Add documentation for serving remote RTL connections over Tor (#100)

* Update README.md

* Create & Update RTL_TOR_setup.md
pull/105/head
seth586 5 years ago committed by saubyk
parent d458f24869
commit 0d887380be

@ -158,7 +158,7 @@ E.g. if the IP address of your node is 192.168.0.15 then open your browser at th
3. Config tweaks for running RTL server and LND on separate devices on the same network can be found [here](RTL_setups.md).
4. Any Other setup: **Please be advised, if you are accessing your node remotely via RTL, its critical to encrypt the communication via use of https. You can use solutions like nginx and letsencrypt to setup https access for RTL.** A sample SSL setup guide can be found [here](RTL_SSL_setup.md)
4. Any Other setup: **Please be advised, if you are accessing your node remotely via RTL, its critical to encrypt the communication via use of https. You can use solutions like nginx and letsencrypt to setup https access for RTL.** A sample SSL setup guide can be found [here](RTL_SSL_setup.md) You can also serve remote access over an encrypted Tor connection. A setup guide can be found [here](RTL_TOR_setup.md)
### <a name="trouble"></a>Troubleshooting
In case you are running into issues with the application or if you have feedback, feel free to open issues on our github repo.

@ -0,0 +1,54 @@
### Connect to RTL remotely over Tor
This guide will allow you to remotely connect to RTL over Tor. This can work on any platform, the below example is for serving an android and windows client.
#### Server Setup
Install Tor on the same local machine as RTL. see the tor project wiki [here](https://trac.torproject.org/projects/tor/wiki)
Edit the `torrc` configuration file, and add the following lines:
```
HiddenServiceDir /var/db/tor/rtl/
HiddenServiceVersion 2
HiddenServiceAuthorizeClient stealth mydevice
HiddenServicePort 3000 127.0.0.1:3000
```
Change `/var/db/tor/rtl/` to any directory you want to store the hidden service credentials.
Change `mydevice` to anything you want.
Save the changes to the `torrc` file and restart tor.
View the contents of the file `/var/db/tor/rtl/hostname`. It will show an onion address, an authentication password(cookie), and the associated `mydevice` label.
#### Client setup: Android
Download Orbot for android (add their repos to F-Droid here: https://guardianproject.info/fdroid/
Open orbot. Click the `⋮`, select `hidden services ˃`, select `Client cookies`.
Press the + button on the lower right. Type in the the onion address and secret cookie you revealed in file `/var/lnd/tor/rtl/hostname`.
Go back to orbot's main screen, and select the gear icon under `tor enabled apps`.
Add your favorite tor compatible browser (I use brave) `Brave`, then press back.
Click `stop` on the big onion logo. Exit orbot and reopen it.
Turn on `VPN Mode`. Start your connection to the tor network by clicking on the big onion (if it has not automatically connected already)
Now open the tor enabled browser and type in the onion address (example `z1234567890abc.onion:3000`)
Only you have access to this website! All traffic in the brave browser will go over Tor (which is slower than clearnet).
To go back to clearnet browsing, turn off VPN mode in Orbot.
#### Client setup: Windows Tor Browser
Download and install Tor Browser for windows: https://www.torproject.org/download/
In Windows, edit `"%HOMEDRIVE%%HOMEPATH%"\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc`
Add the following line. Replace the onion address, password(cookie), and mydevice with your credentials:
```
HidServAuth 1234567890abcdefg.onion abcdef01234567890+/K mydevice
```
Save and exit.
Now open Tor Browser, type in the `1234567890abcdefg.onion:3000` address!
Loading…
Cancel
Save