[tor-relays] [tor-assistants] Running obfs4proxy on Debian Stable

Alexander Dietrich alexander at dietrich.cx
Tue Feb 3 17:33:10 UTC 2015


Is it possible to install the obfs4proxy package securely (with 
signature verification) on Ubuntu? I looked at this a while ago, but 
couldn't figure out how to make it work.

Thanks,
Alexander
---
PGP Key: https://dietrich.cx/pgp | 0x727A756DC55A356B

On 2015-02-03 01:14, Yawning Angel wrote:
> On Mon, 2 Feb 2015 22:41:40 +0000
> isis <isis at torproject.org> wrote:
>> I requested that the obfs4proxy package in Debian jessie be ported to
>> wheezy-backports, [0] however, it seems this is extremely unlikely to
>> happen because it would mean backporting pretty much every Golang
>> package in existence.
> 
> Last I heard, that was mostly unnecessary, though how exactly this apt
> pinning stuff works is a mystery to me[0].
> 
>> I would be super stoked if we could make it as easy and seamless as
>> possible for the Bridge operators who are still running obfs2 (!!) to
>> move to supporting better, newer Pluggable Transports.  Currently
>> recommended PTs to run are: obfs3, obfs4, scramblesuit, and
>> fteproxy.  When Tor Browser 4.5 becomes stable (probably in mid-April
>> 2015), we'll want lots more obfs4 Bridges!  For the super adventurous
>> sysadmins who'd like to try Yawning's experimental new post-quantum
>> PT, Basket [1] is one of the newest PTs.
> 
> More obfs4 bridges would be amazing.  It's worth noting that obfs4proxy
> can also handle obfs2 and 3 (and with a branch that I need to
> test/merge soon, a ScrambleSuit client), and it even is easy to run
> bridges on ports < 1024 without messing with port forwarding.
> 
> Basket is still a research project and non-researchers shouldn't deploy
> it because the wire format may change (and it consumes a hilarious
> amount of bandwidth).
> 
>> We should probably come up with some easy instructions for operators
>> of Tor Bridge relays who are running Debian stable, such as adding an
>> Apt pin to pull in only the obfs4proxy package and its dependencies
>> from Debian jessie and keep everything else pinned to stable.  If
>> someone has done this, or has another simple solution, would you mind
>> writing up some short how-to on the steps you took, please?
>> 
>> [0]:
>> http://lists.alioth.debian.org/pipermail/pkg-anonymity-tools/Week-of-Mon-20150202/001119.html
>> [1]: https://github.com/yawning/basket
> 
> All of obfs4proxy's dependencies are build time.  The binary is
> statically linked because that's what Go does.  David S.'s ansible-tor
> package does it like this:
> 
> https://github.com/david415/ansible-tor/commit/f897581daa79389ddcb28c7dae601473e85e8226
> 
> So the documentation should be a matter of "how to setup the apt pin
> for a single package".  I've heard someone complaining about the tor
> AppArmor profile but that also isn't something I've dealt with ever.
> 
> Regards,
> 
> --
> Yawning Angel
> 
> [0]: I just scp the binary to my bridge whenever I need to update it,
> and my idea of how to update all my linux systems starts with "pacman"
> and not "apt-get".
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


More information about the tor-relays mailing list