Subj : transparent proxy for .onion connections To : Oli From : Alterego Date : Fri Nov 22 2019 10:13 pm Re: transparent proxy for .onion connections By: Oli to Alterego on Fri Nov 22 2019 11:02 am Ol> I agree, but I'm more interested in solutions that enables all nodes and Ol> points Ol> to use encryption. With you zerotier you would have to setup many small Ol> VPNs or create a global VPN for the FTN which would be another centralized Ol> administrative structure. Actually it wouldnt - but yes, the implmentation I have setup does. The reason I did it this way, is it enables each "FTN network" to admininister who can join and exchange mail on the network. Just like you need to apply for a node number, as part of that application, you setup and join the respective FTN ZT network and provide your ZT id. The ZC can then accept or reject your application and in doing so either authorises you on the network and provides a node number, or advises you of your rejection. In the same topic, if you are ejected from the network, then the ZC can turn you off, which I imagine a few wont like, but I think it could be a useful control point. In this sense it probably doesnt scale well - if your intention is to join multiple FTN networks. (But in the same context, I'd like to see the day that you can interact with any FTN zone from any FTN zone - then it wouldnt be an issue.) But it doesnt need to be that way - ZT supports "public networks", which you can join and automatically be assigned an address and connect with something on the network. As an example, if you join ff5fea5fea000000 that will enable two systems to communicate over TCP port 24554 (and only that port). ....лоег .... Scratch a lover and find a foe. --- SBBSecho 3.10-Linux * Origin: I'm playing with ANSI+videotex - wanna play too? (21:2/116) .