[tor-bugs] #7167 [Pluggable transport]: Combine traffic obfuscation with address diversity of flash proxy

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Aug 8 00:40:37 UTC 2013


#7167: Combine traffic obfuscation with address diversity of flash proxy
-----------------------------------------+----------------------------------
 Reporter:  karsten                      |          Owner:  asn           
     Type:  project                      |         Status:  needs_revision
 Priority:  normal                       |      Milestone:                
Component:  Pluggable transport          |        Version:                
 Keywords:  SponsorF20131101 flashproxy  |         Parent:                
   Points:                               |   Actualpoints:                
-----------------------------------------+----------------------------------
Changes (by dcf):

  * status:  needs_review => needs_revision


Comment:

 Replying to [comment:22 infinity0]:
 > dcf don't repeat code! I already did a python client a week ago:
 >
 > https://github.com/infinity0/obfs-flash/commit/41b760

 Very good, thanks. I merged your changes into my repo.

 These are my recommendations as to the next development steps for the
 client:
  1. Make it use pyptlib. This will replace all the
 `TOR_PT_MANAGED_TRANSPORT_VER` and `TOR_PT_CLIENT_TRANSPORTS` stuff.
 Unfortunately it won't replace the `CMETHOD` read loop; you still have to
 do that by hand.
  2. Implement the socat SOCKS part in Python. The program needs to
 implement a TCP listener and a SOCKS4 (don't do SOCKS5) client. This might
 be implemented as a Python thread running an accept loop, with new TCP
 connections being split off as Python threads.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7167#comment:23>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list