| Title: Tor part 5: onioncat for IPv6 VPN over tor | |
| Author: Solène | |
| Date: 13 November 2018 | |
| Tags: tor unix networking openbsd | |
| Description: | |
| This article is about a software named **onioncat**, it is available as | |
| a | |
| package on most Unix and Linux systems. This software allows to create | |
| an IPv6 | |
| VPN over Tor, with no restrictions on network usage. | |
| First, we need to install onioncat, on OpenBSD: | |
| $ doas pkg_add onioncat | |
| Run a tor hidden service, as explained in one of my previous article, | |
| and get | |
| the hostname value. If you run multiples hidden services, pick one | |
| hostname. | |
| # cat /var/tor/ssh_hidden_service/hostname | |
| g6adq2w15j1eakzr.onion | |
| Now that we have the hostname, we just need to run `ocat`. | |
| # ocat g6adq2w15j1eakzr.onion | |
| If everything works as expected, a [tun](https://man.openbsd.org/tun) | |
| interface | |
| will be created. With a fe80:: IPv6 address assigned to it, and a | |
| fd87:: | |
| address. | |
| Your system is now reachable, via Tor, through its IPv6 address | |
| starting with | |
| fd87:: . It supports _every_ IP protocol. Instead of using **torsocks** | |
| wrapper | |
| and .onion hostname, you can use the IPv6 address with any software. |