[tor-bugs] #7167 [Pluggable transport]: Combine traffic obfuscation with address diversity of flash proxy
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Mar 22 18:04:46 UTC 2013
#7167: Combine traffic obfuscation with address diversity of flash proxy
-----------------------------------------+----------------------------------
Reporter: karsten | Owner: asn
Type: project | Status: new
Priority: normal | Milestone:
Component: Pluggable transport | Version:
Keywords: SponsorF20131101 flashproxy | Parent:
Points: | Actualpoints:
-----------------------------------------+----------------------------------
Comment(by dcf):
Replying to [comment:2 asn]:
> After discussions in the dev meeting, consensus is:
>
> a) First, investigate the option of simply using the code of obfs2 in
flashproxy. This involves librarifying obfs2 in some way, and/or
implementing flashproxy within the pyobfsproxy framework. This should be
the easiest way of doing this ticket.
My guess is that it's easiest to port the flashproxy code to
pyobfsproxy/Twisted. Here is the main event loop, which could be rewritten
with Twisted:
https://gitweb.torproject.org/flashproxy.git/blob/23699fdfeb59473d69bea3306a150c7e743e824c
:/flashproxy-client#l877
The WebSocket implementation is a couple of hundred lines and can probably
be directly copied:
https://gitweb.torproject.org/flashproxy.git/blob/23699fdfeb59473d69bea3306a150c7e743e824c
:/flashproxy-client#l203
The HTTP WebSocket request handler might be a little weird, because it has
to hijack an HTTP channel and turn it into a normal socket. But maybe
Twisted doesn't make that hard.
https://gitweb.torproject.org/flashproxy.git/blob/23699fdfeb59473d69bea3306a150c7e743e824c
:/flashproxy-client#l507
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7167#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list