[tor-bugs] #7167 [Pluggable transport]: Combine traffic obfuscation with address diversity of flash proxy

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Aug 7 21:48:20 UTC 2013


#7167: Combine traffic obfuscation with address diversity of flash proxy
-----------------------------------------+----------------------------------
 Reporter:  karsten                      |          Owner:  asn         
     Type:  project                      |         Status:  needs_review
 Priority:  normal                       |      Milestone:              
Component:  Pluggable transport          |        Version:              
 Keywords:  SponsorF20131101 flashproxy  |         Parent:              
   Points:                               |   Actualpoints:              
-----------------------------------------+----------------------------------

Comment(by dcf):

 I made a Python version of the server at https://www.bamsoftware.com/git
 /obfs-flash.git, directory `mki.v`. This is now what's running at
 tor1.bamsoftware.com:9500 (173.255.221.44:9500). The instructions from
 comment:17 will still work.

 This isn't quite Mk. II because it's not handling ExtORPort yet. But it is
 a bit nicer than the shell script proof of concept.

 Could we have a Python implementation of the client? The nice thing is
 that the client won't need any further iterations: A Mk. I.V client will
 also work for Mk. II and Mk. III in the plan we have developed. The server
 and ExtORPort is the only tricky part.

 I will do the Python client when I have time if nobody beats me to it.

 I like what's happening in #9376, but let's not let completely correct
 subprocess handling hold us back from having running code. Better to have
 a version with dirty SIGINT handling running now, and improve it in a
 later iteration.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7167#comment:21>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list