Subj : Tor hidden services / TLS for binkp
To   : All
From : Oli
Date : Thu Oct 17 2019 12:41 am

Zo> You are defiantly right about Apache being the backbone of the
Zo> internet. Apache is said to run about 46% of all websites online,
Zo> something like that.

If you include every single low-traffic website, this number might be more or
less accurate. If you count bytes served, you get very different numbers.
Apache is not that important anymore and it's market share is constantly
declining.
https://w3techs.com/technologies/comparison/ws-apache,ws-microsoftiis,ws-nginx

As Apache is not a TCP proxy this is also a bit off-topic, so back to TLS ...
;)
for testing purposes you can also use ncat to create a proxy.

invoking binkd in inetd mode:
ncat -l 24555 -k --ssl --ssl-cert test-cert.pem --ssl-key test-key.pem -c
"binkd -i /etc/binkd/binkd.cfg"

or forwarding incoming connections to any binkp server on port 24554:
ncat -l 24555 -k --ssl --ssl-cert test-cert.pem --ssl-key test-key.pem -c "ncat
localhost 24554"

this command creates a self-signed certificate and key:
openssl req -nodes -new -x509 -keyout test-key.pem -out test-cert.pem



* Origin: 🌈 (21:1/151)