[tor-talk] Combined flash proxy + pyobfsproxy alpha browser bundles

David Fifield david at bamsoftware.com
Thu Jan 10 16:43:24 UTC 2013

Please help us test new bundles that have flash proxy and pyobfsproxy
enabled by default.

Flash proxy (https://crypto.stanford.edu/flashproxy/) is a transport
that uses proxies running in web browsers as access points into the Tor
network. pyobfsproxy is a Python implementation of the obfsproxy modular
transport (https://www.torproject.org/projects/obfsproxy,
https://gitweb.torproject.org/user/asn/pyobfsproxy.git) that makes
network traffic look unlike normal Tor traffic. Both of these
technologies make it harder to block access to Tor.

Flash proxy works differently than other pluggable transports, and you
need to take extra steps to make it work. In particular, *you will
probably need to configure port forwarding*, by default port 9000, in
order to receive connections from browser proxies. There are
instructions and hints on how to do that at this page:
pyobfsproxy doesn't require any special setup. These bundles contain
fresh obfs2 bridge addresses, which may work for you even if obfsproxy
was blocked for you previously. The bundle also includes an experimental
obfs3 bridge--obfs3 is a new protocol designed to be harder to identify
than the previous obfs2. If your bridges become blocked, the solution is
not to download a new bundle but to find new bridges:

Windows 64-bit

OS X 64-bit

GNU/Linux 32-bit

GNU/Linux 64-bit

We are looking for feedback on how well the bundles work. Please leave
comments on this wiki page or ticket, or as replies to this message:

Alexandre Allaire, George Kadianakis, and I worked together to build
these bundles.

David Fifield

More information about the tor-talk mailing list