[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Port for obfsproxy



On 07.10.2013 21:11, dardok wrote:
> I guess that you misunderstood the concept of obfsproxy. It is useful
> to obfuscate the communication between a client  within a censorship
> zone and a tor bridge. The obfsproxy doesn't emulate a HTTP protocol
> communication, instead it is designed to look random (and the packets
> are encypted). So if you try to run this service over the HTTP port 80
> and the packets are random and not looking like a HTTP communication,
> it will be more suspicious than running this service over any other port.

Thank you. I understood the concept but not the implementation.

"For example, there MIGHT be a HTTP transport which transforms Tor
traffic to look like regular HTTP traffic."

I missed the "MIGHT" part. Too bad this doesn't exist.

-- 
Zapisz moj nowy prywatny adres email: gdr@xxxxxxxx
Teraz na wlasnym serwerze. Zawsze czysto - zawsze sucho - zawsze pewnie.
Klucz PGP to nadal 4ED3D2B7

Attachment: 0x4ED3D2B7.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays