[tor-bugs] #7167 [Pluggable transport]: Combine traffic obfuscation with address diversity of flash proxy

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Sep 4 00:19:58 UTC 2013


#7167: Combine traffic obfuscation with address diversity of flash proxy
---------------------------------+-----------------------------------------
     Reporter:  karsten          |      Owner:  asn
         Type:  project          |     Status:  needs_revision
     Priority:  normal           |  Milestone:
    Component:  Pluggable        |    Version:
  transport                      |   Keywords:  SponsorF20131101 flashproxy
   Resolution:                   |  Parent ID:
Actual Points:                   |
       Points:                   |
---------------------------------+-----------------------------------------

Comment (by dcf):

 Replying to [comment:32 dcf]:
 > Replying to [comment:26 dcf]:
 > > I started Mk. II of the server transport in my repo at
 https://www.bamsoftware.com/git/obfs-flash.git. To build it, do
 > > {{{
 > > export GOPATH=$(pwd)
 > > go get # fetches the pt library
 > > make
 > > }}}
 > > This version is pretty much a port of the Python Mk. I.V. The next
 step is to have it open its own listener and connect to Tor using the
 ExtORPort.
 > >
 > > This is now what's running at tor1.bamsoftware.com:9500
 (173.255.221.44:9500).
 >
 > I pushed a rough draft of Mk. II that does extended ORPort.

 Cool, the nested transports appear in `bridge-stats`:
 {{{
 bridge-ip-transports <OR>=8,obfs3_flash=8,websocket=168
 }}}

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7167#comment:33>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list