News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Guide: Set Up a Private Onion Jabber Server : OpSec | Torhoo darknet markets


Why Use an Onion Jabber Server?

/u/michinori
2 points
3 weeks ago
Jun 28 00:56:24 amnesia prosody[19146]: certmanager: SSL/TLS: Failed to load '/etc/prosody/certs/youronionaddress.key': Check that the file exists and the permissions are correct (for myonion.onion)

Jun 28 00:56:24 amnesia prosody[19146]: myonion.onion:tls: Error creating context for c2s: error loading private key ((null))


I am a retard. I am getting the errors above after running "sudo journalctl -u prosody -xe" . Do I need to redo a step?
if anyone else gets the same error, follow those steps.


you're not a retard, a lot of people get this step wrong.

PM me you got a step wrong

but its probably just that you didnt out run sudo prosodyctl cert generate youronionaddress.onion with your real onion address you generated earlier.

Check the folder: sudo ls -la /etc/prosody/certs/

you should see:
myonion.onion.crt
myonion.onion.key

If those don’t exist, re-run:
sudo prosodyctl cert generate myonion.onion

but make sure you put your real onion address thats geberated earlier.

also check you might need to fix file permissions. run this:
sudo chown prosody:prosody /etc/prosody/certs/myonion.onion.*
sudo chmod 640 /etc/prosody/certs/myonion.onion.key

make sure the folder is owned by Prosody:
sudo chown -R prosody:prosody /etc/prosody/certs

i said last one in the PM i sent, but incase other people get this error too, ill say it on here too,

Confirm your VirtualHost config:
sudo nano /etc/prosody/conf.avail/myonion.onion.cfg.lua

make sure it has the correct lines:
ssl = {
key = "/etc/prosody/certs/myonion.onion.key";
certificate = "/etc/prosody/certs/myonion.onion.crt";
}

again, make sure you change the myonion.onion.key to your onion address you generated plus the .key,
If you left youronionaddress.onion literally, it will fail to find its certs.

also make sure you edited the etc/prosody/prosody.cfg.lua file with your onion address you generated, alot of people forget to replace it. edit the file like this :
sudo nano /etc/prosody/conf.avail/myonion.onion.cfg.lua

then find the part that says:
VirtualHost "youronionaddress.onion" and change it to your address you geneterated earlier.

then restart prosody:
sudo systemctl restart prosody

then check again:
sudo journalctl -u prosody -xe

If it still fails, then enter:
sudo ls -la /etc/prosody/certs/
sudo cat /etc/prosody/conf.avail/myonion.onion.cfg.lua

and then i can help you further. but that should fix it.
/u/Battery
1 points
3 weeks ago
Great guide mate. I will give a try1
/u/execution
1 points
3 weeks ago
nice guide bro really solid. just a quick add for anyone using a vps setup make sure the hidden service folder like /var/lib/tor/xmpp_hidden has the right ownership or tor won’t generate the .onion. do chown -R debian-tor:debian-tor on it then restart tor.... also if federation fails check that port 5269 is allowed locally even if it's not public. had that issue before :)
fuck i forgot to add that!!!! i knew i was missing soemthing lol
Please edit it into the post. This post is going to end up in our wiki somewhere. It's better if people don't have to look in the comments to get it right.
i already did :)

its last as extra VPS tips

I'd be honored to have my post in the wiki! :)
Your post is stickied and you have a Flair now.

Brilliant post! Thanks for the contribution.
thank you! happy to help the community :)

could make it 💉ↁRΣΛↁ💉JUNKIΣ💉 pleaseeeee with the same colors

also the same flair that in /d/dreadmoments :)))
/u/UKDistribution
1 points
3 weeks ago
Great post, gets an upvote from me.
thank you :)
/u/Beelzebum 🍼
1 points
3 weeks ago
Wrong sub
/d/xmpp
im crosspost it, since its both OpSec and XMPP
What u think abt gajim btw ?
i personally like gajim. thats what i use.
I just hate ui , other wise it's okay ...
i love the UI, what do you use?
/u/RootkitX
1 points
3 weeks ago
great guide! :)
/u/Phobos36 P
1 points
3 weeks ago
Great in-depth guide man. I wonder how long it took you to write this whole post cause it's pretty lengthy.
6 hours :)

especially to get the formatting down.

