OnionCat creates a transparent IP layer on top of Tor's hidden services.

It transmits any kind of IP-based data transparently through the Tor
network on a location hidden basis.

You can think of it as a point-to-multipoint VPN between hidden services.

OnionCat is based on anonymizing transport layers like Tor.

WWW:	http://www.cypherpunk.at/onioncat/

PR:		ports/146433
Submitted by:	"ports@c0decafe.net" <ports@c0decafe.net>
This commit is contained in:
Martin Wilke 2010-05-10 02:24:54 +00:00
parent 20420eb9da
commit 98915213c0
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=254034
6 changed files with 76 additions and 0 deletions

View file

@ -444,6 +444,7 @@
SUBDIR += omnitty
SUBDIR += onenetd
SUBDIR += onion-fec
SUBDIR += onioncat
SUBDIR += online-desktop
SUBDIR += opal
SUBDIR += opal3

30
net/onioncat/Makefile Normal file
View file

@ -0,0 +1,30 @@
# New ports collection makefile for: onioncat
# Date created: 2010-05-09
# Whom: <ports@c0decafe.net>
#
# $FreeBSD$
#
PORTNAME= onioncat
PORTVERSION= 0.2.1
CATEGORIES= net security
MASTER_SITES= http://www.cypherpunk.at/ocat/download/Source/stable/
MAINTAINER= ports@c0decafe.net
COMMENT= An IP-Transparent Tor Hidden Service Connector
RUN_DEPENDS= tor:${PORTSDIR}/security/tor
GNU_CONFIGURE= yes
USE_RC_SUBR= ${PORTNAME}
MAN1= ocat.1
PLIST_FILES= bin/ocat
.include <bsd.port.pre.mk>
do-install:
${INSTALL_PROGRAM} ${WRKSRC}/src/ocat ${PREFIX}/bin
${INSTALL_MAN} ${WRKSRC}/man/ocat.1 ${PREFIX}/man/man1/ocat.1
.include <bsd.port.post.mk>

3
net/onioncat/distinfo Normal file
View file

@ -0,0 +1,3 @@
MD5 (onioncat-0.2.1.tar.gz) = 139c9d1f54feab68a3df76975f993b57
SHA256 (onioncat-0.2.1.tar.gz) = 1a07b62b72ee65d10e70b972e2ade1387e2232bc0652747e03bebe7235c84a8e
SIZE (onioncat-0.2.1.tar.gz) = 179988

View file

@ -0,0 +1,25 @@
#!/bin/sh
#
# PROVIDE: onioncat
# REQUIRE: NETWORKING SERVERS USR tor
# BEFORE: LOGIN
#
# Add the following lines to /etc/rc.conf to enable tor.
# All these options will overide any settings in your local torrc as
# they are command line options.
. /etc/rc.subr
name="onioncat"
rcvar=${name}_enable
load_rc_config ${name}
: ${onioncat_enable="NO"}
: ${onioncat_options="-C"}
: ${onioncat_hostname="-R"}
command="%%PREFIX%%/bin/ocat"
command_args="${onioncat_options} ${onioncat_hostname}"
run_rc_command "$1"

9
net/onioncat/pkg-descr Normal file
View file

@ -0,0 +1,9 @@
OnionCat creates a transparent IP layer on top of Tor's hidden services.
It transmits any kind of IP-based data transparently through the Tor
network on a location hidden basis.
You can think of it as a point-to-multipoint VPN between hidden services.
OnionCat is based on anonymizing transport layers like Tor.
WWW: http://www.cypherpunk.at/onioncat/

8
net/onioncat/pkg-message Normal file
View file

@ -0,0 +1,8 @@
If you plan to also receive connections (e.g. because you provide a service or
you use software which opens sockets for incomming connections like Bitorrent)
you MUST the onioncat_hostname in rc.conf and configure the following hidden
service in torrc:
HiddenServicePort 8060 127.0.0.1:8060
Finally, please consider setting up an IPv6 firewall.