[tor-dev] Status report - HTTP pluggable transport

Steven Murdoch Steven.Murdoch at cl.cam.ac.uk
Sun Jun 30 22:25:06 UTC 2013


Hi Chang,

Thanks for the update. BOSH certainly looks like a promising basis, though of course it makes no attempt at obfuscation or scanning resistance.

I've added this to the design document: https://github.com/sjmurdoch/http-transport/blob/master/design.md

I was thinking about this being a useful basis for you to have for refining your design, so do feel free to fork and change it.

Best wishes,
Steven
 
On 28 Jun 2013, at 16:07, Chang Lan <changlan9 at gmail.com> wrote:

> Hi there, 
> 
> During the first two weeks of my GSoC project, I have implemented a HTTP CONNECT-based pluggable transport. In short, I use HTTP CONNECT semantics to establish a secure channel between the client and the bridge. Specifically, this is the scenario:
> 
> 1. Connection establishment:
> 
>      +------------------------------+
>      |CONNECT bridge_ip:443 HTTP/1.0|
>      |User-agent: blablabla         |
>      +------------------------------+
>               |
>               |
> +----------+  |   +----------+      +----------+
> |  client  |----->|  proxy   |----->|  bridge  |
> +----------+      +----------+   |  +----------+
>                                  |
>                                  |
>                  +------------------------------+
>                  |   (Establish a connection)   |                   
>                  +------------------------------+
> 
> 2. Data relay
> 
>      +------------------------------+
>      |    (Encrypted Payload)       |
>      +------------------------------+
>               |
>               |
> +----------+  |    +----------+       +----------+
> |  client  |<----->|  proxy   |<----->|  bridge  |
> +----------+       +----------+   |   +----------+
>                                   |
>                                   |
>                  +------------------------------+
>                  |   (Encrypted Payload)        |                   
>                  +------------------------------+
> 
> 
> I hope the diagrams above are self-explanatory. It is only my initial attempt to get familiar with HTTP protocol. Once I make sure it is working correctly under squid proxy I will upload it to the repository.
> 
> The use of CONNECT method is restricted in many networks, so it is better to implement the HTTP transport using the usual HTTP methods as POST, GET, etc. In the next stage, I plan to implement a new HTTP transport based on BOSH[1]. There are many issues to care about (in order of priority):
> 
> * bi-directional data transfer over HTTP
> * proxy cache
> * HTTP request/response encoding
> * encryption
> * scanning resistance
> 
> Have a nice weekend!
> 
> [1]: http://xmpp.org/extensions/xep-0124.html
> 
> Best, 
> Chang
> 
> Sent from my mobile device. Sorry for the brevity.
> _______________________________________________
> tor-dev mailing list
> tor-dev at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20130630/62492563/attachment.html>


More information about the tor-dev mailing list