svn commit: r419557 - head/net/onioncat
Carlo Strub
cs at FreeBSD.org
Wed Aug 3 21:03:09 UTC 2016
Author: cs
Date: Wed Aug 3 21:03:08 2016
New Revision: 419557
URL: https://svnweb.freebsd.org/changeset/ports/419557
Log:
Update pkg-descr
Modified:
head/net/onioncat/pkg-descr
Modified: head/net/onioncat/pkg-descr
==============================================================================
--- head/net/onioncat/pkg-descr Wed Aug 3 20:52:15 2016 (r419556)
+++ head/net/onioncat/pkg-descr Wed Aug 3 21:03:08 2016 (r419557)
@@ -1,9 +1,19 @@
-OnionCat creates a transparent IP layer on top of Tor's hidden services.
-It transmits any kind of IP-based data transparently through the Tor
-network on a location hidden basis.
+OnionCat is a VPN-adapter which allows to connect two or more computers or
+networks through VPN-tunnels. It is designed to use the anonymization networks
+Tor or I2P as its transport, hence, it provides location-based anonymity while
+still creating tunnel end points with private unique IP addresses.
-You can think of it as a point-to-multipoint VPN between hidden services.
+OnionCat uses IPv6 as native layer 3 network protocol. The clients
+connected by it appear as on a single logical IPv6 network as being connected
+by a virtual switch. OnionCat automatically calculates and assigns unique IPv6
+addresses to the tunnel end points which are derived from the hidden service
+ID (onion ID) of the hidden service of the local Tor client, or the local I2P
+server destination, respectively. This technique provides authentication
+between the onion ID and the layer 3 address, hence, defeats IP spoofing
+within the OnionCat VPN.
-OnionCat is based on anonymizing transport layers like Tor.
+If necessary, OnionCat can of course transport IPv4 as well. Although it has
+native IP support, the suggested way to do this is to configure an
+IPv4-in-IPv6 tunnel.
-WWW: http://www.cypherpunk.at/onioncat/
+WWW: https://www.onioncat.org/
More information about the svn-ports-head
mailing list