[tor-relays] A call to arms for obfuscated bridges
Lunar
lunar at torproject.org
Fri Apr 19 11:50:48 UTC 2013
Drake Wilson:
> - bypass declared installation requirements, use 2.6.6, and blindly
> hope that it won't result in some awful subtle bug;
obfsproxy works on Debian Squeeze which bears 2.6.6. I had to patch the
test suites but that was all:
<http://anonscm.debian.org/gitweb/?p=collab-maint/pyptlib.git;a=blob;f=debian/patches/0001-Monkey-patch-unittest.TestCase-to-add-missing-assert.patch;h=ebba348;hb=refs/heads/tpo-squeeze-backport>
<http://anonscm.debian.org/gitweb/?p=collab-maint/obfsproxy.git;a=blob;f=debian/patches/0001-Monkey-patch-twisted.trial.unittest.TestCase-to-add-.patch;h=c7b78eda;hb=refs/heads/tpo-squeeze-backport>
> - I'd like to examine the obfsproxy source code out of curiosity to
> see how it's likely to interact with my other network services.
<https://gitweb.torproject.org/pluggable-transports/obfsproxy.git>
or `git clone https://git.torproject.org/pluggable-transports/obfsproxy.git`
or <https://pypi.python.org/pypi/obfsproxy> (tarball and gpg sig)
Hope that helps,
--
Lunar <lunar at torproject.org>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20130419/e6f74e88/attachment.pgp>
More information about the tor-relays
mailing list