>> was just looking at BGP routing over tor. I'm not sure how to do that with >> the current implementation over hidden service. I'm having a hard time >> working out how to use it as layer 2 and encapsulate things over the >> network from one hidden service to another. > > This is because Tor only provides proxying and exit services at the > transit layer. You can't route arbitrary IP packets over Tor, and > so you can't, for example, ping or traceroute over Tor. > > https://www.torproject.org/docs/faq.html.en#TransportIPnotTCP > > Hidden services, for their part, don't even identify destinations with > IP addresses, so there's no prospect of using IP routing protocols to > describe routes to them.
There are ways to do that... https://www.onioncat.org/ https://github.com/david415/onionvpn https://www.youtube.com/watch?v=Zj4hSx6cW80 https://itsecx.fhstp.ac.at/wp-content/uploads/2014/11/FischerOnionCat.pdf https://trac.torproject.org/projects/tor/search?q=onioncat&noquickjump=1&ticket=on&wiki=on https://trac.torproject.org/projects/tor/search?q=onionvpn&noquickjump=1&ticket=on&wiki=on https://www.youtube.com/watch?v=rx4rS1gvp7Y https://www.youtube.com/watch?v=ByRkUowW7UY https://www.youtube.com/watch?v=RFHD6rKX3LI Yes if you changed the /48, played with NAT, and/or added router services... you could also interface onions end to end with clearnet and things like CJDNS / Hyperboria if you wanted to. > There have been projects to try to make a router that would automatically > proxy all TCP traffic to send it through Tor by default. Packet filters, tails, whonix, tor-ramdisk, etc do essentially this all the time. > that they were supposed to remove linkable identifiers and behaviors. > send cookies from non-Tor sessions > continue to be highly fingerprintable. Then don't do those things. They're user issues, not issues of whatever anonymous overlay. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk