On 02/10/2012 08:11 AM, Roger Dingledine wrote:
On Fri, Feb 10, 2012 at 07:56:04AM -0500, Nathan Freitas wrote:
Thoughts on attempting to port and ship Obfsproxy client functionality to Android? Where should we begin? Any details on exactly what was done for the new TBB?
Step one, build obfsproxy for Android. I expect your biggest problem will be libevent2 since you won't have any packages for it. See
Happy to say that libevent2 and obfsproxy have been successfully cross-compiled for Android w/o major patching, and all seems to be working well with a manually hacked version of Orbot. I have to get some sleep now, but should have a new Orbot proper build in 24 hours (with the help of Gsathya and Kensen from GP).
I've posted some test binaries with an Android shell-based how to here: https://github.com/downloads/guardianproject/Orbot/obfsproxy-20120212a.tar.g... (.asc)
*** This currently requires root, and Orbot should be deactivated.
1) adb push the files about to /data/local
2) adb shell; su
3) mv the files above from /data/local to /data/data/org.torproject.android/app_bin
4) chown the new files to the uid of the orbot app (e.g. "chmod app_2.app_2 tor"). find the uid by 'ls'-ing in the /data/data/org.torproject.android/app_bin folder
5) chmod 700 obfsproxy; chmod 700 tor;
6) export HOME=/data/data/org.torproject.android/app_bin
7) /data/data/org.torproject.android/app_bin/tor DataDirectory /data/data/org.torproject.android/cache -f /data/data/org.torproject.android/app_bin/torrc
8) Open Firefox Mobile with ProxyMob add-on, and you should be ready to roll.
***
Feb 11 03:29:23.275 [notice] Tor v0.2.3.11-alpha (git-9ce9836f853d8a31) running on Linux armv7l. Feb 11 03:29:23.276 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning ... Feb 11 03:29:31.000 [notice] Bootstrapped 80%: Connecting to the Tor network. Feb 11 03:29:31.000 [notice] Bootstrapped 90%: Establishing a Tor circuit. Feb 11 03:29:32.000 [notice] new bridge descriptor 'maximatorbridge' (fresh): $55329E0FB775496D4479AC1E0D2CDE3B98D774C3~maximatorbridge at 212.112.242.160 Feb 11 03:29:32.000 [notice] new bridge descriptor 'ghobfsbridge1' (fresh): $10D5B1C21544B64EBC2A4275FE32A8D4A40405B5~ghobfsbridge1 at 213.108.105.129 Feb 11 03:29:32.000 [notice] new bridge descriptor 'torbridge42' (fresh): $9459581B2DA5458D19790C28918CB544B3854C8A~torbridge42 at 85.214.131.213 Feb 11 03:29:32.000 [notice] new bridge descriptor 'Unnamed' (fresh): $7C7DC083FFCFE383268B873D2CB046684B615648~Unnamed at 85.17.20.242 Feb 11 03:29:32.000 [notice] new bridge descriptor 'Unnamed' (fresh): $478208B87337CAC2E9391AD7B91D125193D5A641~Unnamed at 91.208.34.7 Feb 11 03:29:32.000 [notice] new bridge descriptor 'Unnamed' (fresh): $5F88FDA345422B32E1A20F2761182C23CD49EA79~Unnamed at 131.215.158.1 Feb 11 03:29:32.000 [notice] new bridge descriptor 'ndnop0' (fresh): $9D7259A696F7DAB073043B28114112A46D36CFFD~ndnop0 at 109.105.109.163 Feb 11 03:29:32.000 [notice] new bridge descriptor 'Unnamed' (fresh): $00BC5E7111BD00E9AF463BE9BFE6255FE51CFCD9~Unnamed at 109.163.233.195 Feb 11 03:29:33.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working. Feb 11 03:29:33.000 [notice] Bootstrapped 100%: Done.
***
+n8fr8