[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #4248 [Analysis]: Hack up stunnel to test a transport that uses a vanilla SSL handshake
#4248: Hack up stunnel to test a transport that uses a vanilla SSL handshake
-------------------------+--------------------------------------------------
Reporter: arma | Owner:
Type: task | Status: new
Priority: normal | Milestone:
Component: Analysis | Version:
Keywords: performance | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Comment(by asn):
Without loss of generality, assume that your bridge is at 1.2.3.4:
On the client side you would want to run:
`# stunnel -f -c -d 127.0.0.1:6000 -r 1.2.3.4:6001`
And then in your torrc, set up your Bridge line to point to
127.0.0.1:6000.
On the relay side you would want to run:
`# stunnel -f -p server.pem -d 6001 -r localhost:5001`
where server.pem is a file with a vanilla cert. chain and a private key.
And then set up your torrc with'ORPort 5001'.
(PROTIP: port numbers can change)
I also coded an stunnel-like obfsproxy transport. You can find it in
branch 'bug4248' of `git://gitorious.org/obfsproxy/obfsproxy.git`. As in
the above example, on the server side you would do:
`$ obfsproxy moressl server 1.2.3.4:6001 127.0.0.1:5001 server.crt`
and on the client side:
`$ obfsproxy moressl socks 127.0.0.1:6000`
then add it as the ClientTransportPlugin of the Bridge at 1.2.3.4:6001.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4248#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs