I was inspired by onioncat to write a twisted python implementation. Onionvpn 
doesn't have as many features as onioncat. I've successfully tested that 
onionvpn and onioncat can talk to each other and play nice. Both onionvpn and 
onioncat implement a virtual public network. Anyone can send packets to you if 
they know your onion address or ipv6 address... however injection attacks are 
unlikely since the attacker cannot know the contents of your traffic without 
compromising the tor process managing the onion service.

I've also tested with mosh; that is, you can use mosh which only works with 
ipv4 over an ipv4-to-ipv6 tunnel over onionvpn/onioncat. Like this:

mosh-client -> udp/ipv4 -> ipv6 -> tun device -> tcp-to-tor -> onion service 
decodes ipv6 to tun device -> ipv6 -> udp/ipv4 -> mosh-server

https://github.com/david415/onionvpn


If an onionvpn/onioncat operator were to NAT the onion ipv6 traffic to the 
Internet then that host essentially becomes a special IPv6 exit node for the 
tor network. The same can be done for IPv4. Obviously operating such an exit 
node might be risky due to the potential for abuse... however don't you just 
love the idea of being about to use low-level network scanners over tor? I 
wonder if Open Observatory of Network Interference would be interested in this.


david

Attachment: signature.asc
Description: Digital signature

_______________________________________________
tor-dev mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to