[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Post Quantum Tor



Right well I suppose I can see this as a system of routing anonymously to a
key. I was just wondering about using tor ostensibly as a network interface
module and I suppose it could be compiled as a library elf and other
applications can be made for working with certain aspects of tor and
passing structures through ipc.

On Tue, May 29, 2018, 1:51 PM grarpamp <grarpamp@xxxxxxxxx> wrote:

> >> was just looking at BGP routing over tor. I'm not sure how to do that
> with
> >> the current implementation over hidden service. I'm having a hard time
> >> working out how to use it as layer 2 and encapsulate things over the
> >> network from one hidden service to another.
> >
> > This is because Tor only provides proxying and exit services at the
> > transit layer.  You can't route arbitrary IP packets over Tor, and
> > so you can't, for example, ping or traceroute over Tor.
> >
> > https://www.torproject.org/docs/faq.html.en#TransportIPnotTCP
> >
> > Hidden services, for their part, don't even identify destinations with
> > IP addresses, so there's no prospect of using IP routing protocols to
> > describe routes to them.
>
> There are ways to do that...
>
> https://www.onioncat.org/
> https://github.com/david415/onionvpn
>
> https://www.youtube.com/watch?v=Zj4hSx6cW80
> https://itsecx.fhstp.ac.at/wp-content/uploads/2014/11/FischerOnionCat.pdf
>
> https://trac.torproject.org/projects/tor/search?q=onioncat&noquickjump=1&ticket=on&wiki=on
>
> https://trac.torproject.org/projects/tor/search?q=onionvpn&noquickjump=1&ticket=on&wiki=on
> https://www.youtube.com/watch?v=rx4rS1gvp7Y
> https://www.youtube.com/watch?v=ByRkUowW7UY
> https://www.youtube.com/watch?v=RFHD6rKX3LI
>
> Yes if you changed the /48, played with NAT, and/or added router
> services...
> you could also interface onions end to end with clearnet and things
> like CJDNS / Hyperboria if you wanted to.
>
> > There have been projects to try to make a router that would automatically
> > proxy all TCP traffic to send it through Tor by default.
>
> Packet filters, tails, whonix, tor-ramdisk, etc do essentially this
> all the time.
>
> > that they were supposed to remove linkable identifiers and behaviors.
>
> > send cookies from non-Tor sessions
>
> > continue to be highly fingerprintable.
>
> Then don't do those things.
> They're user issues, not issues of whatever anonymous overlay.
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk