT ["docker-entrypoint"] + +CMD ["tor", "-f", "/etc/tor/torrc"] diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..8cdb845 --- /dev/null +++ b/LICENSE @@ -0,0 +1,340 @@ + GNU GENERAL PUBLIC LICENSE + Version 2, June 1991 + + Copyright (C) 1989, 1991 Free Software Foundation, Inc., + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public +License is intended to guarantee your freedom to share and change free +software--to make sure the software is free for all its users. This +General Public License applies to most of the Free Software +Foundation's software and to any other program whose authors commit to +using it. (Some other Free Software Foundation software is covered by +the GNU Lesser General Public License instead.) You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish), that you receive source code or can get it +if you want it, that you can change the software or use pieces of it +in new free programs; and that you know you can do these things. + + To protect your rights, we need to make restrictions that forbid +anyone to deny you these rights or to ask you to surrender the rights. +These restrictions translate to certain responsibilities for you if you +distribute copies of the software, or if you modify it. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must give the recipients all the rights that +you have. You must make sure that they, too, receive or can get the +source code. And you must show them these terms so they know their +rights. + + We protect your rights with two steps: (1) copyright the software, and +(2) offer you this license which gives you legal permission to copy, +distribute and/or modify the software. + + Also, for each author's protection and ours, we want to make certain +that everyone understands that there is no warranty for this free +software. If the software is modified by someone else and passed on, we +want its recipients to know that what they have is not the original, so +that any problems introduced by others will not reflect on the original +authors' reputations. + + Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that redistributors of a free +program will individually obtain patent licenses, in effect making the +program proprietary. To prevent this, we have made it clear that any +patent must be licensed for everyone's free use or not licensed at all. + + The precise terms and conditions for copying, distribution and +modification follow. + + GNU GENERAL PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. This License applies to any program or other work which contains +a notice placed by the copyright holder saying it may be distributed +under the terms of this General Public License. The "Program", below, +refers to any such program or work, and a "work based on the Program" +means either the Program or any derivative work under copyright law: +that is to say, a work containing the Program or a portion of it, +either verbatim or with modifications and/or translated into another +language. (Hereinafter, translation is included without limitation in +the term "modification".) Each licensee is addressed as "you". + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of +running the Program is not restricted, and the output from the Program +is covered only if its contents constitute a work based on the +Program (independent of having been made by running the Program). +Whether that is true depends on what the Program does. + + 1. You may copy and distribute verbatim copies of the Program's +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the +notices that refer to this License and to the absence of any warranty; +and give any other recipients of the Program a copy of this License +along with the Program. