OnionCat 0.1.9 now supports IPv4

Bernhard Fischer bf at abenteuerland.at
Mon Sep 15 18:23:42 UTC 2008


On Monday 15 September 2008, Sven Anderson wrote:
> Am 15.09.2008 um 16:16 schrieb Bernhard Fischer:
> > We have a new version of OnionCat ready which is now capable of
> > IPv4-forwarding.
> >
> > Read http://www.abenteuerland.at/onioncat/ for further instructions
> > on how to
> > use OnionCat and IP.
>
> Does it really work in an acceptable way? I ask because "TCP Over TCP
> Is A Bad Idea"[1]. I would expect it to have an awful performance.
>
> [1] http://sites.inka.de/~bigred/devel/tcp-tcp.html
>
>
> Regards,
>
> Sven

What somebody would define as "acceptable" may be different but basically your 
concern about it is right.

TCP over TCP is an issue which has some kind of "rubber-band" effects on the 
packet transmission but that's a problem that share all kinds of VPNs. 
Hopefully TOR will work with UDP eventually because in respect to performance 
this would give lower latencies in my opinion and would also make OnionCat 
more powerful.

Specifically with TOR and OnionCat the rubber-band effect can even be observed 
when sending pings over OnionCat (and that's ICMP over TCP ;).
I'm not sure but I think that's because of the numerous concatenated TCP 
sessions that TOR circuits are built of.

But the real biggest problem currently is the bad performance of hidden 
services in general which overlays all other difficulties.

The advantage of OnionCat is its IP-transparency and together with TOR it is 
location hidden. If someone wants or needs to use hidden services he will 
also use OnionCat, there's not really a difference in performace.

Bernhard
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20080915/34e3e423/attachment.pgp>


More information about the tor-talk mailing list