Delivery-Date: Tue, 08 Mar 2016 18:28:49 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 90C771E0C90;
	Tue,  8 Mar 2016 18:28:47 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id AB39738D96;
	Tue,  8 Mar 2016 23:28:40 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 01ACB344BE
 for <tor-talk@lists.torproject.org>; Tue,  8 Mar 2016 23:28:37 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id VUulFtJd6XAU for <tor-talk@lists.torproject.org>;
 Tue,  8 Mar 2016 23:28:36 +0000 (UTC)
Received: from mail-vk0-x236.google.com (mail-vk0-x236.google.com
 [IPv6:2607:f8b0:400c:c05::236])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id C61EE323BC
 for <tor-talk@lists.torproject.org>; Tue,  8 Mar 2016 23:28:36 +0000 (UTC)
Received: by mail-vk0-x236.google.com with SMTP id e185so36553398vkb.1
 for <tor-talk@lists.torproject.org>; Tue, 08 Mar 2016 15:28:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :cc; bh=pWYmMKy4SY+Dx2b1DKdEfdYg8KngiyTRZF4iFIxdXMQ=;
 b=JByt106+/uhRluWB81g0NBs4Z5m2HQu1BHXck4zWYLeC5OLKIXpxeEjR2twtBY95hv
 JOLzt7NN5103eq3GuPnYiWNBYufm1TgqhRE7F5SrTJhxrIYVP4Qxez53yFCrPYXf64od
 5BNUqPSsUC1oIKVmElhBIAQW5+JLVXQEgBCol+UkPLgMvGzFF6Z8pNuzRJy61Ce02yYt
 Ac6k2duG2w8dr5aD20QkahvkmX8fy9KVwgEZ6p1Lr7m/+KEpQuSqLtNwa9uL84c7+/Zr
 h80jG6KZ5oVwfw7xwo1dPOWonoAxNyJ8LG/NPQl1K60IQaj+NLGnpPfIaLceckH3bQzM
 KbzA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20130820;
 h=x-gm-message-state:mime-version:in-reply-to:references:date
 :message-id:subject:from:to:cc;
 bh=pWYmMKy4SY+Dx2b1DKdEfdYg8KngiyTRZF4iFIxdXMQ=;
 b=Co2g5dT5H+enUH6iWLvjA4EIk9A7eG3XllQc9VZGKf60lv2pPpwKwgHmNcJiyT/29/
 9A2lHmkIE0X41oNdNheOxQ/tsvhJ1nYfg6GLigFRkG0+UZ2eSveIS5Z/TgulxAYpF4Yc
 9ciPrlst+UKOxJoRTgvGla/uqEDP2znAOC2K/fksKSQncpUyAS2kMqMU6jjaEGAjofpk
 U30u1GgJA9LmUWp04YbcHS7eicg07nWNYXrXtDT786RO5UtlvQPsE48w407Nht6UOfXR
 xZ/tEAgM1ySwRAm2XT4PnJqtkpB6a47x6zA/GG6us9/7ud6VNXdBReRzo0G1m7DFiQoF
 3b2Q==
X-Gm-Message-State: AD7BkJI03As2rEB9hSaWeyfM6NJxnNKasIFCtpORC8GPLVGvk0q+99JMY1GXSgIo4Cds31ZuHLkxT+A8qYievw==
MIME-Version: 1.0
X-Received: by 10.31.154.21 with SMTP id c21mr29149491vke.38.1457479714183;
 Tue, 08 Mar 2016 15:28:34 -0800 (PST)
Received: by 10.176.69.5 with HTTP; Tue, 8 Mar 2016 15:28:34 -0800 (PST)
In-Reply-To: <56DE8F93.4050307@abenteuerland.at>
References: <CAD2Ti2-j50nD0yJpk1vCowP8ZvY88zsOekd5VrxjXBOFA3_j9Q@mail.gmail.com>
 <a976c2ee32d91ccb898f53d841980efe@blackmesa.at>
 <CAD2Ti2_hBgAdZeiDXmyc6WmBsLorGmjAQrQA8r-Hz7_j0nXwww@mail.gmail.com>
 <56DE8F93.4050307@abenteuerland.at>
Date: Tue, 8 Mar 2016 18:28:34 -0500
Message-ID: <CAD2Ti29OFagohqxdZ2Wn8E-pEjBSn8zGKDrtTZDZ-ua8BGzhcA@mail.gmail.com>
From: grarpamp <grarpamp@gmail.com>
To: onioncat@lists.blackmesa.at
Cc: cypherpunks@cpunks.org, tor-talk@lists.torproject.org
Subject: Re: [tor-talk] [onioncat] Onioncat v2
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 3/8/16, Bernhard R. Fischer <bf@abenteuerland.at> wrote:
> "Do we want to keep this nice automatic IPv6/Onion-ID translation feature?"
>
> If NO:
> There's no problem. Everybody can setup his own hosts-file for the
> translation.
>
> If YES:
> Independent of the final solution there is a need for a
> lookup-database/service of any kind.

This goes to two things...
- the usage models you expect
- the usage models you want to enable

Let's keep in mind that the fundamental strengths
of onioncat and reason that it exists are...
- tor and other anonymous overlay networks often do not
support full IP semantics, with tor it's TCP only, which
cripples or eliminates certain apps.
- anonymous overlay networks often do not support
interfaces to the traditional IP stack of OS's, with
tor it's onion only, which you can't bind(2) to, except
via hack within the tor daemon... which only does tcp,
which doesn't route, or packet filter, or VM, or...

"NO" ... well, that's fine for individual people who
meetup elsewhere and personally agree to exchange
keys and addresses (or find such listed on the web, etc)
in order to communicate. It scales only to the extent
one can personally manage it, and it is not oppurtunistic
as far as making random new introductions.

"YES"... this is where the real potential lies. Lots
of apps are p2p, or at least rely on central servers
to tell them of their peers in real time. Bitcoin and
bittorrent are purely p2p with peers coming in via
the network itself at random. VOIP could be thought
to be central yet random. This list of non-manual config
apps is really long. Then evaluate which are popular
in the opensource space whereby they're possibly
not run by popular centrals like facebook, but by
community (XMPP), or strictly p2p.

It seems that NO would still serve a purpose and thus
would be a call to making an onioncat v2. And that YES
would be a very interesting project that needs to look at
many potential solutions some of which people post ideas
about on list.

> IMO we should use an existing database and we should not try to

Yes if it is available, or willing to be developed and integrated
by the overlays for such use.

> establish a new system because this depends always on people willing to
> run these.

For example, it may be possible that the [transmission] bittorrent,
and cryptocoin, communities might see a reason to run something
separate if it gave them p2p access to anonymous transport layers.

> I do not know about the userbase of OnionCat but we should
> assume that it is small, hence, not (yet) able to keep enough Onioncats
> up for running a DB (DHT or whatever).

Public usage is all in supply, demand, and advertising.
Private usage has seen some successful onion/i2p like
what.cd [nee i2p/onion] membership.

Evaluating the needs of some VOIP and messaging
protocols re IPv6 UDP and tun interface might be useful.
We already know bittorrent needs udp and trackerless p2p
to be efficient.

Another way to think is... can the overall utility of anonymous
overlay networks ever grow if they continue to be restricted to,
say, TCP and their own proprietary addressing stacks?
Are there RFC type proposals to interoperate / expand that among
the community of overlay networks?
And is onioncat a good place to enable that if either are no?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

