[tor-talk] Run pyobfsproxy standalone

Gregory Disney gregory.disney at owasp.org
Tue May 7 17:04:03 UTC 2013


-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 What type of server?Systems
details needed. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13
(GNU/Linux)
iQEcBAEBAgAGBQJRiTQDAAoJEHJ6fv5JwWqhTBAH/3mwGm0NQFlO5W8o8cFR9NKO
L/U1knFMUWgP1fRXx6bEYUkv9ZAMbcH0skzdWk+nr9ojij7oAY1rsUf33b/dUBmK
K1dNtSAQKWzr1GAOnnciaqzItwQbqTKBUeMvpHhQmFddLBxQVjf0jU9ZH2pYAfIj
vWIyQ6yFEm2+pWGdaJ/dkqlRlfpHsxqO+q+DMcvrOsrbULL2DuB/8WZkdms1UmyH
r8glZiyhhtSXZ3TETYvJdqUGhGL8O9v5ResG2OxFadG0FosyLGO7ivJbN54Mg2HB
Y7Dl/sE9+ctnTBDlT5HJ+QcfOLIhipMrdEsh3656+sYXMbA2CyvYOM3W6zatfU8= =PdBC
-----END PGP SIGNATURE-----


On Tue, May 7, 2013 at 12:58 PM, John Crick <wisecrick at gmail.com> wrote:

> I want to run pyobfsproxy standalone on my server to obfuscate ssh
> traffic. It works without --ext-cookie-file, but it'll also be visible
> to the supervisor.
>
> So I want --ext-cookie-file to be enabled, it works on the server
> side, but how to config it on the client side?
>
> In my opinion, ext-cookie-file is a 64 bytes random data, am I right?
> _______________________________________________
> tor-talk mailing list
> tor-talk at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>


More information about the tor-talk mailing list