Zero infrastructure
No coordination server, no relay nodes. Trantor reuses the DNS infrastructure you already pay for.
Zero-infrastructure private networking over DNS
Trantor uses DNS as an encrypted control plane to connect clients to servers invisibly. No coordination server, no open ports, no identifiable traffic.
Most private networking solutions rely on dedicated infrastructure: a central coordinator (Tailscale, ZeroTier), public relay nodes (Tor), or static endpoints (WireGuard). Trantor takes a different route: it stores encrypted connection metadata in the global DNS, so a client with the right passphrase can discover and reach a server with no third-party broker in between.
The result: a server that publishes nothing observable. No open ports to scan, no identifiable traffic to fingerprint, no central infrastructure to compromise. Connections look like ordinary HTTPS, and the DNS lookups that find them look like ordinary TXT queries.
No coordination server, no relay nodes. Trantor reuses the DNS infrastructure you already pay for.
Encrypted TXT records carry IP, certificate, and ECH configuration. Indistinguishable from SPF, DKIM, or DMARC traffic.
Server IPs never appear in cleartext. Blocking Trantor would require breaking DNS for everyone.
Passphrases are stretched with 64 MB of memory-hard hashing before they ever touch the network.
The master passphrase rotates every 90 days. Revoking a user passphrase regenerates it on the spot.
Daemon for Linux, Windows and macOS, with tray GUI. Mobile apps on iOS and Android.
Optional ECH integration hides the SNI field. The TLS handshake leaks no domain name to observers.
Server, client, GUI, mobile apps — all open. No commercial entity, no telemetry, no lock-in.
Trantor secures up to three aspects of a connection, depending on the server configuration.
Always encrypted in DNS. Only passphrase holders can resolve a server's address — even for plain HTTP services. The IP never appears in cleartext on any public record.
Forged deterministically by client and server from shared parameters. No certificate authority, no trust anchor outside the passphrase. The certificate exists nowhere on disk until both sides derive it.
Hidden via Encrypted Client Hello (RFC 9849). The client daemon serves the ECH config locally, so the browser encrypts the SNI without querying any external server.
trantor encrypts the IP, certificate, and ECH config under a master passphrase, and writes them as TXT records to the chosen domain.
terminus hashes the user passphrase, queries DNS, decrypts the records, and forges the same certificate locally.
Your browser connects to the server over standard HTTPS. SNI is encrypted via ECH. The traffic looks like any other HTTPS request.
Application servers reachable only by team members holding the right passphrase. No VPN client mismatch, no exposed admin endpoints, no public ingress.
Blocking Trantor would mean blocking DNS TXT queries — which would also break email validation, domain ownership proofs, and MTA-STS.
Connect to a source's server without leaking metadata to ISPs or middleboxes. The TLS handshake itself reveals nothing about the destination.
Same network model as Tailscale or ZeroTier, but without a central coordinator that would become a single point of compromise.
# Server side
sudo trantor init --domain foo.bar.com --provider cloudflare
sudo trantor passphrase add --domain foo.bar.com --name "team-alpha"
sudo trantor publish --domain foo.bar.com
# Client side
sudo terminus start
# Add the domain via the tray GUI or config file, then:
# Open https://foo.bar.com in your browser — you're connected.
Trantor stands on its own — but it shares its tooling with three other open-source projects.