Oniux: Tor Project Groundbreaking Tool for Secure Linux Application Communication
The Tor Project has unveiled a new security tool called Oniux designed to force all Linux application traffic through the Tor network. Released on May 14, 2025, this cutting-edge utility effectively prevents unintended data leaks and Tor bypasses through sophisticated kernel-level isolation techniques.
Unlike previous solutions, Oniux leverages Linux namespace functionality to create truly isolated network environments for applications, delivering unprecedented privacy protection for users with sensitive security requirements.
Oniux represents a significant advancement over traditional methods like Torsocks or VPN solutions. By utilizing Linux namespace technology, Oniux creates a genuinely isolated environment where applications operate with:
This comprehensive approach blocks leaks that might occur through direct system calls or improperly configured proxy settings – vulnerabilities that plagued previous solutions.
One of Oniux’s most significant innovations is its foundation on Arti, the Rust implementation of the Tor network. This design choice offers several advantages:
Oniux stands out for its ability to handle virtually any Linux application type:
| Feature | Oniux | Torsocks |
| Implementation | Linux namespaces | ld.so preload hack |
| Engine | Arti (Rust-based) | CTor (C-based) |
| Dependencies | Standalone application | Requires running Tor daemon |
| Application support | Works with all applications | Limited to applications using libc |
| Leak prevention | Kernel-level isolation | Can be bypassed with raw assembly |
| Maturity | New and experimental | Battle-tested for 15+ years |
| Language | Written in Rust | Written in C |
| Platform | Linux only | Cross-platform |
The fundamental advantage of Oniux is its reliance on kernel security primitives rather than library interception. This approach means:
Getting started with Oniux requires a Linux system with the Rust toolchain installed. The installation process is straightforward:
$ cargo install --git https://gitlab.torproject.org/tpo/core/oniux oniux@0.4.0
Oniux’s command syntax is intuitive and flexible:
# Basic HTTPS query through Tor
$ oniux curl https://icanhazip.com
# IPv6 support
$ oniux curl -6 https://ipv6.icanhazip.com
# Accessing onion services
$ oniux curl http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/index.html
# Enable detailed logging
$ RUST_LOG=debug oniux curl https://icanhazip.com
# "Torify" an entire shell session
$ oniux bash
# Isolate graphical applications
$ oniux hexchat
Oniux employs a sophisticated multi-step process to achieve its security guarantees:
clone(2) system call with isolation flags/proc and configures UID/GID mappingsonion0 interface using onionmasqThis meticulous approach ensures comprehensive isolation while maintaining usability for everyday applications.
While Oniux delivers groundbreaking security capabilities, users should be aware of its experimental status. The Tor Project emphasizes that:
Nevertheless, developer and security researcher feedback is actively encouraged to mature this promising technology. The source code is available on GitLab and can be easily built using standard Rust tools.