Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread Bernhard Fischer
On Sunday 22 June 2008, Arjan wrote:
> Installation is easy (but because of the root requirement for creating
> the tun device, I had to run it in a virtual machine).

OnionCat changes the UID to an unprivileged user as soon as the tun device 
configuration is finished.


Bernhard


signature.asc
Description: This is a digitally signed message part.


Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread Ringo Kamens
This is awesome! I was just looking for something like this for a
wireless network I was setting up. Thanks for your hard work!
Comrade Ringo Kamens

On Tue, Jun 24, 2008 at 2:33 PM, Bernhard Fischer <[EMAIL PROTECTED]> wrote:
> On Sunday 22 June 2008, Arjan wrote:
>> Installation is easy (but because of the root requirement for creating
>> the tun device, I had to run it in a virtual machine).
>
> OnionCat changes the UID to an unprivileged user as soon as the tun device
> configuration is finished.
>
>
> Bernhard
>


Bandwidth requirements for mirroring relay directory

2008-06-24 Thread john smith
Greetings!

Tor Ops are encouraged to mirror the relay directory if they have
sufficient bandwidth.

Can anyone advise if there is some kind of minimum amount of bandwidth
that can be used to mirror the relay directory?

I am assuming that I would forward the relay directory mirror port in
the same way that I have forwarded my relay port.

Regards,

John Smith (Tor relay freeflow)


Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread M. Peterson
Hiho,, cool codings,
does that mean, emule and torrent can run over tor now?
Was that not something, that was not desired?
How may Outproxies are then needed by the tor network?

Max

On Sun, Jun 22, 2008 at 10:54 AM, Bernhard Fischer <[EMAIL PROTECTED]>
wrote:

> OnionCat creates a transparent IPv6 layer on top of TOR's hidden services.
> It
> transmits any kind of IP-based data transparently through the TOR network
> on
> a location hidden basis.  You can think of it as a point-to-multipoint VPN
> between hidden services.
>
> See
>
> http://www.abenteuerland.at/onioncat/
>
> for further information.
>
> Bernhard
>


Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread Bernhard Fischer
On Tuesday 24 June 2008, you wrote:
> thanks for the feedback
> no, i am afraid as far as I know retroshare, it does not support ipv6
> why does your onioncat dont support ipv4 ?

The basic trick of OnionCat is that it converts the hidden service's onion id 
into an IP adress. The onion id has 80bit, hence, it would not fit into an 
IPv4 address but IPv6 has enough bits to do this.

> I think of the user, he needs to set up tor and vidalia and your app..
> I want a Plugin which has all in one deamon, which plugs into retroshare
> and then this messenger is runnign with it

Of course, an all-in-one package would be nice and maybe we will have 
something like that some days but IMO OnionCat currently is too maiden for 
such a project.

> Another question: no emule and torrent is possible over tor?? something
> that never has been appreciated for Tor?
> Imule is I2p, now we get the TOREMULE?

Well, basically that's no technical reason.
It's because the purpose of TOR is not to support people in illegally 
downloading/sharing stuff thereby eating up all the bandwith of the network. 
TOR is for protecting people's rights and privacy.
But I'm sure those issues were discussed many times on this list ;)

Bernhard


signature.asc
Description: This is a digitally signed message part.


Re: RPM errors

2008-06-24 Thread phobos
On Sat, Jun 21, 2008 at 05:04:21PM +0800, [EMAIL PROTECTED] wrote 1.0K bytes in 
35 lines about:
: I've tried 0.2.0.28-rc and 0.2.1.1-alpha rpms on RHEL4, this error did
: show up.

Due to the memory fixes in 0.2.1.x-alpha branch, I removed the
--enable-openbsd-malloc configure options in tor.spec.

I'm still investigating removing the effect of removing the code that
causes the libc (private) requirement.

-- 
Andrew


Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread Bernhard Fischer
On Tuesday 24 June 2008, M. Peterson wrote:
> Hiho,, cool codings,
> does that mean, emule and torrent can run over tor now?