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + 2. You may modify your copy or copies of the Program or any portion +of it, thus forming a work based on the Program, and copy and +distribute such modifications or work under the terms of Section 1 +above, provided that you also meet all of these conditions: + + a) You must cause the modified files to carry prominent notices + stating that you changed the files and the date of any change. + + b) You must cause any work that you distribute or publish, that in + whole or in part contains or is derived from the Program or any + part thereof, to be licensed as a whole at no charge to all third + parties under the terms of this License. + + c) If the modified program normally reads commands interactively + when run, you must cause it, when started running for such + interactive use in the most ordinary way, to print or display an + announcement including an appropriate copyright notice and a + notice that there is no warranty (or else, saying that you provide + a warranty) and that users may redistribute the program under + these conditions, and telling the user how to view a copy of this + License. (Exception: if the Program itself is interactive but + does not normally print such an announcement, your work based on + the Program is not required to print an announcement.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Program, +and can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based +on the Program, the distribution of the whole must be on the terms of +this License, whose permissions for other licensees extend to the +entire whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Program. + +In addition, mere aggregation of another work not based on the Program +with the Program (or with a work based on the Program) on a volume of +a storage or distribution medium does not bring the other work under +the scope of this License. + + 3. You may copy and distribute the Program (or a work based on it, +under Section 2) in object code or executable form under the terms of +Sections 1 and 2 above provided that you also do one of the following: + + a) Accompany it with the complete corresponding machine-readable + source code, which must be distributed under the terms of Sections + 1 and 2 above on a medium customarily used for software interchange; or, + + b) Accompany it with a written offer, valid for at least three + years, to give any third party, for a charge no more than your + cost of physically performing source distribution, a complete + machine-readable copy of the corresponding source code, to be + distributed under the terms of Sections 1 and 2 above on a medium + customarily used for software interchange; or, + + c) Accompany it with the information you received as to the offer + to distribute corresponding source code. (This alternative is + allowed only for noncommercial distribution and only if you + received the program in object code or executable form with such + an offer, in accord with Subsection b above.) + +The source code for a work means the preferred form of the work for +making modifications to it. For an executable work, complete source +code means all the source code for all modules it contains, plus any +associated interface definition files, plus the scripts used to +control compilation and installation of the executable. However, as a +special exception, the source code distributed need not include +anything that is normally distributed (in either source or binary +form) with the major components (compiler, kernel, and so on) of the +operating system on which the executable runs, unless that component +itself accompanies the executable. + +If distribution of executable or object code is made by offering +access to copy from a designated place, then offering equivalent +access to copy the source code from the same place counts as +distribution of the source code, even though third parties are not +compelled to copy the source along with the object code. + + 4. You may not copy, modify, sublicense, or distribute the Program +except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense or distribute the Program is +void, and will automatically terminate your rights under this License. +However, parties who have received copies, or rights, from you under +this License will not have their licenses terminated so long as such +parties remain in full compliance. + + 5. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Program or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Program (or any work based on the +Program), you indicate your acceptance of this License to do so, and +all its terms and conditions for copying, distributing or modifying +the Program or works based on it. + + 6. Each time you redistribute the Program (or any work based on the +Program), the recipient automatically receives a license from the +original licensor to copy, distribute or modify the Program subject to +these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties to +this License. + + 7. