💾 Archived View for perso.pw › blog › articles › onioncat-port.gmi captured on 2023-04-19 at 23:35:10. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2023-01-29)

➡️ Next capture (2023-05-24)

-=-=-=-=-=-=-

Tor part 5: onioncat for IPv6 VPN over tor

NIL=> Comment on Mastodon

This article is about a software named **onioncat**, it is available as a

package on most Unix and Linux systems. This software allows to create an IPv6

VPN over Tor, with no restrictions on network usage.

First, we need to install onioncat, on OpenBSD:

$ doas pkg_add onioncat

Run a tor hidden service, as explained in one of my previous article, and get

the hostname value. If you run multiples hidden services, pick one hostname.

# cat /var/tor/ssh_hidden_service/hostname

g6adq2w15j1eakzr.onion

Now that we have the hostname, we just need to run `ocat`.

# ocat g6adq2w15j1eakzr.onion

If everything works as expected, a [tun](https://man.openbsd.org/tun) interface

will be created. With a fe80:: IPv6 address assigned to it, and a fd87::

address.

Your system is now reachable, via Tor, through its IPv6 address starting with

fd87:: . It supports _every_ IP protocol. Instead of using **torsocks** wrapper

and .onion hostname, you can use the IPv6 address with any software.