[tor-relays] Port for obfsproxy

Jeroen Massar jeroen at massar.ch
Mon Oct 7 20:36:45 UTC 2013


On 2013-10-07 16:13, GDR! wrote:
> On 07.10.2013 21:11, dardok wrote:
>> I guess that you misunderstood the concept of obfsproxy. It is useful
>> to obfuscate the communication between a client  within a censorship
>> zone and a tor bridge. The obfsproxy doesn't emulate a HTTP protocol
>> communication, instead it is designed to look random (and the packets
>> are encypted). So if you try to run this service over the HTTP port 80
>> and the packets are random and not looking like a HTTP communication,
>> it will be more suspicious than running this service over any other port.
> 
> Thank you. I understood the concept but not the implementation.
> 
> "For example, there MIGHT be a HTTP transport which transforms Tor
> traffic to look like regular HTTP traffic."
> 
> I missed the "MIGHT" part. Too bad this doesn't exist.

It does: StegoTorus.

Greets,
 Jeroen



More information about the tor-relays mailing list