[tor-bugs] #7167 [Pluggable transport]: Combine traffic obfuscation with address diversity of flash proxy
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Sep 4 00:19:58 UTC 2013
#7167: Combine traffic obfuscation with address diversity of flash proxy
---------------------------------+-----------------------------------------
Reporter: karsten | Owner: asn
Type: project | Status: needs_revision
Priority: normal | Milestone:
Component: Pluggable | Version:
transport | Keywords: SponsorF20131101 flashproxy
Resolution: | Parent ID:
Actual Points: |
Points: |
---------------------------------+-----------------------------------------
Comment (by dcf):
Replying to [comment:32 dcf]:
> Replying to [comment:26 dcf]:
> > I started Mk. II of the server transport in my repo at
https://www.bamsoftware.com/git/obfs-flash.git. To build it, do
> > {{{
> > export GOPATH=$(pwd)
> > go get # fetches the pt library
> > make
> > }}}
> > This version is pretty much a port of the Python Mk. I.V. The next
step is to have it open its own listener and connect to Tor using the
ExtORPort.
> >
> > This is now what's running at tor1.bamsoftware.com:9500
(173.255.221.44:9500).
>
> I pushed a rough draft of Mk. II that does extended ORPort.
Cool, the nested transports appear in `bridge-stats`:
{{{
bridge-ip-transports <OR>=8,obfs3_flash=8,websocket=168
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7167#comment:33>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list