[tor-talk] Can NAT traversal be Tor's killer feature?
str4d at i2pmail.org
Fri Jul 11 01:41:09 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
On 07/11/2014 12:12 AM, Helder Ribeiro wrote:
> tl;dr: how about a virtual global flat LAN that maps static IPs to
> onion addresses?
> We all know the story. Random feature gets unintentionally picked
> up as the main reason for buying/using a certain product, despite
> the creator's intention being different or more general. (PC:
> spreadsheets; Internet: porn; smartphones: messaging.)
> Exhibit 1: Ricochet IM (https://ricochet.im) uses onion addresses
> (each client runs a hidden service) as a sort of *static anonymous
> IP address* and, because it's static, it's the user's identity too,
> in a p2p/serverless chat app. It's dead simple, works like a charm
> behind the firewall at work, and protects metadata, which no other
> chat app/protocol I know does.
> Exhibit 2: OnionShare (https://onionshare.org/) does the same for
> file sharing, and it's actually a much *easier* user experience to
> send large files this way than any other. Why? "Static anomyous IP"
> (onion address) and NAT traversal because all hidden services work
> by making *outgoing* connections to Tor relays and don't need any
> open ports.
> Those are two great apps that, unlike Tor Browser (which I love
> very much, but hear me out), *improve* the user experience, through
> Tor, in comparison with the mainstream (OnionShare even more so).
> The user might not even care about security or anonymity, it's just
> a better experience, period.
> In this case, you don't have to convince people to make sacrifices
> in the name of privacy, you just have to show them something they
> That's when natural demands kicks in and suddenly you're not
> pushing water uphill anymore, you've changed the landscape and it
> flows in the direction you want. Like when Tesla made electric cars
> that people buy *despite* being electric, not because of it.
> As good as Ricochet and OnionShare are, they still had to go
> through the trouble of integrating hidden services themselves.
> If there is a virtual network interface that transparently maps
> static IPs to onion addresses, all sorts of things could benefit
> from the backward compatibility (old games, IP-based voip,
> screensharing, real-time collaborative writing, etc.) and new ones
> could be built a *lot* more easily.
OnionCat  provides this functionality via a layer 3 VPN. It works
with Tor Hidden Services (ocat) and I2P tunnels (gcat ), by
calculating a unique IPv6 address from the hidden service ID or I2P
Destination. This has the advantage that you can give an IPv6 address
to an application and it will resolve correctly anywhere.
OnionCat is not as user-friendly as I think you would like, primarily
because it requires that the Tor HS or I2P tunnel is already set up.
But further integration could be done (certainly with I2P, because all
tunnels automatically have a Destination).
One downside to this method is that there is a possibility of address
collisions. I am not familiar with the particular algorithm OnionCat
uses to map IPv6 addresses to .onions, but in the I2P case at least,
the IPv6 address space is not large enough to hold all possible I2P
B32 addresses (which are 52 characters long). The Tor proposal for
next-gen HSs outlines a format for new .onions that is nearly
identical to I2P B32s, and will have the same problem.
The solution that I2P is considering for this is to remove the
requirement for a global IPv6 <-> .b32.i2p mapping, and instead use a
local ephemeral mapping on a virtual interface combined with a local
DNS resolver. This would enable backwards compatibility for
applications that support hostnames.
As an aside, most of the applications that you mention generally use
UDP packets, which Tor does not yet support (AFAIK). I2P does support
does this, but doesn't worry about privacy.]
> Of course massive use would probably crush the current network,
> but uptake would be gradual, and I imagine demand has a greater
> power to drive capacity than the other way around.
> The only thing better than serving the privacy-conscious is
> serving privacy to those who don't even know they want it.
> I'm nowhere near an expert and I could be just talking out of my
> ass, so please let me know if this is completely stupid and would
> never work. Thanks!
> Cheers, Helder
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
More information about the tor-talk