[Noisebridge-discuss] Obfuscating TOR proxy

Davidfine d at vidfine.com
Sun Feb 12 07:59:12 UTC 2012


Folks, since Iran has completely cut off SSL traffic to its citizens,
something like 50,000 TOR users can no longer connect. Tor has released
a new obfuscating proxy for bridge nodes which will allow users to
continue to access the open internet (for now).

instructions:
https://www.torproject.org/projects/obfsproxy-instructions.html.en
https://lists.torproject.org/pipermail/tor-talk/2012-February/023070.html

If you have bandwidth to spare, please consider setting this up. The
proxy package seems to require linux, but you can install it on a
virtual machine or use their image to quickly host one on Amazon EC2.
You'll need the development version of TOR and one other package from
git. It's not too hard, and I'll gladly help anyone get it working.

Once configured, you should share your bridge address:port with
tor-assistants at torproject.org so they can distribute it.
The instructions don't say this, but add 'PublishServerDescriptor 0' to
the torrc configuration file so that they know not to distribute your
bridge address through the standard channels where censors might see it.
You may also want to firewall incoming connections to all but the
obfs-proxy port. This will help prevent your bridge being discovered by
active scanners.

--DF



More information about the Noisebridge-discuss mailing list