[tor-bugs] #9164 [Flashproxy]: Is Flashproxy pluggable transport really working? Tests, comments and questions

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Jun 28 19:08:36 UTC 2013


#9164: Is Flashproxy pluggable transport really working? Tests, comments and
questions
---------------------------+------------------------------------------------
    Reporter:  Aymeric     |       Owner:  dcf   
        Type:  defect      |      Status:  closed
    Priority:  normal      |   Milestone:        
   Component:  Flashproxy  |     Version:        
  Resolution:  duplicate   |    Keywords:        
      Parent:              |      Points:        
Actualpoints:              |  
---------------------------+------------------------------------------------

Comment(by arlolra):

 Replying to [comment:7 Aymeric]:

 > What are the criteria to know if a node is supporting the websocket PT
 (>= v0.2.4.12 ?)?

 I'm not sure if you can query a node to see what pluggable transports it
 supports. In any case, there may only be as little as one. For testing
 purposes, I suggest you setup your own. See "How to run a relay",
 https://gitweb.torproject.org/flashproxy.git/blob/HEAD:/README#l100

 > Even when the facilitator will be protected, is this not an issue to get
 so easily users' IP addresses?

 Hiding the fact that a client wishes to use Tor is not part of the flash
 proxy threat model.  Also, as suggested above, the facilitator should be
 rate-limited to control how many client IPs are handed out to each
 requesting flash proxy. Please see the research paper,
 https://crypto.stanford.edu/flashproxy/flashproxy.pdf

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9164#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list