[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] A call to arms for obfuscated bridges



Drake Wilson:
>   - bypass declared installation requirements, use 2.6.6, and blindly
>     hope that it won't result in some awful subtle bug;

obfsproxy works on Debian Squeeze which bears 2.6.6. I had to patch the
test suites but that was all:
<http://anonscm.debian.org/gitweb/?p=collab-maint/pyptlib.git;a=blob;f=debian/patches/0001-Monkey-patch-unittest.TestCase-to-add-missing-assert.patch;h=ebba348;hb=refs/heads/tpo-squeeze-backport>
<http://anonscm.debian.org/gitweb/?p=collab-maint/obfsproxy.git;a=blob;f=debian/patches/0001-Monkey-patch-twisted.trial.unittest.TestCase-to-add-.patch;h=c7b78eda;hb=refs/heads/tpo-squeeze-backport>

>   - I'd like to examine the obfsproxy source code out of curiosity to
>     see how it's likely to interact with my other network services.

<https://gitweb.torproject.org/pluggable-transports/obfsproxy.git>
or `git clone https://git.torproject.org/pluggable-transports/obfsproxy.git`
or <https://pypi.python.org/pypi/obfsproxy> (tarball and gpg sig)

Hope that helps,
-- 
Lunar                                             <lunar@xxxxxxxxxxxxxx>

Attachment: signature.asc
Description: Digital signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays