[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] [Cryptography] Implementing full Internet IPv6 end-to-end encryption based on Cryptographically Generated Address



On 01/24/2019 12:44 PM, Alec Muffett wrote:
> On Thu, 24 Jan 2019 at 19:33, grarpamp <grarpamp@xxxxxxxxx> wrote:
> 
>> As readers may be aware,
>> Tor has an interesting capability via OnionCat and OnionVPN
>> ...
> 
> There's an open project for anyone who wants it...
>> To bring IPv6 over v3 onions to Tor.
>>
> 
> Hi Grarpamp,
> 
> I'm aware of this.  I've seen you mention it, several times recently.
> 
> I'm wondering: could you please expand upon how this compares in importance
> to simply promoting the native adoption of Tor v3 Onion Networking, amongst
> the community of tool-developers and tool-users whom you envision the above
> solution (OnionCat/OnionVPN/IP-routing) benefitting?
> 
> Thanks!
> 
>     -alec

I've not heard of "Tor v3 Onion Networking". Does it exist? Or if not,
are there plans?

Or do you mean just using v3 onion-onion sockets? That would be painful.

If there were native overlay networking among v3 onions, which handled
UDP as well as TCP, that would arguably be a better solution. But you
can't just invent an addressing scheme, because none of the existing
tools and apps could use it. For compatibility, isn't IPv6 the only
workable approach? The IPv4 space is way too small.

Indeed, as discussed in other threads, v3 onion mapping would take a
large chunk of IPv6. And that would mean stepping on assigned public
IPv6 ranges. Or just using a restricted v3 address space.
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk