Subj : Tor hidden services / TLS for binkp To : All From : Oli Date : Thu Oct 17 2019 12:41 am Zo> You are defiantly right about Apache being the backbone of the Zo> internet. Apache is said to run about 46% of all websites online, Zo> something like that. If you include every single low-traffic website, this number might be more or less accurate. If you count bytes served, you get very different numbers. Apache is not that important anymore and it's market share is constantly declining. https://w3techs.com/technologies/comparison/ws-apache,ws-microsoftiis,ws-nginx As Apache is not a TCP proxy this is also a bit off-topic, so back to TLS ... ;) for testing purposes you can also use ncat to create a proxy. invoking binkd in inetd mode: ncat -l 24555 -k --ssl --ssl-cert test-cert.pem --ssl-key test-key.pem -c "binkd -i /etc/binkd/binkd.cfg" or forwarding incoming connections to any binkp server on port 24554: ncat -l 24555 -k --ssl --ssl-cert test-cert.pem --ssl-key test-key.pem -c "ncat localhost 24554" this command creates a self-signed certificate and key: openssl req -nodes -new -x509 -keyout test-key.pem -out test-cert.pem * Origin: 🌈 (21:1/151) .