svn commit: r419557 - head/net/onioncat

Carlo Strub cs at FreeBSD.org
Wed Aug 3 21:03:09 UTC 2016


Author: cs
Date: Wed Aug  3 21:03:08 2016
New Revision: 419557
URL: https://svnweb.freebsd.org/changeset/ports/419557

Log:
  Update pkg-descr

Modified:
  head/net/onioncat/pkg-descr

Modified: head/net/onioncat/pkg-descr
==============================================================================
--- head/net/onioncat/pkg-descr	Wed Aug  3 20:52:15 2016	(r419556)
+++ head/net/onioncat/pkg-descr	Wed Aug  3 21:03:08 2016	(r419557)
@@ -1,9 +1,19 @@
-OnionCat creates a transparent IP layer on top of Tor's hidden services.
-It transmits any kind of IP-based data transparently through the Tor
-network on a location hidden basis.
+OnionCat is a VPN-adapter which allows to connect two or more computers or
+networks through VPN-tunnels. It is designed to use the anonymization networks
+Tor or I2P as its transport, hence, it provides location-based anonymity while
+still creating tunnel end points with private unique IP addresses.
 
-You can think of it as a point-to-multipoint VPN between hidden services.
+OnionCat uses IPv6 as native layer 3 network protocol. The clients
+connected by it appear as on a single logical IPv6 network as being connected
+by a virtual switch. OnionCat automatically calculates and assigns unique IPv6
+addresses to the tunnel end points which are derived from the hidden service
+ID (onion ID) of the hidden service of the local Tor client, or the local I2P
+server destination, respectively. This technique provides authentication
+between the onion ID and the layer 3 address, hence, defeats IP spoofing
+within the OnionCat VPN.
 
-OnionCat is based on anonymizing transport layers like Tor.
+If necessary, OnionCat can of course transport IPv4 as well. Although it has
+native IP support, the suggested way to do this is to configure an
+IPv4-in-IPv6 tunnel.
 
-WWW: http://www.cypherpunk.at/onioncat/
+WWW: https://www.onioncat.org/


More information about the svn-ports-all mailing list