[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Obfuscated TCP: looking for testers

Obfuscated TCP is a backwards-compatible modification to the TCP
protocol which adds opportunistic encryption. It's designed to hamper
and detect large-scale wiretapping and corruption of TCP traffic on
the Internet [1]

TLS is the solution to protecting sensitive information. However,
there's room for a low setup cost protocol to protect the bulk of
traffic which isn't currently encrypted. It can't stop a focused
attack, but it can assuage untargeted, dragnet sniffing of backbones
and spoofing of RST packets.

I figure that Tor users might be the kind of technically inclined
folks who might want to help out by testing this even though I've not
written any Tor code in quite a while. Note that, since obstcp has a
kernel component, you'd need to be able to patch and rebuild a kernel.

All the information is at: http://code.google.com/p/obstcp/wiki/Testing

Also, I'll be on #obstcp on OFTC today


[1] http://code.google.com/p/obstcp/

Adam Langley agl@xxxxxxxxxxxxxxxxxx http://www.imperialviolet.org