Hello David and George and other people who are interested in there being even
more obfuscation transports for tor, I appreciate the thought of making a
frankenstein butchering of obfsproxy code which transports tor over dns... and
speaks socks and tor control port... and works to PT spec...
We technically don't need to use a tun device for the dns transport... but if a
tun device is used for the tor dns transport then we get the reliability layer
without having to write it ourselves. It doesn't matter that tun devices are
lossy and udp is unreliable; we just spray packets.
George,
I'd like to write a dns transport... and it seems to me the
obfsproxy api isn't designed for non tcp transports...
Maybe we again make some changes to the obfsproxy api?
It would transport IP packets using a tun device...
we can route it to a socks endpoint and proxy from there.
George Kadianakis:
b) You can write your own Python code and selectively steal code from
obfsproxy. You will have to steal the code that does networking,
Extended ORPort, environment variable parsing (pyptlib), SOCKS,
etc. This might not be too hard.
Could the shared code be used to
George,
I'd like to write a dns transport... and it seems to me the
obfsproxy api isn't designed for non tcp transports...
Maybe we again make some changes to the obfsproxy api?
It would transport IP packets using a tun device...
we can route it to a socks endpoint and proxy from there.
On Wed, Feb 19, 2014 at 04:59:05PM -0800, George Kadianakis wrote:
George Kadianakis:
b) You can write your own Python code and selectively steal code from
obfsproxy. You will have to steal the code that does networking,
Extended ORPort, environment variable parsing (pyptlib), SOCKS,