ports/146433: [NEW PORT] net/onioncat: An IP-Transparent Tor Hidden Service Connector

ports at c0decafe.net ports at c0decafe.net
Sun May 9 14:30:03 UTC 2010


>Number:         146433
>Category:       ports
>Synopsis:       [NEW PORT] net/onioncat: An IP-Transparent Tor Hidden Service Connector
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Sun May 09 14:30:02 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator:     ports at c0decafe.net
>Release:        FreeBSD 7.3-STABLE i386
>Organization:
>Environment:
System: FreeBSD kitchen.c0decafe.net 7.3-STABLE FreeBSD 7.3-STABLE #7: Mon Apr 26 05:01:08 EEST 2010
>Description:
OnionCat creates a transparent IP layer on top of Tor's hidden services.
It transmits any kind of IP-based data transparently through the Tor
network on a location hidden basis.

You can think of it as a point-to-multipoint VPN between hidden services.

OnionCat is based on anonymizing transport layers like Tor. 

WWW:	http://www.cypherpunk.at/onioncat/

Generated with FreeBSD Port Tools 0.99
>How-To-Repeat:
>Fix:

--- onioncat-0.2.1.shar begins here ---
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	onioncat
#	onioncat/pkg-descr
#	onioncat/Makefile
#	onioncat/pkg-message
#	onioncat/distinfo
#	onioncat/files
#	onioncat/files/onioncat.in
#
echo c - onioncat
mkdir -p onioncat > /dev/null 2>&1
echo x - onioncat/pkg-descr
sed 's/^X//' >onioncat/pkg-descr << 'b218353c135e53545d1f0e486b616a59'
XOnionCat creates a transparent IP layer on top of Tor's hidden services.
XIt transmits any kind of IP-based data transparently through the Tor
Xnetwork on a location hidden basis.
X
XYou can think of it as a point-to-multipoint VPN between hidden services.
X
XOnionCat is based on anonymizing transport layers like Tor. 
X
XWWW:	http://www.cypherpunk.at/onioncat/
b218353c135e53545d1f0e486b616a59
echo x - onioncat/Makefile
sed 's/^X//' >onioncat/Makefile << '0016fe0abf7bb911a878f63bbc70cd37'
X# New ports collection makefile for:	onioncat
X# Date created:		2010-05-09
X# Whom:			<ports at c0decafe.net>
X#
X# $FreeBSD$
X#
X
XPORTNAME=	onioncat
XPORTVERSION=	0.2.1
XCATEGORIES=	net security
XMASTER_SITES=	http://www.cypherpunk.at/ocat/download/Source/stable/
X
XMAINTAINER=	ports at c0decafe.net
XCOMMENT=	An IP-Transparent Tor Hidden Service Connector
X
XRUN_DEPENDS=	tor:${PORTSDIR}/security/tor
X
XGNU_CONFIGURE=	yes
X
XUSE_RC_SUBR=	${PORTNAME}
XMAN1=		ocat.1
XPLIST_FILES=	bin/ocat
X
X.include <bsd.port.pre.mk>
X
Xdo-install:
X	${INSTALL_PROGRAM} ${WRKSRC}/src/ocat ${PREFIX}/bin
X	${INSTALL_MAN} ${WRKSRC}/man/ocat.1 ${PREFIX}/man/man1/ocat.1
X
X.include <bsd.port.post.mk>
0016fe0abf7bb911a878f63bbc70cd37
echo x - onioncat/pkg-message
sed 's/^X//' >onioncat/pkg-message << '1aa31556615feda3e723e00fd91fc394'
XIf you plan to also receive connections (e.g. because you provide a service or
Xyou use software which opens sockets for incomming connections like Bitorrent)
Xyou MUST the onioncat_hostname in rc.conf and configure the following hidden
Xservice in torrc:
X
XHiddenServicePort 8060 127.0.0.1:8060
X
XFinally, please consider setting up an IPv6 firewall. 
1aa31556615feda3e723e00fd91fc394
echo x - onioncat/distinfo
sed 's/^X//' >onioncat/distinfo << 'ba36ce20dffd55e2c71fbe91a4745cc1'
XMD5 (onioncat-0.2.1.tar.gz) = 139c9d1f54feab68a3df76975f993b57
XSHA256 (onioncat-0.2.1.tar.gz) = 1a07b62b72ee65d10e70b972e2ade1387e2232bc0652747e03bebe7235c84a8e
XSIZE (onioncat-0.2.1.tar.gz) = 179988
ba36ce20dffd55e2c71fbe91a4745cc1
echo c - onioncat/files
mkdir -p onioncat/files > /dev/null 2>&1
echo x - onioncat/files/onioncat.in
sed 's/^X//' >onioncat/files/onioncat.in << '0dd4cd80f9bfd77c9e7078b827271c66'
X#!/bin/sh
X#
X# PROVIDE: onioncat
X# REQUIRE: NETWORKING SERVERS USR tor
X# BEFORE: LOGIN
X#
X# Add the following lines to /etc/rc.conf to enable tor.
X# All these options will overide any settings in your local torrc as
X# they are command line options.
X
X. /etc/rc.subr
X
Xname="onioncat"
Xrcvar=${name}_enable
X
Xload_rc_config ${name}
X
X: ${onioncat_enable="NO"}
X: ${onioncat_options="-C"}
X: ${onioncat_hostname="-R"}
X
Xcommand="%%PREFIX%%/bin/ocat"
Xcommand_args="${onioncat_options} ${onioncat_hostname}"
X
Xrun_rc_command "$1"
0dd4cd80f9bfd77c9e7078b827271c66
exit
--- onioncat-0.2.1.shar ends here ---

>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list