OnionCat -- An IP-Transparent TOR Hidden Service Connector

7v5w7go9ub0o 7v5w7go9ub0o at gmail.com
Wed Jun 25 23:53:38 UTC 2008


Dave Page wrote:
> On Wed, Jun 25, 2008 at 09:16:12AM -0400, 7v5w7go9ub0o wrote:
>> Bernhard Fischer wrote:
>>> On Tuesday 24 June 2008, 7v5w7go9ub0o wrote:
> 
>>>> My hope is to use OnionCat on my laptop to VNC via TOR to my home
>>>> computer using nomachine NX. Is that kind of use possible with OC?
> 
>> 1. Connecting via TOR would be an extra, minor security option to 
>> conceal the fact that my home is running a VNC server - eavesdropping 
>> kids at the hotspot may try to make it a hacking "prize".
> 
> If you are connecting using NX, the only port you need to access is SSH
> - all NX traffic is tunneled over that. Of course, you should never use
> the default NX SSH keys over the Internet.

Thanks for replying! I've set up new keys; NX works great! :-)

So if I  was using NX/SSH to the non-standard port of 443, and if my
server box looked like this:

eth0      Link encap:Ethernet  HWaddr 00:A0:A8:B4:45:74
           inet addr:192.168.1.4  Bcast:192.168.1.255  Mask:255.255.255.0
           inet6 addr: fe80::2a0:ccff:fe7a:4574/64 Scope:Link
           UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
           RX packets:8493 errors:0 dropped:0 overruns:0 frame:0
           TX packets:6762 errors:0 dropped:0 overruns:0 carrier:0
           collisions:0 txqueuelen:1000
           RX bytes:7177839 (6.8 Mb)  TX bytes:1668147 (1.5 Mb)
           Interrupt:16 Base address:0x6000

lo        Link encap:Local Loopback
           inet addr:127.0.0.1  Mask:255.0.0.0
           inet6 addr: ::1/128 Scope:Host
           UP LOOPBACK RUNNING  MTU:16436  Metric:1
           RX packets:89151 errors:0 dropped:0 overruns:0 frame:0
           TX packets:89151 errors:0 dropped:0 overruns:0 carrier:0
           collisions:0 txqueuelen:0
           RX bytes:76689713 (73.1 Mb)  TX bytes:76689713 (73.1 Mb)

tun0      Link encap:UNSPEC  HWaddr
00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
           inet6 addr: fd87:d87e:eb43:e20e:a09d:5e14:fabb:edf3/48
Scope:Global
           UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
           RX packets:0 errors:0 dropped:0 overruns:0 frame:0
           TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
           collisions:0 txqueuelen:500
           RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)

1. what address would I put in my SSH config to have it listen to OC?

config looks like this now:

#Port 22
Port 443

#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
=======================================
so would it be, e.g.:

ListenAddress fd87:d87e:eb43:e20e:a09d:5e14:fabb:edf3

or perhaps:

ListenAddress fe80::2a0:ccff:fe7a:4574

or perhaps:

ListenAddress 0.0.0.0

or ???

<snip>

> 
> You should be able to connect to your machine over SSH via Tor, and then
> connect out from that machine normally.

Right you are.

I tried to connect out last night and couldn't get anywhere.  I tried
again today, and it works fine.

e.g.

Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use
Iface
192.168.1.0     *               255.255.255.0   U     0      0        0 eth0
loopback        *               255.0.0.0       U     0      0        0 lo
default         192.168.1.1     0.0.0.0         UG    0      0        0 eth0


Thanks In Advance



More information about the tor-talk mailing list