The deliverables for this project are as follows:
A library for parsing pluggable transport configuration options
This will be a python library that authors of SOCKS proxies can use to integrate their proxies with Tor.
A framework (both server and client-side) for writing pluggable transports in python
The framework will provide a SOCKS proxy server already integrated with the pluggable transport library. All the protocol author will need to do is provide the obfuscation and de-obfuscation functions and a main function to do command line parsing and call the framework.
A python implementation of the obfsproxy command line tool
This will be a command line program using the framework that will accept the same command line options as the existing obfsproxy tool. It will support the selection of an obfuscation function, although not all of the protocols currently supported by obfsproxy will initially be available in python.
A python implementation of the obfs2 protocol implemented as an obfsproxy module
The obfs2 protocol will be implemented as a plugin for the framework and made available to the command line tool.
Conversion of Dust to an obfsproxy module
The Dust protocol will be implemented as a plugin for the framework and made available to the command line tool.
py2exe packaging for obfsproxy
The command line tool will be packaged into a standalone executable for Windows.
Optional deliverables if there is sufficient time: obfsproxy modules for other protocols, experiment with other packaging systems
Current status:
I'm working on a spec of the API for the option parsing library. It should be available soon.
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev