[tor-bugs] #7167 [Pluggable transport]: Combine traffic obfuscation with address diversity of flash proxy

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Jul 29 10:07:57 UTC 2013


#7167: Combine traffic obfuscation with address diversity of flash proxy
-----------------------------------------+----------------------------------
 Reporter:  karsten                      |          Owner:  asn         
     Type:  project                      |         Status:  needs_review
 Priority:  normal                       |      Milestone:              
Component:  Pluggable transport          |        Version:              
 Keywords:  SponsorF20131101 flashproxy  |         Parent:              
   Points:                               |   Actualpoints:              
-----------------------------------------+----------------------------------

Comment(by asn):

 Replying to [comment:17 dcf]:
 > One thing we didn't think about was the flash proxy facilitator. The
 reason you have to run your own flash proxy in the instructions above is
 that the facilitator doesn't know that it needs to give a obfs3-in-
 websocket relay to proxies that are serving certain clients. Obviously
 connecting to the plain websocket relay that the facilitator uses now,
 won't work. We need to think of a way to allow a client to say that it
 wants to connect to a different kind of relay. Like client registration
 messages, which currently only contain the client IP and port, could also
 contain the nested protocols the client wants to use. The facilitator
 would check to see if it knows of any relays having that nesting, and
 reply to proxies with an appropriate relay. I have some previous thinking
 along these lines in comment:2:ticket:5578, comment:5:ticket:7944.
 >

 Opened #9349 for this task.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7167#comment:19>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list