[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10061 [Pluggable transport]: Complete specification for generalised PT composition
#10061: Complete specification for generalised PT composition
-------------------------------------+-----------------------
Reporter: infinity0 | Owner: infinity0
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Pluggable transport | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
-------------------------------------+-----------------------
Comment (by infinity0):
Here are some of the issues we ran into, when turning obfs-flash-client
into a more general form. I've also done a simple language substitution to
turn them into statements that are applicable to the server side, but I
haven't thought them through so they might be less correct.
Remote interface:
- client: the outermost PT (that writes to the internet) might not '''send
to''' a particular address. (e.g flashproxy-client)
- server: the outermost PT (that reads from the internet) might not
'''listen on''' a particular address. (not sure if we need to support
this, even flashproxy's websocket-server isn't this weird)
Real remote PT:
- client: the remote '''bridge''' address (if any; see prev point), tor
must '''give to''' the outermost PT, not the innermost as naive chaining
achieves
- server: the remote '''client''' address (if any; see prev point), tor
must '''read from''' the outermost PT. (this might already be covered with
ExtORPort handling)
Per-bridge shared-secrets / other metadata:
- client: this might be dynamic (from Tor), so needs to be passed per-
connection.
- server: this is probably static and can be input via config files. (not
entirely sure about this)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10061#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs