[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #7167 [Pluggable transport]: Combine traffic obfuscation with address diversity of flash proxy
#7167: Combine traffic obfuscation with address diversity of flash proxy
-----------------------------------------+----------------------------------
Reporter: karsten | Owner: asn
Type: project | Status: needs_review
Priority: normal | Milestone:
Component: Pluggable transport | Version:
Keywords: SponsorF20131101 flashproxy | Parent:
Points: | Actualpoints:
-----------------------------------------+----------------------------------
Comment(by dcf):
I made a Python version of the server at https://www.bamsoftware.com/git
/obfs-flash.git, directory `mki.v`. This is now what's running at
tor1.bamsoftware.com:9500 (173.255.221.44:9500). The instructions from
comment:17 will still work.
This isn't quite Mk. II because it's not handling ExtORPort yet. But it is
a bit nicer than the shell script proof of concept.
Could we have a Python implementation of the client? The nice thing is
that the client won't need any further iterations: A Mk. I.V client will
also work for Mk. II and Mk. III in the plan we have developed. The server
and ExtORPort is the only tricky part.
I will do the Python client when I have time if nobody beats me to it.
I like what's happening in #9376, but let's not let completely correct
subprocess handling hold us back from having running code. Better to have
a version with dirty SIGINT handling running now, and improve it in a
later iteration.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7167#comment:21>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs