The net/obfs4proxy port

obfs4proxy-0.0.14 – a "look-like nothing" obfuscation protocol for TCP (cvsweb github mirror)


obfs4 (a.k.a. The Obfuscator) is a transport with the same features as
ScrambleSuit but utilizing Dan Bernstein's elligator2 technique for
public key obfuscation, and the ntor protocol for one-way
authentication. This results in a faster protocol.
WWW: https://gitlab.com/yawning/obfs4


| ${PKGSTEM} on OpenBSD

To use obfs4 as a Bridge Client, please add the following configuration
to your 'torrc' config file:

	ClientTransportPlugin obfs4 exec ${PREFIX}/bin/obfs4proxy

To enable this Pluggable Transport in your Tor Bridge, use the
following configurations in your 'torrc' file:

	# Use obfs4proxy to provide the obfuscator
	ServerTransportPlugin obfs4 exec ${PREFIX}/bin/obfs4proxy

	# Enable Extended ORPort
	ExtORPort auto

	## (Optional) Listen on the specified IP:PORT for obfs4 connections
	## as opposed to picking a random port automatically
	# ServerTransportListenAddr obfs4

obfs4proxy is backwards compatible with obfs2 and obfs3 either in
client or server mode. If you want to use it like this, please adjust
your 'torrc' config file to fit your needs. It's compatible with
ScrambleSuit in client mode.

For more information, please consult the official wiki page at


Sean Levy

Only for arches

aarch64 amd64 arm i386 riscv64


lang/go net www

Build dependencies

Reverse dependencies