[tor-relays] Port for obfsproxy

GDR! gdr at gdr.name
Mon Oct 7 20:13:20 UTC 2013


On 07.10.2013 21:11, dardok wrote:
> I guess that you misunderstood the concept of obfsproxy. It is useful
> to obfuscate the communication between a client  within a censorship
> zone and a tor bridge. The obfsproxy doesn't emulate a HTTP protocol
> communication, instead it is designed to look random (and the packets
> are encypted). So if you try to run this service over the HTTP port 80
> and the packets are random and not looking like a HTTP communication,
> it will be more suspicious than running this service over any other port.

Thank you. I understood the concept but not the implementation.

"For example, there MIGHT be a HTTP transport which transforms Tor
traffic to look like regular HTTP traffic."

I missed the "MIGHT" part. Too bad this doesn't exist.

-- 
Zapisz moj nowy prywatny adres email: gdr at gdr.name
Teraz na wlasnym serwerze. Zawsze czysto - zawsze sucho - zawsze pewnie.
Klucz PGP to nadal 4ED3D2B7
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0x4ED3D2B7.asc
Type: application/pgp-keys
Size: 5493 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20131007/898a6754/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 901 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20131007/898a6754/attachment-0001.sig>


More information about the tor-relays mailing list