[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Port for obfsproxy



On 2013-10-07 16:13, GDR! wrote:
> On 07.10.2013 21:11, dardok wrote:
>> I guess that you misunderstood the concept of obfsproxy. It is useful
>> to obfuscate the communication between a client  within a censorship
>> zone and a tor bridge. The obfsproxy doesn't emulate a HTTP protocol
>> communication, instead it is designed to look random (and the packets
>> are encypted). So if you try to run this service over the HTTP port 80
>> and the packets are random and not looking like a HTTP communication,
>> it will be more suspicious than running this service over any other port.
> 
> Thank you. I understood the concept but not the implementation.
> 
> "For example, there MIGHT be a HTTP transport which transforms Tor
> traffic to look like regular HTTP traffic."
> 
> I missed the "MIGHT" part. Too bad this doesn't exist.

It does: StegoTorus.

Greets,
 Jeroen

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays