The net/obfs4proxy port
obfs4proxy-0.0.14 – a "look-like nothing" obfuscation protocol for TCP (cvsweb github mirror)
Description
obfs4 (a.k.a. The Obfuscator) is a transport with the same features as ScrambleSuit but utilizing Dan Bernstein's elligator2 technique for public key obfuscation, and the ntor protocol for one-way authentication. This results in a faster protocol.WWW: https://gitlab.com/yawning/obfs4
Readme
+----------------------------------------------------------------------- | ${PKGSTEM} on OpenBSD +----------------------------------------------------------------------- To use obfs4 as a Bridge Client, please add the following configuration to your 'torrc' config file: ClientTransportPlugin obfs4 exec ${PREFIX}/bin/obfs4proxy To enable this Pluggable Transport in your Tor Bridge, use the following configurations in your 'torrc' file: # Use obfs4proxy to provide the obfuscator ServerTransportPlugin obfs4 exec ${PREFIX}/bin/obfs4proxy # Enable Extended ORPort ExtORPort auto ## (Optional) Listen on the specified IP:PORT for obfs4 connections ## as opposed to picking a random port automatically # ServerTransportListenAddr obfs4 0.0.0.0:PORT obfs4proxy is backwards compatible with obfs2 and obfs3 either in client or server mode. If you want to use it like this, please adjust your 'torrc' config file to fit your needs. It's compatible with ScrambleSuit in client mode. For more information, please consult the official wiki page at https://community.torproject.org/relay/setup/bridge/openbsd/
Maintainer
Sean Levy
Only for arches
aarch64 amd64 arm i386 riscv64
Categories
Build dependencies
Reverse dependencies
Files
- /usr/local/bin/obfs4proxy
- /usr/local/man/man1/obfs4proxy.1
- /usr/local/share/doc/pkg-readmes/obfs4proxy