[tor-talk] Can NAT traversal be Tor's killer feature?
Lunar
lunar at torproject.org
Fri Jul 11 05:43:47 UTC 2014
Helder Ribeiro:
> tl;dr: how about a virtual global flat LAN that maps static IPs to
> onion addresses?
Are you aware of OnionCat?
https://www.onioncat.org/
From the description of the Debian package:
OnionCat creates a transparent IP layer on top of Tor hidden
services. It transparently transmits any kind of IP-based data
through the Tor network on a location hidden basis. You can think of
it as a point-to-multipoint VPN between hidden services.
OnionCat is a stand-alone application which runs in userland and is a
connector between Tor and the local OS. Any protocol based on IP,
such as UDP or TCP, can be transmitted.
OnionCat supports IPv6; native IPv4 forwarding, though still
available, is deprecated: the recommended solution for IPv4
forwarding is to build a IPv4-through-IPv6 tunnel through OnionCat.
--
Lunar <lunar at torproject.org>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140711/d1eb79a6/attachment.sig>
More information about the tor-talk
mailing list