[tor-relays] A call to arms for obfuscated bridges

Lunar lunar at torproject.org
Fri Apr 19 11:50:48 UTC 2013


Drake Wilson:
>   - bypass declared installation requirements, use 2.6.6, and blindly
>     hope that it won't result in some awful subtle bug;

obfsproxy works on Debian Squeeze which bears 2.6.6. I had to patch the
test suites but that was all:
<http://anonscm.debian.org/gitweb/?p=collab-maint/pyptlib.git;a=blob;f=debian/patches/0001-Monkey-patch-unittest.TestCase-to-add-missing-assert.patch;h=ebba348;hb=refs/heads/tpo-squeeze-backport>
<http://anonscm.debian.org/gitweb/?p=collab-maint/obfsproxy.git;a=blob;f=debian/patches/0001-Monkey-patch-twisted.trial.unittest.TestCase-to-add-.patch;h=c7b78eda;hb=refs/heads/tpo-squeeze-backport>

>   - I'd like to examine the obfsproxy source code out of curiosity to
>     see how it's likely to interact with my other network services.

<https://gitweb.torproject.org/pluggable-transports/obfsproxy.git>
or `git clone https://git.torproject.org/pluggable-transports/obfsproxy.git`
or <https://pypi.python.org/pypi/obfsproxy> (tarball and gpg sig)

Hope that helps,
-- 
Lunar                                             <lunar at torproject.org>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20130419/e6f74e88/attachment.pgp>


More information about the tor-relays mailing list