[tor-relays] Port for obfsproxy

dardok dardok at riseup.net
Mon Oct 7 20:51:55 UTC 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

GDR!:
> On 07.10.2013 21:11, dardok wrote:
>> I guess that you misunderstood the concept of obfsproxy. It is
>> useful to obfuscate the communication between a client  within a
>> censorship zone and a tor bridge. The obfsproxy doesn't emulate a
>> HTTP protocol communication, instead it is designed to look
>> random (and the packets are encypted). So if you try to run this
>> service over the HTTP port 80 and the packets are random and not
>> looking like a HTTP communication, it will be more suspicious
>> than running this service over any other port.
> 
> Thank you. I understood the concept but not the implementation.
> 
> "For example, there MIGHT be a HTTP transport which transforms Tor 
> traffic to look like regular HTTP traffic."
> 
> I missed the "MIGHT" part. Too bad this doesn't exist.
> 
> 
> 
> _______________________________________________ tor-relays mailing
> list tor-relays at lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 

There is a pluggable transport protocol that aims to mimic a cover
protocol such HTTP. Its name is Stegotorus but I believe that still is
not full developed. If you want more info you can read this:

- - http://www.owlfolio.org/media/2010/05/stegotorus.pdf
- - https://gitweb.torproject.org/stegotorus.git
-----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJSUx7rAAoJEFz9RJtDk2+MW2cH/2OVQ9XtY02cZO+wZEtYF31k
0pGL2poRRfTjQGBbR3KxVIoJvffAx8sixMR6nZ/Zfqu0wr4OvhofIVfXQgVwqevS
XcI5aJEgQV13u8frdER3PG3/IrDtYcPpTR0irVoAZJKwKKp+7TTe7/kcU9WB+hGD
rH8bklY+pr0uWJjvymb7zG5iZ1fnutU7Da1Nc9679n4YA7Go/B5N3hdLCV6/WwQn
i3vQavXMOjdSwN+kWlwbPhb9EhXmxyQonIJBgsi3PjADfvV36h9MsxixDo5ZSq/f
Sz8TdaNfx5ye+4zwQQZR32W+W6HfNqN2/Fyiuqw+Ggw54OUMhbOfPDE8R4de9+E=
=1mgs
-----END PGP SIGNATURE-----


More information about the tor-relays mailing list