.exit
   HOME

TheInfoList



OR:

.onion is a special-use
top-level domain A top-level domain (TLD) is one of the domain name, domains at the highest level in the hierarchical Domain Name System of the Internet after the root domain. The top-level domain names are installed in the DNS root zone, root zone of the nam ...
name designating an anonymous
onion service Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traff ...
, which was formerly known as a "hidden service", reachable via the
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as
web browser A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
s can access sites with .onion
addresses An address is a collection of information, presented in a mostly fixed format, used to give the location of a building, apartment, or other structure or a plot of land, generally using border, political boundaries and street names as references, ...
by sending the request through the Tor network. The "onion" name refers to
onion routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series o ...
, the technique used by Tor to achieve a degree of
anonymity Anonymity describes situations where the acting person's identity is unknown. Anonymity may be created unintentionally through the loss of identifying information due to the passage of time or a destructive event, or intentionally if a person cho ...
. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider. Sites that offer dedicated .onion addresses may provide an additional layer of identity assurance via EV HTTPS Certificates. Provision of an onion site also helps mitigate
SSL stripping Moxie Marlinspike is an American entrepreneur, cryptographer, and computer security researcher. Marlinspike is the creator of Signal, co-founder of the Signal Technology Foundation, and served as the first CEO of Signal Messenger LLC. He is als ...
attacks by malicious exit nodes on the Tor network upon users who would otherwise access traditional HTTPS clearnet sites over Tor.


Format

Addresses in the onion TLD are generally opaque, non-
mnemonic A mnemonic device ( ), memory trick or memory device is any learning technique that aids information retention or retrieval in the human memory, often by associating the information with something that is easier to remember. It makes use of e ...
, alpha-numerical strings which are automatically generated based on a
public key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
when an
onion service Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traff ...
is configured. Formerly 16 characters long prior to V2 onion services being made obsolete by V3 services, which are 56 characters long. These strings can be made up of any letter of the alphabet, and decimal digits from 2 to 7, representing in
base32 Base32 is an encoding method based on the Radix, base-32 numeral system. It uses an alphabet of 32 Numerical digit, digits, each of which represents a different combination of 5 bits (25). Since base32 is not very widely adopted, the question of no ...
either an 80-bit
hash Hash, hashes, hash mark, or hashing may refer to: Substances * Hash (food), a coarse mixture of ingredients, often based on minced meat * Hash (stew), a pork and onion-based gravy found in South Carolina * Hash, a nickname for hashish, a canna ...
("version 2", or 16-character) or a 256-bit
ed25519 In public-key cryptography, Edwards-curve Digital Signature Algorithm (EdDSA) is a digital signature scheme using a variant of Schnorr signature based on twisted Edwards curves. It is designed to be faster than existing digital signature scheme ...
public key along with a version number and a checksum of the key and version number ("version 3", "next gen", or 56-character). As a result, in the past all combinations of sixteen base32 characters could potentially be valid version 2 addresses (though as the output of a cryptographic hash, a randomly selected string of this form having a corresponding onion service should be extremely unlikely), while in the current version 3 only combinations of 56 base32 characters that correctly encoded an ed25519 public key, a checksum, and a version number (i.e., 3) are valid addresses. It is possible to set up a partially human-readable .onion URL (e.g. starting with an organization name) by generating massive numbers of
key pairs Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
(a computational process that can be
parallelized Parallel computing is a type of computation in which many calculations or processes are carried out simultaneously. Large problems can often be divided into smaller ones, which can then be solved at the same time. There are several different for ...
) until a sufficiently desirable URL is found. Beginning in October 2021, stable releases of Tor software no longer support V2 (16 character) addresses.


WWW to .onion gateways

Proxies into the Tor network like
Tor2web Tor2web (pronounced "Tor to Web") is a software project to allow Tor hidden services to be accessed from a standard browser without being connected to the Tor network. It was created by Aaron Swartz and Virgil Griffith. History Tor is a net ...
allow access to onion services from non-Tor browsers and for search engines that are not Tor-aware. By using a gateway, users give up their own anonymity and trust the gateway to deliver the correct content. Both the gateway and the onion service can
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfa ...
the browser, and access user IP address data. Some proxies use caching techniques that claim to provide better page-loading than the official
Tor Browser Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traffic ...
.


