On 02/10/2012 08:11 AM, Roger Dingledine wrote: > On Fri, Feb 10, 2012 at 07:56:04AM -0500, Nathan Freitas wrote: >> > Thoughts on attempting to port and ship Obfsproxy client functionality >> > to Android? >> > Where should we begin? Any details on exactly what was done for the new >> > TBB? > Step one, build obfsproxy for Android. I expect your biggest problem > will be libevent2 since you won't have any packages for it. See
Happy to say that libevent2 and obfsproxy have been successfully cross-compiled for Android w/o major patching, and all seems to be working well with a manually hacked version of Orbot. I have to get some sleep now, but should have a new Orbot proper build in 24 hours (with the help of Gsathya and Kensen from GP). I've posted some test binaries with an Android shell-based how to here: https://github.com/downloads/guardianproject/Orbot/obfsproxy-20120212a.tar.gz (.asc) *** This currently requires root, and Orbot should be deactivated. 1) adb push the files about to /data/local 2) adb shell; su 3) mv the files above from /data/local to /data/data/org.torproject.android/app_bin 4) chown the new files to the uid of the orbot app (e.g. "chmod app_2.app_2 tor"). find the uid by 'ls'-ing in the /data/data/org.torproject.android/app_bin folder 5) chmod 700 obfsproxy; chmod 700 tor; 6) export HOME=/data/data/org.torproject.android/app_bin 7) /data/data/org.torproject.android/app_bin/tor DataDirectory /data/data/org.torproject.android/cache -f /data/data/org.torproject.android/app_bin/torrc 8) Open Firefox Mobile with ProxyMob add-on, and you should be ready to roll. *** Feb 11 03:29:23.275 [notice] Tor v0.2.3.11-alpha (git-9ce9836f853d8a31) running on Linux armv7l. Feb 11 03:29:23.276 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning ... Feb 11 03:29:31.000 [notice] Bootstrapped 80%: Connecting to the Tor network. Feb 11 03:29:31.000 [notice] Bootstrapped 90%: Establishing a Tor circuit. Feb 11 03:29:32.000 [notice] new bridge descriptor 'maximatorbridge' (fresh): $55329E0FB775496D4479AC1E0D2CDE3B98D774C3~maximatorbridge at 212.112.242.160 Feb 11 03:29:32.000 [notice] new bridge descriptor 'ghobfsbridge1' (fresh): $10D5B1C21544B64EBC2A4275FE32A8D4A40405B5~ghobfsbridge1 at 213.108.105.129 Feb 11 03:29:32.000 [notice] new bridge descriptor 'torbridge42' (fresh): $9459581B2DA5458D19790C28918CB544B3854C8A~torbridge42 at 85.214.131.213 Feb 11 03:29:32.000 [notice] new bridge descriptor 'Unnamed' (fresh): $7C7DC083FFCFE383268B873D2CB046684B615648~Unnamed at 85.17.20.242 Feb 11 03:29:32.000 [notice] new bridge descriptor 'Unnamed' (fresh): $478208B87337CAC2E9391AD7B91D125193D5A641~Unnamed at 91.208.34.7 Feb 11 03:29:32.000 [notice] new bridge descriptor 'Unnamed' (fresh): $5F88FDA345422B32E1A20F2761182C23CD49EA79~Unnamed at 131.215.158.1 Feb 11 03:29:32.000 [notice] new bridge descriptor 'ndnop0' (fresh): $9D7259A696F7DAB073043B28114112A46D36CFFD~ndnop0 at 109.105.109.163 Feb 11 03:29:32.000 [notice] new bridge descriptor 'Unnamed' (fresh): $00BC5E7111BD00E9AF463BE9BFE6255FE51CFCD9~Unnamed at 109.163.233.195 Feb 11 03:29:33.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working. Feb 11 03:29:33.000 [notice] Bootstrapped 100%: Done. *** +n8fr8 _______________________________________________ tor-dev mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