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot +distribute so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you +may not distribute the Program at all. For example, if a patent +license would not permit royalty-free redistribution of the Program by +all those who receive copies directly or indirectly through you, then +the only way you could satisfy both it and this License would be to +refrain entirely from distribution of the Program. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system, which is +implemented by public license practices. Many people have made +generous contributions to the wide range of software distributed +through that system in reliance on consistent application of that +system; it is up to the author/donor to decide if he or she is willing +to distribute software through any other system and a licensee cannot +impose that choice. + +This section is intended to make thoroughly clear what is believed to +be a consequence of the rest of this License. + + 8. If the distribution and/or use of the Program is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Program under this License +may add an explicit geographical distribution limitation excluding +those countries, so that distribution is permitted only in or among +countries not thus excluded. In such case, this License incorporates +the limitation as if written in the body of this License. + + 9. The Free Software Foundation may publish revised and/or new versions +of the General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and conditions +either of that version or of any later version published by the Free +Software Foundation. If the Program does not specify a version number of +this License, you may choose any version ever published by the Free Software +Foundation. + + 10. If you wish to incorporate parts of the Program into other free +programs whose distribution conditions are different, write to the author +to ask for permission. For software which is copyrighted by the Free +Software Foundation, write to the Free Software Foundation; we sometimes +make exceptions for this. Our decision will be guided by the two goals +of preserving the free status of all derivatives of our free software and +of promoting the sharing and reuse of software generally. + + NO WARRANTY + + 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN +OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES +PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED +OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS +TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE +PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, +REPAIR OR CORRECTION. + + 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE +POSSIBILITY OF SUCH DAMAGES. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +convey the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + {description} + Copyright (C) {year} {fullname} + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License along + with this program; if not, write to the Free Software Foundation, Inc., + 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + +Also add information on how to contact you by electronic and paper mail. + +If the program is interactive, make it output a short notice like this +when it starts in an interactive mode: + + Gnomovision version 69, Copyright (C) year name of author + Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, the commands you use may +be called something other than `show w' and `show c'; they could even be +mouse-clicks or menu items--whatever suits your program. + +You should also get your employer (if you work as a programmer) or your +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. Here is a sample; alter the names: + + Yoyodyne, Inc., hereby disclaims all copyright interest in the program + `Gnomovision' (which makes passes at compilers) written by James Hacker. + + {signature of Ty Coon}, 1 April 1989 + Ty Coon, President