[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #7167 [Pluggable transport]: Combine traffic obfuscation with address diversity of flash proxy
#7167: Combine traffic obfuscation with address diversity of flash proxy
-----------------------------------------+----------------------------------
Reporter: karsten | Owner: asn
Type: project | Status: needs_revision
Priority: normal | Milestone:
Component: Pluggable transport | Version:
Keywords: SponsorF20131101 flashproxy | Parent:
Points: | Actualpoints:
-----------------------------------------+----------------------------------
Changes (by dcf):
* status: needs_review => needs_revision
Comment:
Replying to [comment:22 infinity0]:
> dcf don't repeat code! I already did a python client a week ago:
>
> https://github.com/infinity0/obfs-flash/commit/41b760
Very good, thanks. I merged your changes into my repo.
These are my recommendations as to the next development steps for the
client:
1. Make it use pyptlib. This will replace all the
`TOR_PT_MANAGED_TRANSPORT_VER` and `TOR_PT_CLIENT_TRANSPORTS` stuff.
Unfortunately it won't replace the `CMETHOD` read loop; you still have to
do that by hand.
2. Implement the socat SOCKS part in Python. The program needs to
implement a TCP listener and a SOCKS4 (don't do SOCKS5) client. This might
be implemented as a Python thread running an accept loop, with new TCP
connections being split off as Python threads.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7167#comment:23>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs