Delivery-Date: Fri, 11 Jul 2014 01:57:21 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD,UNPARSEABLE_RELAY autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 72A631E0DF1
	for <archiver@seul.org>; Fri, 11 Jul 2014 01:57:19 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id B0E7230436;
	Fri, 11 Jul 2014 05:57:14 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id BBB1C3042E
 for <tor-talk@lists.torproject.org>; Fri, 11 Jul 2014 05:43:54 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Q5scvjxLDV1k for <tor-talk@lists.torproject.org>;
 Fri, 11 Jul 2014 05:43:54 +0000 (UTC)
Received: from mail.potager.org (quatre.potager.org [91.194.60.100])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "*.potager.org",
 Issuer "StartCom Class 2 Primary Intermediate Server CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 856B43042D
 for <tor-talk@lists.torproject.org>; Fri, 11 Jul 2014 05:43:54 +0000 (UTC)
Received: from [127.0.0.1] (localhost [127.0.0.1]) with ESMTPSA id 4A2CAC2B86F
Date: Fri, 11 Jul 2014 07:43:47 +0200
From: Lunar <lunar@torproject.org>
To: tor-talk@lists.torproject.org
Message-ID: <20140711054347.GD21892@loar>
Mail-Followup-To: tor-talk@lists.torproject.org
References: <CAP3fC8St0ec=HnPTkb2bJS78v21CJtHHHg1fWHnN17XTYrdS0Q@mail.gmail.com>
MIME-Version: 1.0
In-Reply-To: <CAP3fC8St0ec=HnPTkb2bJS78v21CJtHHHg1fWHnN17XTYrdS0Q@mail.gmail.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
Subject: Re: [tor-talk] Can NAT traversal be Tor's killer feature?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6189670400130475767=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


--===============6189670400130475767==
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="uxuisgdDHaNETlh8"
Content-Disposition: inline


--uxuisgdDHaNETlh8
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Helder Ribeiro:
> tl;dr: how about a virtual global flat LAN that maps static IPs to
> onion addresses?

Are you aware of OnionCat?
https://www.onioncat.org/

=46rom the description of the Debian package:

 OnionCat creates a transparent IP layer on top of Tor hidden
 services. It transparently transmits any kind of IP-based data
 through the Tor network on a location hidden basis. You can think of
 it as a point-to-multipoint VPN between hidden services.

 OnionCat is a stand-alone application which runs in userland and is a
 connector between Tor and the local OS. Any protocol based on IP,
 such as UDP or TCP, can be transmitted.

 OnionCat supports IPv6; native IPv4 forwarding, though still
 available, is deprecated: the recommended solution for IPv4
 forwarding is to build a IPv4-through-IPv6 tunnel through OnionCat.

--=20
Lunar                                             <lunar@torproject.org>

--uxuisgdDHaNETlh8
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=uX1E
-----END PGP SIGNATURE-----

--uxuisgdDHaNETlh8--

--===============6189670400130475767==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============6189670400130475767==--

