Jump to content

.tor

From Wikipedia, the free encyclopedia
.tor
Introduced2015
TLD typePseudo-domain-style host suffix
StatusNot in root, but used by OnioNS clients, servers, and proxies
Registrydistributed
Intended useTo facilitate the creation and management of unique, user-friendly domain names for Tor hidden services
StructureNames are requested by users to be mapped to respective .onion domains
Documentshttps://github.com/Jesse-V/OnioNS-literature
Dispute policiesN/A
Registry websitegithub.com/Jesse-V/OnioNS-HS

.tor is a pseudo-top-level domain host suffix implemented by the OnioNS project, which aims to add DNS infrastructure to the Tor network enabling the selection of meaningful and globally-unique domain name for hidden services, which users can then reference from the Tor Browser.

Mission

[edit]

The project aims to address the major usability issue that has been with Tor hidden services since their introduction in 2002.

Overview

[edit]

Beta release of the server, client and domain name reservation tool (so called hidden service) software parts and their supporting common library were announced[1][2] in the Tor developers mailing list in August 2015.

According to the description on the projects gitsite[3] "OnioNS is a distributed, privacy-enhanced, metadata-free, and highly usable DNS for Tor hidden services"

The system is powered by the Tor network, relies on a distributed database, and provides anonymity to both operators and users.

See also

[edit]

References

[edit]
  1. ^ V, Jesse (August 8, 2015). "[tor-dev] First release of OnioNS for beta testing". lists.torproject.org.
  2. ^ "Overview of Tor Alternative Browsers". 2025-01-21. Retrieved 2025-02-01.
  3. ^ "Jesse-V/OnioNS-client". GitHub. 25 October 2020.