[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector



On Thursday 26 June 2008, 7v5w7go9ub0o wrote:
> Dave Page wrote:
> > On Wed, Jun 25, 2008 at 09:16:12AM -0400, 7v5w7go9ub0o wrote:
> >> Bernhard Fischer wrote:
> >>> On Tuesday 24 June 2008, 7v5w7go9ub0o wrote:
> >>>> My hope is to use OnionCat on my laptop to VNC via TOR to my home
> >>>> computer using nomachine NX. Is that kind of use possible with OC?
> >>
> >> 1. Connecting via TOR would be an extra, minor security option to
> >> conceal the fact that my home is running a VNC server - eavesdropping
> >> kids at the hotspot may try to make it a hacking "prize".
> >
> > If you are connecting using NX, the only port you need to access is SSH
> > - all NX traffic is tunneled over that. Of course, you should never use
> > the default NX SSH keys over the Internet.
>
> Thanks for replying! I've set up new keys; NX works great! :-)
>
> So if I  was using NX/SSH to the non-standard port of 443, and if my
> server box looked like this:
>
> [SNIP]
>
> tun0      Link encap:UNSPEC  HWaddr
> 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
>            inet6 addr: fd87:d87e:eb43:e20e:a09d:5e14:fabb:edf3/48
> Scope:Global
>            UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
>
> [SNIP]
> =======================================
> so would it be, e.g.:
>
> ListenAddress fd87:d87e:eb43:e20e:a09d:5e14:fabb:edf3
>
> or perhaps:
>
> ListenAddress fe80::2a0:ccff:fe7a:4574
>
> or perhaps:
>
> ListenAddress 0.0.0.0
>

Of course fd87:d87e:eb43:e20e:a09d:5e14:fabb:edf3.
The fe80 is just a link local address and it's part of the IPv6 protocol 
standard but forget it for normal purpose.

Bernhard

Attachment: signature.asc
Description: This is a digitally signed message part.