i tried spacing out the the steps and then the actions, kinda how the top one is but when i posted it, it clumped them all together.
/u/Phobos36 P
1 points
3 weeks ago
Holy shit dude. Good job but damn man that's alot of hours for just one post.
This is the Braille Blank. Dread ignores two spaces on a line together. It ignores multiple blank lines, too. One of these on a line means it's not blank, even though you can't see it.
https://www.compart.com/en/unicode/U+2800
oh thanks man!
/u/uknonstoppop
1 points
3 weeks ago
bump for hell yeah
/u/headshotnegativity
1 points
3 weeks ago
finally you did something reasonable jake, thanks & upvote OP good shit
lmaoooo thanks
/u/batumreis0 🍼
1 points
3 weeks ago
Great Guide! 🫡
at ease soldier 😎
/u/Fyodor-MD
1 points
3 weeks ago
thanks bro this is great cuz ive been going thorugh so many xmpp accounts cuz the ones i use always end up going offline or their certificates expiring or some bullshit this is gonna help a lot of people , upvoted
yeah man, PM if if you have any other questions.
/u/AnonFixer
1 points
3 weeks ago
Solid write-up. Good to see a guide that actually covers s2s federation and AppArmor — most people skip that part.
One thing worth mentioning:
if you're aiming for stronger metadata protection during federation, combining s2s_whitelist with mod_limits and custom cert pinning helps filter out noisy peers and reduces exposure surface.
Also — always watch out for memory leaks with some Prosody modules under high-load Tor connections. Seen a few setups crumble over time because of that.
Respect for putting this together.
Running onion-native XMPP is niche, but damn powerful when hardened correctly. Privacy is everything.🛡️
exactly :)
thank you /u/CodeIsLaw for the Gold Award! :)
/u/[deleted]
1 points
3 weeks ago
awesome guide brother! i just finished it, very easy to follow
glad i could help! :)
/u/nano1212 🍼
1 points
2 weeks ago
[removed by moderators]
No ads are allowed
/u/groot_left_galaxy
1 points
2 weeks ago
Hi, i am trying to setup xmpp over onion server in tails os. can you guide me?
this guide works on Tails OS too! Tails is just a security-hardened Linux system, so all the steps for installing Prosody, Tor, and setting up your onion XMPP server are the same as on any Debian based Linux.

Just a couple Tails-specific tips:
  • Make sure you enable “Additional Software” persistence if you want your server to survive a reboot, since Tails wipes most changes on shutdown by default. Otherwise, you’ll have to reinstall everything after every boot.
  • Some directories (like /var/lib/tor/) are not persistent by default in Tails, so you’ll need to either configure persistent storage for them or recreate your onion service each session.
  • You might want to generate your .onion address and Prosody configs on Tails, then copy them to a more permanent system if you plan to run the server 24/7 (since Tails is usually used as a live OS).

Otherwise, all the steps in my guide work on Tails, and it’s a good choice for anonymity if you want to set up and test an onion server safely!

PM me if you want a step-by-step specifically for Tails persistence, or if you get stuck anywhere. I’m happy to help :)
/u/hiru
1 points
1 week ago
Is this the way make jabber account
this is how you make a onion jabber routed through the tor network.

you can make a normal jabber account at like xmpp.is at there website.
/u/hiru
1 points
1 week ago
Thank you brother
/u/u-whore
1 points
1 week ago
I wonder if you can provide any specific advice for doing this on Qubes?
Which appVM or template to work inside?
Should I setup a seperate VM just for the jabber server or have it running inside the general wonix-anon-work appVM.
Would like to know before I start screwing up my system.
Doing it in Qubes is possible, but honestly it’ll run much smoother in a regular Debian or Ubuntu VM.
If you really need to set it up on Qubes, let me know and I can walk you through it, just message me :)
/u/u-whore
1 points
1 week ago
Thanks for the offer, Im not gonna bother if its gonna get janky. I find Qubes twists itself up enough already, I usually have to fresh install every so often so that would be one more set of hoops to go through to get it running again. thanks anyway, good boy.
/u/Flowerofdeath999 🍼
-2 points
3 weeks ago
Yo bro i didint understand well what this is used for , can i use it for my ransomware server ?
its a jabber sever, jabber is a messaging app. but instead of using clearnet domains like xmpp.is or other servers, you make your own server with a onion address, so like m5vxclee556d3ndcjmtn3uwa62r6rh6fi7okye77hyfbzfuhtbo5pkid.onion at the end instead of xmpp.is

it routs your traffic through tor so your anonymous and cant be tracked. and also you can add specific features too prosody, unlike clearnet servers (as i mentioned in the guide)

im not familiar with ransomware, but you might be able too, since this guide makes a onion server.
/u/Flowerofdeath999 🍼
0 points
3 weeks ago
I understand now well thanks