mirror of
https://github.com/quasar/Quasar.git
synced 2026-04-25 23:35:58 +03:00
[GH-ISSUE #472] Tor Support #250
Labels
No labels
bug
bug
cant-reproduce
discussion
duplicate
easy
enhancement
help wanted
improvement
invalid
need more info
pull-request
question
wont-add
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/Quasar#250
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @zero77 on GitHub (Jun 29, 2016).
Original GitHub issue: https://github.com/quasar/Quasar/issues/472
Can you add the option of Tor support so all traffic that is sent between the bots and C&C is sent through Tor. As this will add extra security and get rid of the need for VPNs and DDNS like no-ip.
@0xE232FE commented on GitHub (Aug 30, 2016):
Its already working! You can redirect all Sockets over TOR even QuasarRAT! There is no Limit in Tor!
Pleas Read the Tor References about Hidden Services! There you find how to do that!
You never be forced to use DDNS!
@superguard commented on GitHub (Dec 23, 2016):
how to direct traffic from the client through the tor?
@kkar commented on GitHub (Dec 26, 2016):
That would be interesting. If you could give us some more information it would be appreciated. Thank you!
@EnricoVogt commented on GitHub (Jan 13, 2017):
@kkar commented on GitHub (Jan 27, 2017):
It won't work just like that. Where is the onion-hostname part?
@life-coder commented on GitHub (Mar 15, 2017):
I'm gonna do it as followed:
_handle(Client) will be a ProxySocket instead of a socket. If Settings.TOR = true then it will download tor and run it(background) then the Socket will connect trough a random socks port to the hidden service(control server) For the control server I'm thinking of using a ephemeral hidden service? On request generate a tor key and on every start(if autolisten is turned on) it will auto start the service again. But then you would need to save the private key to maybe the settings file, which is unsafe, maybe some sort of encryption before writing to a file? Need a suggestion on that
@kkar commented on GitHub (Mar 19, 2017):
@matteke-games you don't need to do that. Let us set up the hidden service manually, it's not a problem at all. The main "problem" (feature i'd say) is the connection itself. I've found a guy who compiled TOR in to a single executable. Do you want me to search my bookmarks and find the link, to help you avoid all of these useless tor dependencies?
@abdullah2993 commented on GitHub (Mar 19, 2017):
Bundling tor with the client is not really a good option besides you have to add "proper" socks support to the client so....
@abdullah2993 commented on GitHub (Mar 19, 2017):
Also instead of a single statically compiled binary of tor you can have the client download the tor expert bundle and extract it but still need socks5 support on the client...
@life-coder commented on GitHub (Mar 20, 2017):
@kkar I want to provide ease of use for everyone as not everyone can setup a hidden service and @Abdullah2993 I'm going to use a modified version of TorSharp for this
@kkar commented on GitHub (Aug 14, 2017):
Hello, is there any update on this subject? Thanks again for this awesome project.
@SkepticTiqer commented on GitHub (Jun 15, 2018):
Can someone update when this is done, if ever?