Home

The net/obfs4proxy port

obfs4proxy-0.0.14 – a "look-like nothing" obfuscation protocol for TCP (cvsweb github mirror)

Description

obfs4 (a.k.a. The Obfuscator) is a transport with the same features as
ScrambleSuit but utilizing Dan Bernstein's elligator2 technique for
public key obfuscation, and the ntor protocol for one-way
authentication. This results in a faster protocol.
WWW: https://gitlab.com/yawning/obfs4

Readme

+-----------------------------------------------------------------------
| ${PKGSTEM} on OpenBSD
+-----------------------------------------------------------------------

To use obfs4 as a Bridge Client, please add the following configuration
to your 'torrc' config file:

	ClientTransportPlugin obfs4 exec ${PREFIX}/bin/obfs4proxy

To enable this Pluggable Transport in your Tor Bridge, use the
following configurations in your 'torrc' file:

	# Use obfs4proxy to provide the obfuscator
	ServerTransportPlugin obfs4 exec ${PREFIX}/bin/obfs4proxy

	# Enable Extended ORPort
	ExtORPort auto

	## (Optional) Listen on the specified IP:PORT for obfs4 connections
	## as opposed to picking a random port automatically
	# ServerTransportListenAddr obfs4 0.0.0.0:PORT

obfs4proxy is backwards compatible with obfs2 and obfs3 either in
client or server mode. If you want to use it like this, please adjust
your 'torrc' config file to fit your needs. It's compatible with
ScrambleSuit in client mode.

For more information, please consult the official wiki page at
https://community.torproject.org/relay/setup/bridge/openbsd/

Maintainer

Sean Levy

Only for arches

aarch64 amd64 arm armv7 i386 mips64 riscv64

Categories

lang/go net www

Build dependencies

Reverse dependencies

Files

Search