To give some background, I had an interesting discussion on ways of
reaching Freenet from other networks. Onioncat creates a p2p VPN overlay
for tunnelling TCP, UDP, ICMP or any other protocol over Tor and I2P.
Freenet can communicate over it. This works for Darknet mode and hopefully
Opennet once some seednodes get going. I'll focus on Tor because of better
performance. IRC is not a good medium for sharing steps so I'll do it
here.


HOW?

Instructions for Tor seednodes


Step 0. Install Tor

Step 1. Create a hidden service

    Open /etc/tor/torrc and modify:

HiddenServiceDir /etc/tor/ocat/
HiddenServicePort 8060 127.0.0.1:8060


Step 2. Find the hostname of your hidden service

run or restart tor.
cat /etc/tor/ocat/hostname
For example: c4cryzqdjns2i3je.onion


Step 3. Install Onioncat

sudo apt-get install onioncat


Step 4. Start Onioncat in server mode by turning off unidirectional mode.
Ocat will drop its privileges after it has created the TUN interface

sudo ocat c4cryzqdjns2i3je.onion -U


Step 5. Turn  Onioncat into a system service

Edit /etc/default/onioncat and uncomment:

ENABLED=yes

Add extra settings:

DAEMON_OPTS=-U


Step 6. Discover your Onioncat IPv6 address and include it in seednodes.fref

ocat -i c4cryzqdjns2i3je.onion


The more seednodes that become hybrids, the better. All a user needs to do
is run an Onioncat in server mode to connect.


WHY?

Works today without code hacking from your team. Chinese users can reach
Freenet again. Tor Exits are not overloaded. Entices Tor users to run
Freenet, expanding the network and raising interest. The seednodes can
serve as bridges between Onioncat Freenet and vanilla Freenet nodes
keeping the network unified.


PREEMPTIVE FAQ:

Q: The latency will be horrible?

A: Not true. Tor performance has been improving dramatically for a while
now. Tor will almost never be the bottleneck. Odds are the person saying
this used it in a decade. My experience with many applications over
Onioncat was excellent including Freenet in darknet mode.


Q: Tor developers don't want Freenet's traffic load!

A: They may be concerned over Exit bandwidth because its more precious but
my suggestion keeps all Freenet traffic inside the network. A study
concluded Tor hidden service are under-utilized traffic as making up only
3% of the total. Looking at a comment by a Tor developer, you will see
that to the contrary, they are interested in adding higher latency traffic
like Freenet and mixnets for better anonymity:
https://blog.torproject.org/blog/crowdfunding-future-hidden-services
_______________________________________________
Devl mailing list
[email protected]
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to