[tor-talk] Can OpenVPN servers be run as Tor hidden services?
Bernhard R. Fischer
bf at abenteuerland.at
Tue Apr 2 10:20:37 UTC 2013
On Wednesday 27 March 2013 07:36:42 mirimir wrote:
> On 03/27/2013 05:38 AM, Bernhard R. Fischer wrote:
> > On Wednesday 27 March 2013 04:59:41 mirimir wrote:
> >> OpenVPN clients connect with servers via Tor in TCP mode.
> >>
> >> But can OpenVPN servers be run as Tor hidden services?
> >>
> >> I searched quite a bit, but didn't find anything. That's surprising,
> >> because (in retrospect) the idea seems so obvious.
> >>
> >> What am I missing?
>
> <snip>
>
> > If you are trying to build an IP connection between hosts based on hidden
> > services, you may also use OnionCat. It does exactly what you are looking
> > for.
> >
> > https://www.cypherpunk.at/onioncat/
>
> Thank you. I didn't think of OnionCat, although I've read about it before.
>
> Using OnionCat, would I be establishing a private point-to-point
> connection to the remote IPv6 address? Or would I be connecting to a
> common multi-point VPN, through which I could reach the remote IPv6
> address?
OC works point-to-point but of course several "clients" could connect to one
central point. I put "clients" under quotes because OC implements the peer-to-
peer-model and not the client-server-model.
Since it offers a transparent IP connection you can additionally setup any
kind of routing.
Regards,
Bernhard
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20130402/24074499/attachment-0001.pgp>
More information about the tor-talk
mailing list