
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 GDR!:
Hello,
I'm new here, running a relay for the past year. I'm looking to implement obfsproxy running on port 80 and emulating HTTP traffic.
The official manual says I should add this line to torrc: ServerTransportPlugin obfs2,obfs3 exec /usr/bin/obfsproxy managed
However, it runs on a random port (30000+) which kind of defeats the whole purpose of running an obfuscated bridge. I also haven't seen a way to force faking HTTP traffic. The manual page is very terse and doesn't explain how to do any of this.
How do I configure obfsproxy to look like a HTTP server?
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I guess that you misunderstood the concept of obfsproxy. It is useful to obfuscate the communication between a client within a censorship zone and a tor bridge. The obfsproxy doesn't emulate a HTTP protocol communication, instead it is designed to look random (and the packets are encypted). So if you try to run this service over the HTTP port 80 and the packets are random and not looking like a HTTP communication, it will be more suspicious than running this service over any other port. I recomend you to read these pages: - - https://www.torproject.org/docs/bridges - - https://www.torproject.org/docs/faq.html.en#RelayOrBridge - - https://www.torproject.org/projects/obfsproxy.html.en -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJSUwdFAAoJEFz9RJtDk2+Mfh8IAORW8EYn4+j0EUfGeDRyqlrY 3xgI9zesNqTcO4w9COhS9g94F5BWiOxTdrMXGTb9szQG6hqM/lvwVlWFAsi4GYF7 Cb6TnWSr2+YF3NX9Fv0LDZNTbI3JAwYtX483E1HkyhZrccuz8cDR0iON5tCVq+Fc D/0Taj0nx4QnypxyEUZZV/MxjrhoS9dmxlDpE0oRZJgd+y2hv+5aJy4cpN8Fsuba 8GdxJRfQpiO9L/qal7KHECIuRmH88kXz79QVal0YvFb1KUv0N9BElBGk6QkXj2Kh AO1OHE7SuDbN7j6GZk0vLRZ8UBmvGTYjbwwswXspfv60s9fPaNSlTkM4h26gKtI= =ah6s -----END PGP SIGNATURE-----