Subj : transparent proxy for .onion connections
To : Oli
From : Alterego
Date : Fri Nov 22 2019 10:13 pm
Re: transparent proxy for .onion connections
By: Oli to Alterego on Fri Nov 22 2019 11:02 am
Ol> I agree, but I'm more interested in solutions that enables all nodes and
Ol> points
Ol> to use encryption. With you zerotier you would have to setup many small
Ol> VPNs or create a global VPN for the FTN which would be another centralized
Ol> administrative structure.
Actually it wouldnt - but yes, the implmentation I have setup does.
The reason I did it this way, is it enables each "FTN network" to admininister
who can join and exchange mail on the network. Just like you need to apply for
a node number, as part of that application, you setup and join the respective
FTN ZT network and provide your ZT id. The ZC can then accept or reject your
application and in doing so either authorises you on the network and provides a
node number, or advises you of your rejection.
In the same topic, if you are ejected from the network, then the ZC can turn
you off, which I imagine a few wont like, but I think it could be a useful
control point.
In this sense it probably doesnt scale well - if your intention is to join
multiple FTN networks. (But in the same context, I'd like to see the day that
you can interact with any FTN zone from any FTN zone - then it wouldnt be an
issue.)
But it doesnt need to be that way - ZT supports "public networks", which you
can join and automatically be assigned an address and connect with something on
the network.
As an example, if you join ff5fea5fea000000 that will enable two systems to
communicate over TCP port 24554 (and only that port).
...����
... Scratch a lover and find a foe.
--- SBBSecho 3.10-Linux
* Origin: I'm playing with ANSI+videotex - wanna play too? (21:2/116)