-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SOCKS5 support #23
Comments
This would be really nice to have. But you might need to use OnionV3 addresses? |
This is not tor, there are no onion addresses. It's doable but a lot of work, I have half-written code for this that doesn't even compile yet, don't get too excited for this feature to be released soon. |
There may be onion addresses in Tox soon to help deal with the vulnerability of so few BS nodes - it makes it really easy to take down. Do you know about onioncat:
It may help if you ran Tox over it. It's been used for years, originally to run IPV6 circuits over TorV4. As it runs over Tor it would solve the SOCKS issue! |
Oh, you're talking about acting as a SOCKS5 client, so tuntox can connect over tor. That's much easier to add, please open a new issue if you're interested about this. There's existing support in toxcore and I'd just have to expose it using a command line switch, or read the standard This ticket is about tuntox acting as a proxy server - similar to tor - and forwarding arbitrary traffic. |
similar to -D in SSH
The text was updated successfully, but these errors were encountered: