.tor is a pseudo-top-level domain host suffix implemented by the OnioNS project, which aims to add DNS infrastructure to the Tor network enabling the selection of meaningful and globally-unique domain name for hidden services, which users can then reference from the Tor Browser.

.tor
Introduced2015
TLD typePseudo-domain-style host suffix
StatusNot in root, but used by OnioNS clients, servers, and proxies
Registrydistributed
Intended useTo facilitate the creation and management of unique, user-friendly domain names for Tor hidden services
StructureNames are requested by users to be mapped to respective .onion domains
Documentshttps://github.com/Jesse-V/OnioNS-literature
Dispute policiesN/A
Registry websitegithub.com/Jesse-V/OnioNS-HS

The project aims to address the major usability issue that has been with Tor hidden services since their introduction in 2002.

Beta release of the server, client and domain name reservation tool (so called hidden service) software parts and their supporting common library were announced[1] in the Tor developers mailing list in August 2015.

According to the description on the projects gitsite[2] "OnioNS is a distributed, privacy-enhanced, metadata-free, and highly usable DNS for Tor hidden services"

The system is powered by the Tor network, relies on a distributed database, and provides anonymity to both operators and users.

See also edit

References edit

  1. ^ V, Jesse (August 8, 2015). "[tor-dev] First release of OnioNS for beta testing". lists.torproject.org.
  2. ^ "Jesse-V/OnioNS-client". GitHub. 25 October 2020.