One goal we would like to work on for SponsorF year3 is the very hard topic of getting Tor to handle datagram end-to-end -- which may not even be on the roadmap depending on which of Steven's transport approaches we end up liking. An alternative approach would be to make/modify VoIP applications to work better on Tor (#5700 (moved)).
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
Trac: Description: One goal we would like to work on for SponsorF year3 is the very hard topic of getting Tor to handle datagram end-to-end -- which may not even be on the roadmap depending on which of Steven's transport approaches we end up liking. An alternative approach would be to make/modify VoIP applications to work better on Tor.
to
One goal we would like to work on for SponsorF year3 is the very hard topic of getting Tor to handle datagram end-to-end -- which may not even be on the roadmap depending on which of Steven's transport approaches we end up liking. An alternative approach would be to make/modify VoIP applications to work better on Tor (#5700 (moved)). Type: defect to project
Another VoIP client that might be worth investigating is Jitsi: https://jitsi.org. Jitsi supports XMPP and a number of other protocols. It also supports video chat.
Mumble can send voice and chat data over Tor via an AES-256 encrypted TCP stream. This works well when Mumble is used with Torsocks.
One issue we encountered was that when Mumble uses the native proxy settings to connect to Tor, the hostnames of the listed Mumble servers get resolved by the local DNS servers. Mumble uses a Bonjour-style multicast system to resolve the hostnames of possibly hundreds of Mumble servers around the world very quickly right when the program launches. When Torsocks is used, all of this traffic just gets dropped because it's UDP. If you were planning on browsing through a bunch of game servers and deciding if you want to join them, this might be a problem for you. If you already know of a mumble server you wanted to use (either an IP address or a hostname) then you don't lose anything by using Torsocks instead of the local proxy settings.
If you use Windows, torsocks is not available to you. Using the local proxy settings still might not be a problem if you know the IP address of the Mumble server you want to connect to because no DNS resolution is done for that IP. An observer could see you were using Mumble but not who you were talking to. If you use Windows and you have the hostname of the Mumble server you want to use, use tor-resolve to get an IP address before you give it to Mumble. If the hostname is an onion address, the onion address will get resolved by your local ISP, which is pretty bad for you.
I tested Mumble with Torcap and Tortilla on Windows. The Mumble DNS multicast bypassed Torcap's proxy settings, basically leaving the same problem as using the native proxy settings. Tortilla requires using a Virtual Machine. For me, using Tortilla introduced intolerable amounts of latency into the connection. Maybe someone with a whole lot of RAM can get better results using Mumble with Tortilla, I don't know. For me neither of these tools provided a solution.
Right now using Mumble safely with Tor requires torsocks.