<?php
/**
 * <https://y.st./>
 * Copyright © 2016 Alex Yst <mailto:copyright@y.st>
 * 
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.
 * 
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 * GNU General Public License for more details.
 * 
 * You should have received a copy of the GNU General Public License
 * along with this program. If not, see <https://www.gnu.org./licenses/>.
**/

$xhtml = array(
	'<{title}>' => 'Relay service',
	'<{body}>' => <<<END
<p>
	I did not sleep well last night.
	I woke up at about four and couldn&apos;t get back to sleep.
</p>
<p>
	I began my <a href="http://sbuk7aqcxkoyipwv.onion/">onion-to-clearnet</a> forwarding service today to aid in bypassing $a[Tor] blocks.
	I obviously can&apos;t use it myself, as my own $a[IP] address acts as the exit, but perhaps someone can make use of it.
	Unfortunately, I set up the website for the server over $a[HTTP] instead of $a[HTTPS].
	I much prefer $a[HTTPS], but a lot of onionlanders don&apos;t.
	This service is for them, not me, and encryption is already supplied by $a[Tor], so I&apos;ll do it their way.
	I&apos;ve also decided to use the high ports, not the low ports, for forwarding.
	Many of the low ports have specific services that they are assumed to run.
	If I end up needing one of those ports after I&apos;ve already assigned it for forwarding, it will be too late.
	As such, I&apos;ve decided to use the ports in the 49152-65535 range, as they are currently defined as ports that will not be assigned any specific service.
	If the $a[IANA] decides to change this, some network changes will be to be expected, so there won&apos;t be any issues with me reclaiming ports; it wasn&apos;t my fault, I took reasonable precautions.
	<a href="https://opalrwf4mzmlfmag.onion/">Wowaname</a> suggested allowing other people to share their $a[IP] addresses in the same way, using my onion to forward to random volunteer machines in a round-robin-type way.
	I&apos;m not sure who would volunteer, but it seems like it would be easy to set up on their end.
	The simplest way would probably be to set up port forwarding in their home router configuration.
	They wouldn&apos;t even need to install $a[Tor], though of course I recommend installing and using $a[Tor] to everyone.
	I thought about adding freenode to my forwarding configuration, but due to the fact that I don&apos;t want to play &quot;favorites&quot; with $a[Tor]-haters, I didn&apos;t want to add any specific services until they were requested.
	<a href="https://ronsor.net/">Ronsor</a> quickly suggested <a href="ircs://sbuk7aqcxkoyipwv.onion:49152/">freenode</a> (once people were actually awake), so that resolved that issue.
</p>
<p>
	While discussing ways to get multiple $a[IP] addresses to be usable for relay service, wowaname and I were discussing on <a href="ircs://kitsune6uv4dtdve.onion:6697/%23Volatile">#Volatile</a> how nice round robin support for onion addresses.
	One hidden service node can relay to multiple servers, but multiple hidden service nodes cannot use the same onion address like can be done in $a[DNS].
	Cathugger knew of an article about <a href="https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/">horizontal scalability of hidden services</a>.
	With the techniques the author suggests, it is possible to get up to sixty separate machines at separate locations to receive requests meant for a single onion address.
	These sixty machines are all registered with the $a[Tor] network without any changes to the underlying infrastructure.
	The only things changed are on the machines that hold the private onion key.
	It sounds a bit difficult to deploy and custom code is needed, but it might get people thinking about the need to share onion addresses between machines like this.
	It might lead to changes in how $a[Tor] fundamentally handles hidden services.
	Even if it doesn&apos;t lead to changes, it provides an option for large services that really need more room to grow on the $a[Tor] network.
</p>
<p>
	When the local community college said that they would send me a gift card, I assumed that it was a use-anywhere prepaid type of gift card.
	That was a naïve assumption on my part.
	The card arrived in the mail today and it&apos;s a gift card for their in-house book store.
	As the card dosen&apos;t have much on it and I don&apos;t know if I&apos;ll be attending this school, it&apos;s little more than an amusing novelty item.
	Still, it got me to submit my feedback for their orientation.
	I was going to do that anyway, but this helped make sure I did it in a timely manner.
</p>
<p>
	Our mother, Cyrus, Vanessa, and I volunteered at a spaghetti-serving fund raiser today.
	We told them that we were there to help, then waited a couple hours for them to be ready for help.
	We were pretty much just wasting time unable to do anything, so we asked if they even needed us.
	They told us that they didn&apos;t even want our help.
	Why didn&apos;t they just tell us that from the beginning? While I was waiting, I thought about the fact that my <a href="/en/domains/accessed574tizbu.onion.xhtml">accessed574tizbu</a> onion would have been a cool address for my forwarding service because it helps people access malicious servers, but I&apos;m going to continue using my <a href="/en/domains/sbuk7aqcxkoyipwv.onion.xhtml">sbuk7aqcxkoyipwv</a> onion.
</p>
<p>
	It seems that Ronsor will be away for three weeks.
</p>
<p>
	Wowaname decided that she wanted her $a[Tor]-to-IRC2P onion to be &quot;listed&quot; on my forwarding service.
	It seemed pretty strange to me.
	I&apos;m not sure she understood that it was a forwarding service, not a listing of forwarding services.
	However, it seemed like it could be of benefit to $a[Tor] users, as it does provide access to a service not normally reachable over $a[Tor], so I went with it.
	However, I didn&apos;t want it to look like my forwarding service was not up to forwarding to other darknets and that this burden had to fall to others.
	To fix this, I set up $a[I2P] on my server and forwarded one of my onion ports to <a href="irc://sbuk7aqcxkoyipwv.onion:49153/">IRC2P</a> as well.
	If I chance upon any other services similar to mine, I&apos;ll add them to my list and forward to their destinations in parallel.
	A little redundancy doesn&apos;t hurt.
	While the onion-to-clearnet ports are nice for getting access to places without giving into their ridiculous anti-privacy agendas, the onion-to-other-darnet ports are nice for convenience.
</p>
<p>
	As I was installing <a href="apt:i2p">$a[I2P]</a> on my server, I decided to install it <a href="https://geti2p.net/en/download/debian#debian">from a package</a>, unlike on my client machine.
	Installation went fine, but I found that $a[I2P]&apos;s package, being from a non-Debian party, is not set up to start itself as a system service.
	You still need to run <code>i2prouter start</code> to start it each time you start the system, unless you script something to take care of that.
	$a[I2P]&apos;s strange (in my opinion) setup of binding ports to services made it ridiculously easy to forward between darknets.
	It also didn&apos;t hurt that one of the default port bindings was pointed directly to the service that I needed in this case.
</p>
END
);
