[tor-talk] Run pyobfsproxy standalone
Gregory Disney
gregory.disney at owasp.org
Tue May 7 17:04:03 UTC 2013
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 What type of server?Systems
details needed. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13
(GNU/Linux)
iQEcBAEBAgAGBQJRiTQDAAoJEHJ6fv5JwWqhTBAH/3mwGm0NQFlO5W8o8cFR9NKO
L/U1knFMUWgP1fRXx6bEYUkv9ZAMbcH0skzdWk+nr9ojij7oAY1rsUf33b/dUBmK
K1dNtSAQKWzr1GAOnnciaqzItwQbqTKBUeMvpHhQmFddLBxQVjf0jU9ZH2pYAfIj
vWIyQ6yFEm2+pWGdaJ/dkqlRlfpHsxqO+q+DMcvrOsrbULL2DuB/8WZkdms1UmyH
r8glZiyhhtSXZ3TETYvJdqUGhGL8O9v5ResG2OxFadG0FosyLGO7ivJbN54Mg2HB
Y7Dl/sE9+ctnTBDlT5HJ+QcfOLIhipMrdEsh3656+sYXMbA2CyvYOM3W6zatfU8= =PdBC
-----END PGP SIGNATURE-----
On Tue, May 7, 2013 at 12:58 PM, John Crick <wisecrick at gmail.com> wrote:
> I want to run pyobfsproxy standalone on my server to obfuscate ssh
> traffic. It works without --ext-cookie-file, but it'll also be visible
> to the supervisor.
>
> So I want --ext-cookie-file to be enabled, it works on the server
> side, but how to config it on the client side?
>
> In my opinion, ext-cookie-file is a 64 bytes random data, am I right?
> _______________________________________________
> tor-talk mailing list
> tor-talk at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
More information about the tor-talk
mailing list