We allow legitimate use of Tor. We do not require users to first connect in the clear and register with services, like some networks, to allow connecting via Tor; however, we reserve the right to disable or limit new connections during times of abuse.
Given the "anonymous" nature of Tor, it is often used for abuse, such as ban evasion and spamming. While we do our best to not adversely affect Tor users not engaging in abuse, from time to time we may ban exit nodes to mitigate said abuse.
We may prevent new connections via Tor during times of heavy abuse. That is, new connections will be refused while those who can maintain their connection will not be affected. This measure is a last resort and often lasts so long as we continue to see abuse attempts.
Most Tor-related network bans and connection restrictions can be bypassed by users who have a registered account, allowing them to continue to connect and use DareNET even though we are blocking a particular exit node or new anonymous connections. This requires use of the SASL or login-on-connect methods.
We provide an onionv2 hidden service as well as onionv3 (prop224), they are as follows:
You'll need to use port 6667 (plaintext) or 6697 (TLS). While the Tor process and server reside on the same machine (i.e., the last mile remains encrypted), you will still need to connect using TLS if you intend to join TLS-only channels and/or use the SASL EXTERNAL mechanism to authenticate. Note that due to the TLS certificates not matching the hidden service (we only serve certificates for irc.darenet.org and servername.darenet.org), you might have to disable the verification in your client.