[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #4248 [Analysis]: Hack up stunnel to test a transport that uses a vanilla SSL handshake



#4248: Hack up stunnel to test a transport that uses a vanilla SSL handshake
-------------------------+--------------------------------------------------
 Reporter:  arma         |          Owner:     
     Type:  task         |         Status:  new
 Priority:  normal       |      Milestone:     
Component:  Analysis     |        Version:     
 Keywords:  performance  |         Parent:     
   Points:               |   Actualpoints:     
-------------------------+--------------------------------------------------

Comment(by asn):

 Without loss of generality, assume that your bridge is at 1.2.3.4:

 On the client side you would want to run:
 `# stunnel -f -c -d 127.0.0.1:6000 -r 1.2.3.4:6001`
 And then in your torrc, set up your Bridge line to point to
 127.0.0.1:6000.

 On the relay side you would want to run:
 `# stunnel -f -p server.pem -d 6001 -r localhost:5001`
 where server.pem is a file with a vanilla cert. chain and a private key.
 And then set up your torrc with'ORPort 5001'.

 (PROTIP: port numbers can change)

 I also coded an stunnel-like obfsproxy transport. You can find it in
 branch 'bug4248' of `git://gitorious.org/obfsproxy/obfsproxy.git`. As in
 the above example, on the server side you would do:
 `$ obfsproxy moressl server 1.2.3.4:6001 127.0.0.1:5001 server.crt`

 and on the client side:
 `$ obfsproxy moressl socks 127.0.0.1:6000`
 then add it as the ClientTransportPlugin of the Bridge at 1.2.3.4:6001.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4248#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs