[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #7153 [Pluggable transport]: Don't require pluggable transport proxies to be SOCKS proxies



#7153: Don't require pluggable transport proxies to be SOCKS proxies
---------------------------------+------------------------------------------
 Reporter:  karsten              |          Owner:  asn
     Type:  project              |         Status:  new
 Priority:  normal               |      Milestone:     
Component:  Pluggable transport  |        Version:     
 Keywords:  SponsorF20130228     |         Parent:     
   Points:                       |   Actualpoints:     
---------------------------------+------------------------------------------

Comment(by arma):

 Right -- the main topic of this ticket is to see if it's time to revise
 the set of specified (supported) ways that Tor can delegate connections to
 bridges.

 When we started, we were generalizing from the obfsproxy example, where
 each pluggable transport has a local address it listens on, and you
 connect and tell it your desired bridge address in a socks handshake, and
 if there's more you want to say, you sneak it in via the socks
 username/password field of the socks handshake.

 Now we have two new data points, neither of which fit that model well. The
 first is Stegotorus, where the parameters we want to sneak in don't even
 fit in the username/password field, and also Stegotorus doesn't want to
 hear the address we tell it. The second is Flashproxy, where there are no
 parameters, but also it ignores the address we tell it.

 So the question for this ticket is: now that we have these three data
 points, is the socks-handshake-with-extra-stuff-in-username/password still
 the best model to recommend? If so, should we also recommend (aka specify
 and support) how best to behave if you're one of those two other data
 points?

 Stegotorus has been developed under the model that something else would
 start it as an external proxy, with its own configuration. It has never
 fit well in the managed proxy model. Zack proposes one hack to make it fit
 a bit better. Can we think of better ones? Note that we're still
 *starting* the Stegotorus process with its parameters, rather than telling
 it parameters for a given connection around the time we make the
 connection; that seems klunky to me, since I think it means tearing down
 the Stegotorus process and launching another one, when you want to talk
 differently to your bridges (i.e. when you want to start using a new
 network entry ticket).

 David wants to go a step in a different direction, where a given bridge
 address is actually many bridges, and he doesn't know which ones they are
 because his pluggable transport will only find out once it receives the
 connections from them. His "ignore the address" hack sounds less
 crazypants than Stegotorus's, mostly I guess since he doesn't have any
 other parameters he wants to pass in, but also because his flashproxy
 client stub shouldn't need a restart when you change bridges.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7153#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs