I did “sudo apt-get install openjdk-7-jre” and ran Freenet installer without issues.
I then added TOR_TRANSPROXY=1 to /etc/environment and rebooted. Then I did “sudo ocat myaddress.onion -l 10.152.152.11:8060” again followed by “./Freenet/run.sh start” and Freenet started.
The thing is, nothing happens when I go to 127.0.0.1:8888. Says “Firefox can’t establish a connection to the server at 127.0.0.1:8888.”
For simplicity, debugging, could you iron out that the web interface is reachable using iceweasel? It’s ineffective to look for the issue in Tor Browser before ironing that out. Once you’re sure the webinterface works, you can look more into Tor Browser local connections.
For debugging/simplicity again, I advice to get the webinterface working at least once before involving OnionCat. Step by step. Once that works, add OnionCat to the mix.
1. Freenet signing keys have expired!? Dangerous or not? 2. We say you can’t use User → Tor → Freenet → Destination connection without a VPN in the connection schema due to Freenet being a UDP-only network. Are we sure - will this onioncat config and other steps below work somehow in Whonix?
Should work as described in theory. But probably require a Whonix specific modifications. Namely, the listening IP. We had onioncat previously working.
Tor modifications → on gateway.
onioncat, freenet installation → inside workstation.
The issue I see… Currently Freenet - Whonix supports connecting to opennet. No prior knowledge / social connection to any network participants required. However, quote Using Freenet over Tor
Add a friend
Now is the time to add a Darknet friend who is also using Tor/Onioncat. Go to “Friends/Add a friend”. Choose your trust and ability to see other friends settings and enter a description of the friend. Paste their noderef in the “Enter node reference directly” box.
Give your noderef to your friend and have them add it. Once both connections have been added you should see “Connected” in the Friends list for that connection. The IP address should show the onioncat IPv6 address, beginning with “fd”.
Therefore this is different. Not using opennet but friend to friend. I wouldn’t know whom to add. Maybe there is a public instance aka “Tor freenet bridge” or something. I.e. someone who hosts such a node for the benefit of others. Security/anonymity consequences of that would have to be researched too (or left as open question).
Anyone welcome to research and document that.
Not necessarily. Could be. Signatures are still valid. Depends on upstream’s key policy. Upstream might explain when/if they issue a new key or extend the existing one.