OnionCat -- An IP-Transparent TOR Hidden Service Connector
7v5w7go9ub0o
7v5w7go9ub0o at gmail.com
Wed Jun 25 23:53:38 UTC 2008
Dave Page wrote:
> On Wed, Jun 25, 2008 at 09:16:12AM -0400, 7v5w7go9ub0o wrote:
>> Bernhard Fischer wrote:
>>> On Tuesday 24 June 2008, 7v5w7go9ub0o wrote:
>
>>>> My hope is to use OnionCat on my laptop to VNC via TOR to my home
>>>> computer using nomachine NX. Is that kind of use possible with OC?
>
>> 1. Connecting via TOR would be an extra, minor security option to
>> conceal the fact that my home is running a VNC server - eavesdropping
>> kids at the hotspot may try to make it a hacking "prize".
>
> If you are connecting using NX, the only port you need to access is SSH
> - all NX traffic is tunneled over that. Of course, you should never use
> the default NX SSH keys over the Internet.
Thanks for replying! I've set up new keys; NX works great! :-)
So if I was using NX/SSH to the non-standard port of 443, and if my
server box looked like this:
eth0 Link encap:Ethernet HWaddr 00:A0:A8:B4:45:74
inet addr:192.168.1.4 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::2a0:ccff:fe7a:4574/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:8493 errors:0 dropped:0 overruns:0 frame:0
TX packets:6762 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:7177839 (6.8 Mb) TX bytes:1668147 (1.5 Mb)
Interrupt:16 Base address:0x6000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:89151 errors:0 dropped:0 overruns:0 frame:0
TX packets:89151 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:76689713 (73.1 Mb) TX bytes:76689713 (73.1 Mb)
tun0 Link encap:UNSPEC HWaddr
00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet6 addr: fd87:d87e:eb43:e20e:a09d:5e14:fabb:edf3/48
Scope:Global
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:500
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
1. what address would I put in my SSH config to have it listen to OC?
config looks like this now:
#Port 22
Port 443
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
=======================================
so would it be, e.g.:
ListenAddress fd87:d87e:eb43:e20e:a09d:5e14:fabb:edf3
or perhaps:
ListenAddress fe80::2a0:ccff:fe7a:4574
or perhaps:
ListenAddress 0.0.0.0
or ???
<snip>
>
> You should be able to connect to your machine over SSH via Tor, and then
> connect out from that machine normally.
Right you are.
I tried to connect out last night and couldn't get anywhere. I tried
again today, and it works fine.
e.g.
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use
Iface
192.168.1.0 * 255.255.255.0 U 0 0 0 eth0
loopback * 255.0.0.0 U 0 0 0 lo
default 192.168.1.1 0.0.0.0 UG 0 0 0 eth0
Thanks In Advance
More information about the tor-talk
mailing list