OnionCat creates a transparent IP layer on top of Tor's hidden services.
It transmits any kind of IP-based data transparently through the Tor network on a location hidden basis. You can think of it as a point-to-multipoint VPN between hidden services. OnionCat is based on anonymizing transport layers like Tor. WWW: http://www.cypherpunk.at/onioncat/ PR: ports/146433 Submitted by: "ports@c0decafe.net" <ports@c0decafe.net>
This commit is contained in:
parent
20420eb9da
commit
98915213c0
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=254034
6 changed files with 76 additions and 0 deletions
|
@ -444,6 +444,7 @@
|
|||
SUBDIR += omnitty
|
||||
SUBDIR += onenetd
|
||||
SUBDIR += onion-fec
|
||||
SUBDIR += onioncat
|
||||
SUBDIR += online-desktop
|
||||
SUBDIR += opal
|
||||
SUBDIR += opal3
|
||||
|
|
30
net/onioncat/Makefile
Normal file
30
net/onioncat/Makefile
Normal file
|
@ -0,0 +1,30 @@
|
|||
# New ports collection makefile for: onioncat
|
||||
# Date created: 2010-05-09
|
||||
# Whom: <ports@c0decafe.net>
|
||||
#
|
||||
# $FreeBSD$
|
||||
#
|
||||
|
||||
PORTNAME= onioncat
|
||||
PORTVERSION= 0.2.1
|
||||
CATEGORIES= net security
|
||||
MASTER_SITES= http://www.cypherpunk.at/ocat/download/Source/stable/
|
||||
|
||||
MAINTAINER= ports@c0decafe.net
|
||||
COMMENT= An IP-Transparent Tor Hidden Service Connector
|
||||
|
||||
RUN_DEPENDS= tor:${PORTSDIR}/security/tor
|
||||
|
||||
GNU_CONFIGURE= yes
|
||||
|
||||
USE_RC_SUBR= ${PORTNAME}
|
||||
MAN1= ocat.1
|
||||
PLIST_FILES= bin/ocat
|
||||
|
||||
.include <bsd.port.pre.mk>
|
||||
|
||||
do-install:
|
||||
${INSTALL_PROGRAM} ${WRKSRC}/src/ocat ${PREFIX}/bin
|
||||
${INSTALL_MAN} ${WRKSRC}/man/ocat.1 ${PREFIX}/man/man1/ocat.1
|
||||
|
||||
.include <bsd.port.post.mk>
|
3
net/onioncat/distinfo
Normal file
3
net/onioncat/distinfo
Normal file
|
@ -0,0 +1,3 @@
|
|||
MD5 (onioncat-0.2.1.tar.gz) = 139c9d1f54feab68a3df76975f993b57
|
||||
SHA256 (onioncat-0.2.1.tar.gz) = 1a07b62b72ee65d10e70b972e2ade1387e2232bc0652747e03bebe7235c84a8e
|
||||
SIZE (onioncat-0.2.1.tar.gz) = 179988
|
25
net/onioncat/files/onioncat.in
Normal file
25
net/onioncat/files/onioncat.in
Normal file
|
@ -0,0 +1,25 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# PROVIDE: onioncat
|
||||
# REQUIRE: NETWORKING SERVERS USR tor
|
||||
# BEFORE: LOGIN
|
||||
#
|
||||
# Add the following lines to /etc/rc.conf to enable tor.
|
||||
# All these options will overide any settings in your local torrc as
|
||||
# they are command line options.
|
||||
|
||||
. /etc/rc.subr
|
||||
|
||||
name="onioncat"
|
||||
rcvar=${name}_enable
|
||||
|
||||
load_rc_config ${name}
|
||||
|
||||
: ${onioncat_enable="NO"}
|
||||
: ${onioncat_options="-C"}
|
||||
: ${onioncat_hostname="-R"}
|
||||
|
||||
command="%%PREFIX%%/bin/ocat"
|
||||
command_args="${onioncat_options} ${onioncat_hostname}"
|
||||
|
||||
run_rc_command "$1"
|
9
net/onioncat/pkg-descr
Normal file
9
net/onioncat/pkg-descr
Normal file
|
@ -0,0 +1,9 @@
|
|||
OnionCat creates a transparent IP layer on top of Tor's hidden services.
|
||||
It transmits any kind of IP-based data transparently through the Tor
|
||||
network on a location hidden basis.
|
||||
|
||||
You can think of it as a point-to-multipoint VPN between hidden services.
|
||||
|
||||
OnionCat is based on anonymizing transport layers like Tor.
|
||||
|
||||
WWW: http://www.cypherpunk.at/onioncat/
|
8
net/onioncat/pkg-message
Normal file
8
net/onioncat/pkg-message
Normal file
|
@ -0,0 +1,8 @@
|
|||
If you plan to also receive connections (e.g. because you provide a service or
|
||||
you use software which opens sockets for incomming connections like Bitorrent)
|
||||
you MUST the onioncat_hostname in rc.conf and configure the following hidden
|
||||
service in torrc:
|
||||
|
||||
HiddenServicePort 8060 127.0.0.1:8060
|
||||
|
||||
Finally, please consider setting up an IPv6 firewall.
|
Loading…
Reference in a new issue