of Vice + +This General Public License does not permit incorporating your program into +proprietary programs. If your program is a subroutine library, you may +consider it more useful to permit linking proprietary applications with the +library. If this is what you want to do, use the GNU Lesser General +Public License instead of this License. + diff --git a/config/tor-apt-sources.list b/config/tor-apt-sources.list new file mode 100644 index 0000000..035d906 --- /dev/null +++ b/config/tor-apt-sources.list @@ -0,0 +1,2 @@ +deb http://deb.torproject.org/torproject.org jessie main +deb-src http://deb.torproject.org/torproject.org jessie main diff --git a/config/torr.working b/config/torr.working new file mode 100644 index 0000000..460deaa --- /dev/null +++ b/config/torr.working @@ -0,0 +1,86 @@ +### /etc/torrc ### +# see /etc/torrc/torrc.default and https://www.torproject.org/docs/tor-manual.html.en + +# Server's public IP Address (usually automatic) +#Address 10.10.10.10 + +# Port to advertise for incoming Tor connections. +# common ports are 9001, 443 +#ORPort 9001 + +# Mirror directory information for others (optional) +# common ports are 9030, 80 +#DirPort 9030 + +# Run as a relay only (not as an exit node) +#ExitPolicy reject *:* # no exits allowed + +# Set limits +#RelayBandwidthRate 1024 KB # Throttle traffic to +#RelayBandwidthBurst 2048 KB # But allow bursts up to +#MaxMemInQueues 512 MB # Limit Memory usage to + +# Run Tor as obfuscated bridge +#ServerTransportPlugin obfs3 exec /usr/bin/obfsproxy managed +#ServerTransportListenAddr obfs3 0.0.0.0:54444 +#BridgeRelay 1 + +# Run Tor only as a server (no local applications) +SocksPort 0 + +# Run Tor as a regular user (do not change this) +User debian-tor +# If no Nickname or ContactInfo is set, docker-entrypoint will use +# the environment variables to add Nickname/ContactInfo here +#Nickname Tor4 # only use letters and numbers +#ContactInfo email@example.org + +# Private tor network configuration +TestingTorNetwork 1 +RunAsDaemon 0 +ConnLimit 60 +ShutdownWaitLength 0 +PidFile /var/lib/tor/pid +Log notice stdout + +ProtocolWarnings 1 +SafeLogging 0 +DisableDebuggerAttachment 0 + +# An exit policy that allows exiting to IPv4 LAN +#ExitPolicy accept *:* + +# An exit policy that allows exiting to IPv6 localhost +#ExitPolicy accept [::1]:* +#IPv6Exit 1 + +ServerDNSAllowBrokenConfig 1 +DirAllowPrivateAddresses 1 +EnforceDistinctSubnets 0 +AssumeReachable 1 +AuthDirMaxServersPerAddr 0 +AuthDirMaxServersPerAuthAddr 0 +ClientDNSRejectInternalAddresses 0 +ClientRejectInternalAddresses 0 +CountPrivateBandwidth 1 +ExitPolicyRejectPrivate 0 +ExtendAllowPrivateAddresses 1 +V3AuthVotingInterval 5 minutes +V3AuthVoteDelay 20 seconds +V3AuthDistDelay 20 seconds +MinUptimeHidServDirectoryV2 0 seconds +TestingEstimatedDescriptorPropagationTime 0 minutes +TestingServerDownloadSchedule 0, 0, 0, 5, 10, 15, 20, 30, 60 +TestingClientDownloadSchedule 0, 0, 5, 10, 15, 20, 30, 60 +TestingServerConsensusDownloadSchedule 0, 0, 5, 10, 15, 20, 30, 60 +TestingClientConsensusDownloadSchedule 0, 0, 5, 10, 15, 20, 30, 60 +TestingBridgeDownloadSchedule 60, 30, 30, 60 +TestingClientMaxIntervalWithoutRequest 5 seconds +TestingDirConnectionMaxStall 30 seconds +TestingConsensusMaxDownloadTries 80 +TestingDescriptorMaxDownloadTries 80 +TestingMicrodescMaxDownloadTries 80 +TestingCertMaxDownloadTries 80 +TestingEnableConnBwEvent 1 +TestingEnableCellStatsEvent 1 +TestingEnableTbEmptyEvent 1 diff --git a/config/torrc b/config/torrc new file mode 100644 index 0000000..a43cd26 --- /dev/null +++ b/config/torrc @@ -0,0 +1,49 @@ +# Run Tor as a regular user (do not change this) +User debian-tor + +TestingTorNetwork 1 + +## Comprehensive Bootstrap Testing Options ## +# These typically launch a working minimal Tor network in 25s-30s, +# and a working HS Tor network in 40-45s. +# See authority.tmpl for a partial explanation +#AssumeReachable 0 +#Default PathsNeededToBuildCircuits 0.6 +#Disable TestingDirAuthVoteExit +#Disable TestingDirAuthVoteHSDir +#Default V3AuthNIntervalsValid 3 + +## Rapid Bootstrap Testing Options ## +# These typically launch a working minimal Tor network in 6s-10s +# These parameters make tor networks bootstrap fast, +# but can cause consensus instability