On 4/25/16, Tim Wilson-Brown - teor teor2345@gmail.com wrote:
On 22 Apr 2016, at 17:03, grarpamp grarpamp@gmail.com wrote:
FYI: The onioncat folks are interested in collaborating with tor folks regarding prop224.
https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.tx...
I'm interested in what kind of collaboration onioncat would like to do on prop224, next-generation hidden services. It would be great to work this out in the next few weeks, as we're coding parts of the proposal right now.
Yep :) And I know Bernhard was hoping to get in touch with Roger on this before long.
Basically, prop224 HS being wider than 80 bits will break onioncat's current HS onion <---> IPv6 addressing mechanism.
They're looking at various backward compatibility options, as well as possibly making side use of the HSDir DHT, or even integrating more directly with the tor client.
Onioncat v1 is here:
https://www.onioncat.org/ https://www.cypherpunk.at/onioncat_trac/ https://www.cypherpunk.at/ocat/download/Docs/ list: onioncat@lists.blackmesa.at
# 25c3: OnionCat - A Tor-based Anonymous VPN - Fischer / Haslinger https://www.youtube.com/watch?v=rx4rS1gvp7Y # Other Media https://twitter.com/search?q=onioncat https://www.youtube.com/watch?v=RFHD6rKX3LI https://elbinario.net/2014/12/02/onioncat-es-onion/ https://thehackerway.com/2011/11/14/preservando-el-anonimato-y-extendiendo-s...
# test a5ccbdkubbr2jlcp.onion:8060 ping6 -c 10 fd87:d87e:eb43:0744:208d:5408:63a4:ac4f 10 packets transmitted, 10 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = nnn/nnn/1nnn/1nn ms
Onioncat v2 is beginning here:
# OnionCat and Tor's new Cryptosystem - Fischer https://www.youtube.com/watch?v=Zj4hSx6cW80 https://itsecx.fhstp.ac.at/wp-content/uploads/2014/11/FischerOnionCat.pdf
I wanted to link you out to the recent onioncat list threads on v2, but that list and its archive is down right now pending them getting it back online. I could forward the posts.
Other interested people may be:
# David Stainton - OnionVPN - ipv6 to onion service VPN adapter https://github.com/david415/onionvpn # Stefan Grundmann - erl_ocat - erlang onioncat implementation https://github.com/sg2342/erl_ocat # Ferdinand Haselbacher - onioncat - debian port contributed https://www.cypherpunk.at/onioncat_trac/ # intrigeri - onioncat - debian port, etc https://packages.debian.org/sid/onioncat
But the tor-onions mailing list is to discuss the technical details running onion services.
Readers of tor-onions / newbies may have been unfamiliar with onioncat. It's a way to get non-TCP between TorHS onions, thus in the thread "Hidden datagram service".
I think there are a nontrivial number of users interested in, and using, non-strictly-TCP transport over an IPv6 tunnel interface. For example, look at users of CJDNS...
https://www.youtube.com/results?search_query=CJDNS https://www.youtube.com/results?search_query=hyperboria
For which we should try to continue a way, in v2, to do that over anonymous overlay network Tor / I2P.
Can we discuss onioncat, tor, and the development of prop224 on tor-dev mailing list?
Sounds good, especially with the onioncat list being down right now.
Onioncat list had reliability issues in the past, maybe torproject would like to host it and import its ezmlm and mailman archives?