SpiReCZ / netlayer

Tor Bindings for Kotlin/Java

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

NetLayer

Come for the Proxy, stay for the Tor Bindings

This repository currently contains a Kotlin/Java8 Tor Library supporting

  • Tunnelling traffic through Tor using a custom Socket implementation
  • Stream isolation
  • Bridges and pluggable transports
  • Connecting to hidden services
  • Hosting of hidden services

This project was originally based on a previous fork of thaliproject/Tor_Onion_Proxy_Library, but deviated significatnly since.

Usage

This is essentially a Wrapper around the official Tor releases, pre-packaged for easiy use and convenient integration into Kotlin/Java Projects. As of you, simply add tor.native as dependency to your project (using JitPack):

    <repositories>
    <repository>
        <id>jitpack.io</id>
        <url>https://jitpack.io</url>
    </repository>
    </repositories>
<dependency>
    <groupId>com.github.bisq-network.netlayer</groupId>
    <artifactId>tor.native</artifactId>
          <version>${netlayer.version}</version>
      </dependency>

Tunneling Traffic through Tor

This library provides a plain TCP socket which can be used like any other:

Kotlin

    //set default instance, so it can be omitted whenever creating Tor (Server)Sockets
    //This will take some time
    Tor.default = NativeTor(/*Tor installation destination*/ File("tor-demo"))
    TorSocket("www.google.com", 80, streamId = "FOO" /*this one is optional*/) //clear web
    TorSocket("facebookcorewwwi.onion", 443, streamId = "BAR") //hidden service

Java

    //set default instance, so it can be omitted whenever creating Tor (Server)Sockets
    //This will take some time
    Tor.setDefault(new NativeTor(/*Tor installation destination*/ new File("tor-demo")));
    new TorSocket("www.google.com", 80, "FOO");
    new TorSocket("facebookcorewwwi.onion", 443, "BAR");

Using Bridges and Pluggable Transports

To use bridges, simply pass the contents of a bridge configuration obtained from https://bridges.torproject.org/ (line-by-line wrapped in a Collection) as second parameter to the constructor of the NativeTor class.

Hosting Hidden Services

Hidden services can be hosted by creating a torified ServerSocket.

Kotlin

    //create a hidden service in directory 'test' inside the tor installation directory
    HiddenServiceSocket(8080, "test")
    //optionally attack a ready listener to be notified as soon as the service becomes reachable
    hiddenServiceSocket.addReadyListener { socket -> /*your code here*/}

Java

    //create a hidden service in directory 'test' inside the tor installation directory
    HiddenServiceSocket hiddenServiceSocket = new HiddenServiceSocket(8080, "test");
    //it takes some time for a hidden service to be ready, so adding a listener only after creating the HS is not an issue
    hiddenServiceSocket.addReadyListener(socket -> { /*your code here*/ return null});

Verifying the Authenticity/Integrity of the Tor Distribution

This library ships the official Tor binaries. To verify their authenticity, simply rebuild the prepackaged Tor binaries (courtesy of cedric walter) and rebuild the tor.native

About

Tor Bindings for Kotlin/Java

License:European Union Public License 1.1


Languages

Language:Kotlin 93.5%Language:Java 6.5%