Yes, with some limitations. OnionCat (currently) does not route packets.
You can not forward packets to arbitrary destinations to onioncat, only those 
with destinations which are associated a hidden service. It is a "hidden 
service connector" and not an "anonymizing network layer" (currently).

That means that people running TOR and OnionCat can share data with 
torrent/donkey/... together, anonymously, on top of OnionCat but you can not 
just mix it with some "legacy" Internet-Users.

> Was that not something, that was not desired?

Not desired by who?

> How may Outproxies are then needed by the tor network?

Sorry, don't know.


Bernhard


signature.asc
Description: This is a digitally signed message part.


Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread Robert Hogan
On Tuesday 24 June 2008 21:01:27 Bernhard Fischer wrote:
> On Tuesday 24 June 2008, M. Peterson wrote:
> > Hiho,, cool codings,
> > does that mean, emule and torrent can run over tor now?
>
> Yes, with some limitations. OnionCat (currently) does not route packets.
> You can not forward packets to arbitrary destinations to onioncat, only
> those with destinations which are associated a hidden service. It is a
> "hidden service connector" and not an "anonymizing network layer"
> (currently).
>
> That means that people running TOR and OnionCat can share data with
> torrent/donkey/... together, anonymously, on top of OnionCat but you can
> not just mix it with some "legacy" Internet-Users.
>
> > Was that not something, that was not desired?
>
> Not desired by who?
>

File-sharing on the current Tor network is frowned upon because it conflicts 
with 
the presumed motivations of many of the volunteers who operate servers.

That said, there is nothing stopping anyone else from creating their own 
parallel 
Tor network and distributing a tor bundle hardcoded with authority information 
for that network. (I know you know all this but bear with me.)

So it would be easy to imagine a software bundle that comprises:

1. A modified Tor distribution for use on the file-sharing network.
2. Onioncat
3. A torrent distribution pre-configured with the ipv6 IP of the hidden service 
created during installation.

This would then be the software client of a hidden-service/onioncat based 
sharing 
network. I'm sure may people would be interested in that, though I'm not sure 
performance would scale with the user base.

I've often wondered why such a parallel network doesn't already exist, even 
without the advent of onioncat.

> > How may Outproxies are then needed by the tor network?
>
> Sorry, don't know.
>
>
> Bernhard




signature.asc
Description: This is a digitally signed message part.


Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread M. Peterson
On Tue, Jun 24, 2008 at 11:01 PM, Robert Hogan <[EMAIL PROTECTED]>
wrote:

>
> I've often wondered why such a parallel network doesn't already exist, even
> without the advent of onioncat.
>
>
>
 that exists: http://www.i2p2.de/
but the applications need to be recoded to base64 keys,
with onionCAT every app with a proxy can be used with its IP adresses.

why should that not scale for TORemule? and Torchat gets a competition with
http://retroshare.sf.net

So imule and Torchat are dead.  toremule and retroshare-onioncat will evolve
as alternatives.


Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread M. Peterson
>
>
> http://www.abenteuerland.at/onioncat/
>
> for further information.



Would it be useful, that each onioncat installation is as well a tor router?
then all is fine, as every node is routing other nodes, and while that
adding one node to the network.
As emule to emule both need onioncat, all is as well fine, and no outproxy
is used for bandwidth.
For RetroShare and other applications the question is, how to reach users
with normal IP adresses, which do not use any onionCat.

What are the plans here, to mix onioncat users with normal IP users (as well
ipv4 users) from the normal web over TOR Outproxy servers?

Max


Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread 7v5w7go9ub0o

Bernhard Fischer wrote:
OnionCat creates a transparent IPv6 layer on top of TOR's hidden services. It 
transmits any kind of IP-based data transparently through the TOR network on 
a location hidden basis.  You can think of it as a point-to-multipoint VPN 
between hidden services.


See

http://www.abenteuerland.at/onioncat/

for further information.

Bernhard


Thank you for creating this interesting tool!

It installed easily and works well (well. after I compiled in IPv6 
support, prompted by an OnionCat diagnostic) :-)


My hope is to use OnionCat on my laptop to VNC via TOR to my home 
computer using nomachine NX. Is that kind of use possible with OC?


Thanks again.