[tor-dev] Onioncat and Prop224

grarpamp grarpamp at gmail.com
Wed Apr 27 10:30:53 UTC 2016


On 4/25/16, Tim Wilson-Brown - teor <teor2345 at gmail.com> wrote:
>
>> On 22 Apr 2016, at 17:03, grarpamp <grarpamp at gmail.com> wrote:
>>
>> FYI: The onioncat folks are interested in collaborating
>> with tor folks regarding prop224.
>>
>> https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt
>
> I'm interested in what kind of collaboration onioncat would like to do on
> prop224, next-generation hidden services.
> It would be great to work this out in the next few weeks, as we're coding
> parts of the proposal right now.

Yep :) And I know Bernhard was hoping to get in touch with Roger
on this before long.

Basically, prop224 HS being wider than 80 bits will break onioncat's
current HS onion <---> IPv6 addressing mechanism.

They're looking at various backward compatibility options, as well
as possibly making side use of the HSDir DHT, or even integrating
more directly with the tor client.


Onioncat v1 is here:

https://www.onioncat.org/
https://www.cypherpunk.at/onioncat_trac/
https://www.cypherpunk.at/ocat/download/Docs/
list: onioncat at lists.blackmesa.at

# 25c3: OnionCat - A Tor-based Anonymous VPN - Fischer / Haslinger
https://www.youtube.com/watch?v=rx4rS1gvp7Y
# Other Media
https://twitter.com/search?q=onioncat
https://www.youtube.com/watch?v=RFHD6rKX3LI
https://elbinario.net/2014/12/02/onioncat-es-onion/
https://thehackerway.com/2011/11/14/preservando-el-anonimato-y-extendiendo-su-uso-%E2%80%93-utilizando-onioncat-para-simplificar-el-acceso-a-hidden-services-%E2%80%93-parte-xvi/

# test a5ccbdkubbr2jlcp.onion:8060
ping6 -c 10 fd87:d87e:eb43:0744:208d:5408:63a4:ac4f
10 packets transmitted, 10 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = nnn/nnn/1nnn/1nn ms


Onioncat v2 is beginning here:

# OnionCat and Tor's new Cryptosystem - Fischer
https://www.youtube.com/watch?v=Zj4hSx6cW80
https://itsecx.fhstp.ac.at/wp-content/uploads/2014/11/FischerOnionCat.pdf

I wanted to link you out to the recent onioncat list threads on v2,
but that list and its archive is down right now pending them getting
it back online. I could forward the posts.


Other interested people may be:

# David Stainton - OnionVPN - ipv6 to onion service VPN adapter
https://github.com/david415/onionvpn
# Stefan Grundmann - erl_ocat - erlang onioncat implementation
https://github.com/sg2342/erl_ocat
# Ferdinand Haselbacher - onioncat - debian port contributed
https://www.cypherpunk.at/onioncat_trac/
# intrigeri - onioncat - debian port, etc
https://packages.debian.org/sid/onioncat


> But the tor-onions mailing list is to discuss the technical details running
> onion services.

Readers of tor-onions / newbies may have been unfamiliar with
onioncat. It's a way to get non-TCP between TorHS onions, thus in
the thread "Hidden datagram service".

I think there are a nontrivial number of users interested in, and
using, non-strictly-TCP transport over an IPv6 tunnel interface.
For example, look at users of CJDNS...

https://www.youtube.com/results?search_query=CJDNS
https://www.youtube.com/results?search_query=hyperboria

For which we should try to continue a way, in v2, to do that over
anonymous overlay network Tor / I2P.


> Can we discuss onioncat, tor, and the development of prop224 on tor-dev
> mailing list?

Sounds good, especially with the onioncat list being down right now.

Onioncat list had reliability issues in the past, maybe torproject
would like to host it and import its ezmlm and mailman archives?


More information about the tor-dev mailing list