Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
On Sunday 22 June 2008, Arjan wrote: > Installation is easy (but because of the root requirement for creating > the tun device, I had to run it in a virtual machine). OnionCat changes the UID to an unprivileged user as soon as the tun device configuration is finished. Bernhard signature.asc Description: This is a digitally signed message part.
Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
This is awesome! I was just looking for something like this for a wireless network I was setting up. Thanks for your hard work! Comrade Ringo Kamens On Tue, Jun 24, 2008 at 2:33 PM, Bernhard Fischer <[EMAIL PROTECTED]> wrote: > On Sunday 22 June 2008, Arjan wrote: >> Installation is easy (but because of the root requirement for creating >> the tun device, I had to run it in a virtual machine). > > OnionCat changes the UID to an unprivileged user as soon as the tun device > configuration is finished. > > > Bernhard >
Bandwidth requirements for mirroring relay directory
Greetings! Tor Ops are encouraged to mirror the relay directory if they have sufficient bandwidth. Can anyone advise if there is some kind of minimum amount of bandwidth that can be used to mirror the relay directory? I am assuming that I would forward the relay directory mirror port in the same way that I have forwarded my relay port. Regards, John Smith (Tor relay freeflow)
Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
Hiho,, cool codings, does that mean, emule and torrent can run over tor now? Was that not something, that was not desired? How may Outproxies are then needed by the tor network? Max On Sun, Jun 22, 2008 at 10:54 AM, Bernhard Fischer <[EMAIL PROTECTED]> wrote: > OnionCat creates a transparent IPv6 layer on top of TOR's hidden services. > It > transmits any kind of IP-based data transparently through the TOR network > on > a location hidden basis. You can think of it as a point-to-multipoint VPN > between hidden services. > > See > > http://www.abenteuerland.at/onioncat/ > > for further information. > > Bernhard >
Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
On Tuesday 24 June 2008, you wrote: > thanks for the feedback > no, i am afraid as far as I know retroshare, it does not support ipv6 > why does your onioncat dont support ipv4 ? The basic trick of OnionCat is that it converts the hidden service's onion id into an IP adress. The onion id has 80bit, hence, it would not fit into an IPv4 address but IPv6 has enough bits to do this. > I think of the user, he needs to set up tor and vidalia and your app.. > I want a Plugin which has all in one deamon, which plugs into retroshare > and then this messenger is runnign with it Of course, an all-in-one package would be nice and maybe we will have something like that some days but IMO OnionCat currently is too maiden for such a project. > Another question: no emule and torrent is possible over tor?? something > that never has been appreciated for Tor? > Imule is I2p, now we get the TOREMULE? Well, basically that's no technical reason. It's because the purpose of TOR is not to support people in illegally downloading/sharing stuff thereby eating up all the bandwith of the network. TOR is for protecting people's rights and privacy. But I'm sure those issues were discussed many times on this list ;) Bernhard signature.asc Description: This is a digitally signed message part.
Re: RPM errors
On Sat, Jun 21, 2008 at 05:04:21PM +0800, [EMAIL PROTECTED] wrote 1.0K bytes in 35 lines about: : I've tried 0.2.0.28-rc and 0.2.1.1-alpha rpms on RHEL4, this error did : show up. Due to the memory fixes in 0.2.1.x-alpha branch, I removed the --enable-openbsd-malloc configure options in tor.spec. I'm still investigating removing the effect of removing the code that causes the libc (private) requirement. -- Andrew
Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
On Tuesday 24 June 2008, M. Peterson wrote: > Hiho,, cool codings, > does that mean, emule and torrent can run over tor now? Yes, with some limitations. OnionCat (currently) does not route packets. You can not forward packets to arbitrary destinations to onioncat, only those with destinations which are associated a hidden service. It is a "hidden service connector" and not an "anonymizing network layer" (currently). That means that people running TOR and OnionCat can share data with torrent/donkey/... together, anonymously, on top of OnionCat but you can not just mix it with some "legacy" Internet-Users. > Was that not something, that was not desired? Not desired by who? > How may Outproxies are then needed by the tor network? Sorry, don't know. Bernhard signature.asc Description: This is a digitally signed message part.
Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
On Tuesday 24 June 2008 21:01:27 Bernhard Fischer wrote: > On Tuesday 24 June 2008, M. Peterson wrote: > > Hiho,, cool codings, > > does that mean, emule and torrent can run over tor now? > > Yes, with some limitations. OnionCat (currently) does not route packets. > You can not forward packets to arbitrary destinations to onioncat, only > those with destinations which are associated a hidden service. It is a > "hidden service connector" and not an "anonymizing network layer" > (currently). > > That means that people running TOR and OnionCat can share data with > torrent/donkey/... together, anonymously, on top of OnionCat but you can > not just mix it with some "legacy" Internet-Users. > > > Was that not something, that was not desired? > > Not desired by who? > File-sharing on the current Tor network is frowned upon because it conflicts with the presumed motivations of many of the volunteers who operate servers. That said, there is nothing stopping anyone else from creating their own parallel Tor network and distributing a tor bundle hardcoded with authority information for that network. (I know you know all this but bear with me.) So it would be easy to imagine a software bundle that comprises: 1. A modified Tor distribution for use on the file-sharing network. 2. Onioncat 3. A torrent distribution pre-configured with the ipv6 IP of the hidden service created during installation. This would then be the software client of a hidden-service/onioncat based sharing network. I'm sure may people would be interested in that, though I'm not sure performance would scale with the user base. I've often wondered why such a parallel network doesn't already exist, even without the advent of onioncat. > > How may Outproxies are then needed by the tor network? > > Sorry, don't know. > > > Bernhard signature.asc Description: This is a digitally signed message part.
Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
On Tue, Jun 24, 2008 at 11:01 PM, Robert Hogan <[EMAIL PROTECTED]> wrote: > > I've often wondered why such a parallel network doesn't already exist, even > without the advent of onioncat. > > > that exists: http://www.i2p2.de/ but the applications need to be recoded to base64 keys, with onionCAT every app with a proxy can be used with its IP adresses. why should that not scale for TORemule? and Torchat gets a competition with http://retroshare.sf.net So imule and Torchat are dead. toremule and retroshare-onioncat will evolve as alternatives.
Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
> > > http://www.abenteuerland.at/onioncat/ > > for further information. Would it be useful, that each onioncat installation is as well a tor router? then all is fine, as every node is routing other nodes, and while that adding one node to the network. As emule to emule both need onioncat, all is as well fine, and no outproxy is used for bandwidth. For RetroShare and other applications the question is, how to reach users with normal IP adresses, which do not use any onionCat. What are the plans here, to mix onioncat users with normal IP users (as well ipv4 users) from the normal web over TOR Outproxy servers? Max
Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector
Bernhard Fischer wrote: OnionCat creates a transparent IPv6 layer on top of TOR's hidden services. It transmits any kind of IP-based data transparently through the TOR network on a location hidden basis. You can think of it as a point-to-multipoint VPN between hidden services. See http://www.abenteuerland.at/onioncat/ for further information. Bernhard Thank you for creating this interesting tool! It installed easily and works well (well. after I compiled in IPv6 support, prompted by an OnionCat diagnostic) :-) My hope is to use OnionCat on my laptop to VNC via TOR to my home computer using nomachine NX. Is that kind of use possible with OC? Thanks again.