and network unreliability +# (Some are also bad for security.) +AssumeReachable 1 +PathsNeededToBuildCircuits 0.25 +TestingDirAuthVoteExit * +TestingDirAuthVoteHSDir * +V3AuthNIntervalsValid 2 + +## Always On Testing Options ## +# We enable TestingDirAuthVoteGuard to avoid Guard stability requirements +TestingDirAuthVoteGuard * +# We set TestingMinExitFlagThreshold to 0 to avoid Exit bandwidth requirements +TestingMinExitFlagThreshold 0 +# VoteOnHidServDirectoriesV2 needs to be set for HSDirs to get the HSDir flag +#Default VoteOnHidServDirectoriesV2 1 + +## Options that we always want to test ## +Sandbox 1 + +# Private tor network configuration +RunAsDaemon 0 +ConnLimit 60 +ShutdownWaitLength 0 +#PidFile /var/lib/tor/pid +Log info stdout +ProtocolWarnings 1 +SafeLogging 0 +DisableDebuggerAttachment 0 + +DirPortFrontPage /usr/share/doc/tor/tor-exit-notice.html + diff --git a/config/torrc.da b/config/torrc.da new file mode 100644 index 0000000..c717c32 --- /dev/null +++ b/config/torrc.da @@ -0,0 +1,40 @@ +AuthoritativeDirectory 1 +V3AuthoritativeDirectory 1 + +# Speed up the consensus cycle as fast as it will go +# Voting Interval can be: +# 10, 12, 15, 18, 20, 24, 25, 30, 36, 40, 45, 50, 60, ... +# Testing Initial Voting Interval can be: +# 5, 6, 8, 9, or any of the possible values for Voting Interval, +# as they both need to evenly divide 30 minutes. +# If clock desynchronisation is an issue, use an interval of at least: +# 18 * drift in seconds, to allow for a clock slop factor +TestingV3AuthInitialVotingInterval 300 +#V3AuthVotingInterval 15 +# VoteDelay + DistDelay must be less than VotingInterval +TestingV3AuthInitialVoteDelay 5 +V3AuthVoteDelay 5 +TestingV3AuthInitialDistDelay 5 +V3AuthDistDelay 5 +# This is autoconfigured by chutney, so you probably don't want to use it +#TestingV3AuthVotingStartOffset 0 + +# Work around situations where the Exit, Guard and HSDir flags aren't being set +# These flags are all set eventually, but it takes Guard up to ~30 minutes +# We could be more precise here, but it's easiest just to vote everything +# Clients are sensible enough to filter out Exits without any exit ports, +# and Guards and HSDirs without ORPorts +# If your tor doesn't recognise TestingDirAuthVoteExit/HSDir, +# either update your chutney to a 2015 version, +# or update your tor to a later version, most likely 0.2.6.2-final + +# These are all set in common.i in the Comprehensive/Rapid sections +# Work around Exit requirements +#TestingDirAuthVoteExit * +# Work around bandwidth thresholds for exits +#TestingMinExitFlagThreshold 0 +# Work around Guard uptime requirements +#TestingDirAuthVoteGuard * +# Work around HSDir uptime and ORPort connectivity requirements +#TestingDirAuthVoteHSDir * + diff --git a/docker-compose.yml b/docker-compose.yml new file mode 100644 index 0000000..25137fc --- /dev/null +++ b/docker-compose.yml @@ -0,0 +1,50 @@ +version: '2' +services: + da: + image: antitree/tor-server + #restart: always + expose: + - "7000" + - "9030" + - "54444" + environment: + ## set your Nickname here (only use letters and numbers) + #TOR_NICKNAME: DA1 + ROLE: DA + ## an email address to contact you + #CONTACT_EMAIL: email@example.org + volumes: + ## mount custom torrc / secret_id_key here + - ./tor:/tor + relay: + image: antitree/tor-server + expose: + - "7000" + - "9030" + environment: + ROLE: RELAY + volumes: + - ./tor:/tor + depends_on: + - da + exit: + image: antitree/tor-server + expose: + - "7000" + - "9030" + environment: + ROLE: EXIT + volumes: + - ./tor:/tor + depends_on: + - da + client: + image: antitree/tor-server + ports: + - "9050:9050" + volumes: + - ./tor:/tor + environment: + ROLE: CLIENT + depends_on: + - da diff --git a/scripts/da_fingerprint b/scripts/da_fingerprint new file mode 100755 index 0000000..55c152f --- /dev/null +++ b/scripts/da_fingerprint @@ -0,0 +1,12 @@ +#!/bin/sh +# version 2 +TOR_NICK=$(grep "^Nick" /etc/tor/torrc | awk -F ' ' '{print $2}') +AUTH=$(grep "fingerprint" $TOR_DIR/$TOR_NICK/keys/* | awk -F " " '{print $2}') +NICK=$(cat $TOR_DIR/$TOR_NICK/fingerprint| awk -F " " '{print $1}') +RELAY=$(cat $TOR_DIR/$TOR_NICK/fingerprint|awk -F " " '{print $2}') +SERVICE=$(grep "dir-address" $TOR_DIR/$TOR_NICK/keys/* | awk -F " " '{print $2}') +IPADDR=$(ip addr | grep 'state UP' -A2 | tail -n1 | awk '{print $2}' | cut -f1 -d'/') + +TORRC="DirAuthority $NICK orport=${TOR_ORPORT} no-v2 v3ident=$AUTH $SERVICE $RELAY" + +echo $TORRC diff --git a/scripts/docker-entrypoint b/scripts/docker-entrypoint new file mode 100755 index 0000000..7aba6b2 --- /dev/null +++ b/scripts/docker-entrypoint @@ -0,0 +1,117 @@ +#!