[tor-talk] Can NAT traversal be Tor's killer feature?

Lunar lunar at torproject.org
Fri Jul 11 05:43:47 UTC 2014


Helder Ribeiro:
> tl;dr: how about a virtual global flat LAN that maps static IPs to
> onion addresses?

Are you aware of OnionCat?
https://www.onioncat.org/

From the description of the Debian package:

 OnionCat creates a transparent IP layer on top of Tor hidden
 services. It transparently transmits any kind of IP-based data
 through the Tor network on a location hidden basis. You can think of
 it as a point-to-multipoint VPN between hidden services.

 OnionCat is a stand-alone application which runs in userland and is a
 connector between Tor and the local OS. Any protocol based on IP,
 such as UDP or TCP, can be transmitted.

 OnionCat supports IPv6; native IPv4 forwarding, though still
 available, is deprecated: the recommended solution for IPv4
 forwarding is to build a IPv4-through-IPv6 tunnel through OnionCat.

-- 
Lunar                                             <lunar at torproject.org>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140711/d1eb79a6/attachment.sig>


More information about the tor-talk mailing list