.exit (defunct pseudo-top-level domain)

.exit was a
pseudo-top-level domain A pseudo-top-level domain is a label or name for a computer network that is not participating in the world-wide official Domain Name System and may not even participate in the Internet, but may use a similar domain name hierarchy. Historically the ...
used by
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
users to indicate on the fly to the Tor software the preferred
exit node Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traffic ...
that should be used while connecting to a service such as a
web server A web server is computer software and underlying Computer hardware, hardware that accepts requests via Hypertext Transfer Protocol, HTTP (the network protocol created to distribute web content) or its secure variant HTTPS. A user agent, co ...
, without having to edit the configuration file for Tor (''torrc''). The syntax used with this domain was ''hostname'' + ''.exitnode'' + ''.exit'', so that a user wanting to connect to http://www.torproject.org/ through node ''tor26'' would have to enter the URL ''http://www.torproject.org.tor26.exit''. Example uses for this would include accessing a site available only to addresses of a certain country or checking if a certain node is working. Users could also type ''exitnode.exit'' alone to access the IP address of ''exitnode''. The .exit notation was deprecated as of version 0.2.9.8. It is disabled by default as of version 0.2.2.1-alpha due to potential application-level attacks, and with the release of 0.3-series Tor as "stable" may now be considered defunct.


Official designation

The domain was formerly a
pseudo-top-level domain A pseudo-top-level domain is a label or name for a computer network that is not participating in the world-wide official Domain Name System and may not even participate in the Internet, but may use a similar domain name hierarchy. Historically the ...
host suffix, similar in concept to such endings as .bitnet and .uucp used in earlier times. On 9 September 2015
ICANN The Internet Corporation for Assigned Names and Numbers (ICANN ) is a global multistakeholder group and nonprofit organization headquartered in the United States responsible for coordinating the maintenance and procedures of several dat ...
,
IANA The Internet Assigned Numbers Authority (IANA) is a standards organization that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System (DNS), media types, and other Internet P ...
and the
IETF The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
designated .onion as a 'special use domain', giving the domain an official status following a proposal from
Jacob Appelbaum Jacob Appelbaum (born April 1, 1983) is an American independent journalist, computer security researcher, artist, Hacking (innovation), hacker and teacher. Appelbaum, who earned his PhD from the Eindhoven University of Technology, first became not ...
of the Tor Project and
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
security engineer
Alec Muffett Alec David Edward Muffett (born 22 April 1968) is an Anglo-American internet security expert and software engineer.. Career Muffett joined Sun Microsystems in 1992, working initially as a systems administrator. He rose through the ranks to be ...
.


HTTPS support

Prior to the adoption of CA/Browser Forum Ballot 144, an
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protoc ...
certificate for a .onion name could only be acquired by treating .onion as an Internal Server Name. Per the CA/Browser Forum's Baseline Requirements, these certificates could be issued, but were required to expire before 1 November 2015. Despite these restrictions,
DuckDuckGo DuckDuckGo is an American software company focused on online privacy whose flagship product is a search engine named DuckDuckGo. Founded by Gabriel Weinberg in 2008, its later products include browser extensions and a custom DuckDuckGo web ...
launched an onion site with a self-signed certificate in July 2013;
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
obtained the first SSL Onion certificate to be issued by a Certificate authority in October 2014,
Blockchain.info Blockchain.com (formerly Blockchain.info) is a cryptocurrency financial services company. The company began as the first Bitcoin blockchain explorer in 2011 and later created a cryptocurrency wallet that accounted for 28% of bitcoin transaction ...
in December 2014, and
The Intercept ''The Intercept'' is an American left-wing nonprofit news organization that publishes articles and podcasts online. ''The Intercept'' has published in English since its founding in 2014, and in Portuguese since the 2016 launch of the Brazilia ...
in April 2015. ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' later joined in October 2017. Following the adoption of CA/Browser Forum Ballot 144 and the designation of the domain as 'special use' in September 2015, .onion meets the criteria for RFC 6761. Certificate authorities may issue SSL certificates for HTTPS .onion sites per the process documented in the CA/Browser Forum's Baseline Requirements, introduced in Ballot 144. As of August 2016, 13 onion domains are https signed across 7 different organisations via
DigiCert DigiCert, Inc. is a digital security company headquartered in Lehi, Utah. DigiCert provides public key infrastructure (PKI) and validation required for issuing Public key certificate, digital certificates or Transport Layer Security, TLS/SSL cert ...
.


See also

* .tor * .i2p * .bit *
Darknet A darknet or dark net is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social n ...
*
Dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
*
GlobaLeaks GlobaLeaks is a free and open source software intended to enable secure and anonymous whistleblowing initiatives. The software is recognized as a Digital Public Good (DPG) by thDigital Public Goods Alliance History The project started on 15 D ...
*
List of Tor onion services This is a categorized list of Wikipedia:Notability, notable onion services (formerly, hidden services) accessible through the Tor (anonymity network), Tor anonymity network. Defunct services and those accessed by deprecated V2 addresses are marke ...
*
Onion routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series o ...


References


External links

* * * * * {{DEFAULTSORT:ONION Dark web Internet properties established in 2004 Top-level domains sv:Toppdomän#Generiska toppdomäner