[tor-bugs] #7167 [Pluggable transport]: Combine traffic obfuscation with address diversity of flash proxy

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Sep 14 19:12:29 UTC 2013


#7167: Combine traffic obfuscation with address diversity of flash proxy
---------------------------------+-----------------------------------------
     Reporter:  karsten          |      Owner:  asn
         Type:  project          |     Status:  needs_revision
     Priority:  normal           |  Milestone:
    Component:  Pluggable        |    Version:
  transport                      |   Keywords:  SponsorF20131101 flashproxy
   Resolution:                   |  Parent ID:
Actual Points:                   |
       Points:                   |
---------------------------------+-----------------------------------------

Comment (by dcf):

 Replying to [comment:38 dcf]:
 > What I propose to do about this: Let's push conns on a stack, rather
 than a queue. When a new external connection comes in, it is put on top of
 the stack. When a new internal connection comes in, it is assigned the
 most recently seen address, the one at the top of the stack. Zombie
 connections that somehow didn't survive the proxy chain to make an
 internal connection will remain at the bottom of the stack, and never
 assigned to any ExtORPort connection (and we can just prune them if they
 get too old).

 I implemented the stack idea and am now running it on the relay. See
 comment:17 for how to see the code and run a client against it.

 I did some review and polishing of the server code and I think it's ready
 for beta-level testing now.

 I think we should move the bamsoftware.com repository to
 git.torproject.org and call it something other than obfs-flash. I created
 #9743 for that.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7167#comment:39>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list