/bin/bash +set -o errexit + +# Fudge the sleep to try and keep the consensus +#FUDGE=$(( ( RANDOM % 100) + 20 )) +FUDGE=10 + +echo -e "\n========================================================" +# If DataDirectory or secret_id_key is mounted here, it must be owned by the debian-tor user +chown -Rv debian-tor:debian-tor ${TOR_DIR} + +if [ ! -e /tor-config-done ]; then + touch /tor-config-done # only run this once + + # Set appropriate network information + + + # Add a Nickname, if none has been set in torrc + if ! grep -q '^Nickname ' /etc/tor/torrc; then + if [ ${TOR_NICKNAME} == "Tor4" ]; then + # if user did not change the default Nickname, genetrate a random pronounceable one + RPW=$(pwgen -0A 10) + export TOR_NICKNAME=${ROLE}${RPW} + echo "Setting random Nickname: ${TOR_NICKNAME}" + else + echo "Setting chosen Nickname: ${TOR_NICKNAME}" + fi + echo -e "\nNickname ${TOR_NICKNAME}" >> /etc/tor/torrc + fi + + # Add ContactInfo from env variable, if none has been set in torrc + if ! grep -q '^ContactInfo ' /etc/tor/torrc; then + if [ -n "${CONTACT_EMAIL}" ]; then + echo "Setting Contact Email: ${CONTACT_EMAIL}" + echo -e "\nContactInfo ${CONTACT_EMAIL}" >> /etc/tor/torrc + fi + fi + + echo -e "DataDirectory ${TOR_DIR}/${TOR_NICKNAME}" >> /etc/tor/torrc + + case ${ROLE} in + DA) + echo "Setting role to DA" + cat /etc/tor/torrc.da >> /etc/tor/torrc + #if [ -n "${TOR_ORPORT}" ]; then + # TOR_ORPORT=${TOR_ORPORT} + #else + # TOR_ORPORT=7000 + #fi + echo -e "OrPort ${TOR_ORPORT}" >> /etc/tor/torrc + echo -e "Dirport ${TOR_DIRPORT}" >> /etc/tor/torrc + #echo -e "DataDirectory ${TOR_DIR}/${TOR_NICKNAME}" >> /etc/tor/torrc + echo -e "ExitPolicy accept *:*" >> /etc/tor/torrc + KEYPATH=${TOR_DIR}/${TOR_NICKNAME}/keys + mkdir -p ${KEYPATH} + TOR_IP=$(ip addr | grep 'state UP' -A2 | tail -n1 | awk '{print $2}' | cut -f1 -d'/') + echo "Address ${TOR_IP}" >> /etc/tor/torrc + chown -Rv debian-tor:debian-tor ${TOR_DIR} + echo "password" | tor-gencert --create-identity-key -m 12 -a ${TOR_IP}:${TOR_DIRPORT} \ + -i ${KEYPATH}/authority_identity_key \ + -s ${KEYPATH}/authority_signing_key \ + -c ${KEYPATH}/authority_certificate \ + --passphrase-fd 0 + chown -Rv debian-tor:debian-tor ${TOR_DIR} + tor --list-fingerprint --orport 1 \ + --dirserver "x 127.0.0.1:1 ffffffffffffffffffffffffffffffffffffffff" \ + --datadirectory ${TOR_DIR}/${TOR_NICKNAME} + echo "Saving DA fingerprint to shared path" + da_fingerprint >> ${TOR_DIR}/torrc.da + echo "Waiting for other DA's to come up..." + sleep $FUDGE + cat ${TOR_DIR}/torrc.da >> /etc/tor/torrc + ;; + RELAY) + echo "Setting role to RELAY" + echo -e "OrPort ${TOR_ORPORT}" >> /etc/tor/torrc + echo -e "Dirport ${TOR_DIRPORT}" >> /etc/tor/torrc + #echo -e "DataDirectory ${TOR_DIR}/${TOR_NICKNAME}" >> /etc/tor/torrc + echo -e "ExitPolicy accept 172.18.0.0/16:*" >> /etc/tor/torrc + + echo "Waiting for other DA's to come up..." + sleep $FUDGE + cat ${TOR_DIR}/torrc.da >> /etc/tor/torrc + ;; + EXIT) + echo "Setting role to EXIT" + echo -e "OrPort ${TOR_ORPORT}" >> /etc/tor/torrc + echo -e "Dirport ${TOR_DIRPORT}" >> /etc/tor/torrc + #echo -e "DataDirectory ${TOR_DIR}/${TOR_NICKNAME}" >> /etc/tor/torrc + echo -e "ExitPolicy accept *:*" >> /etc/tor/torrc + echo "Waiting for other DA's to come up..." + sleep $FUDGE + cat ${TOR_DIR}/torrc.da >> /etc/tor/torrc + ;; + CLIENT) + echo "Setting role to CLIENT" + echo -e "SOCKSPort 0.0.0.0:9050" >> /etc/tor/torrc + #chown -Rv debian-tor:debian-tor ${TOR_DIR} + sleep $FUDGE + cat ${TOR_DIR}/torrc.da >> /etc/tor/torrc + ;; + *) + echo "Role variable missing" + exit 1 + ;; + esac + +fi + +echo -e "\n========================================================" +# display Tor version & torrc in log +tor --version +cat /etc/tor/torrc +echo -e "========================================================\n" + +# else default to run whatever the user wanted like "bash" +exec "$@"