Skip to content
This repository has been archived by the owner on Jan 2, 2022. It is now read-only.
/ obfsclient Public archive

A C++11 obfs2/3 Tor managed pluggable transport client

License

Notifications You must be signed in to change notification settings

Yawning/obfsclient

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

obfsclient - A C++11 obfs2/3 Tor managed pluggable transport client

Yawning Angel (yawning at schwanenlied dot me)

Compile this if you are a obfuscated strong proxy who don't need no Python

What?

This is a C++11 client implementation of the following protocols:

  • obfs2 - The Twobfuscator
    • The shared secret mode is not used in the wild and is unsupported.
  • obfs3 - The Threebfuscator
  • ScrambleSuit - EXPERIMENTAL
    • This requires tor-0.2.5.x or later for Pluggable Transport arguments.

By design it will only function as a ClientTransportPlugin for Tor. It does use a reasonably complete implementation of the Pluggable Transport spec so when used properly, it will function as a drop in replacement for asn's Python implementation.

Building

It currently has the following external dependencies:

Non-standard configure options:

  • --enable-scramblesuit-iat - Enable ScrambleSuit IAT obfuscation

Make Targets:

  • all - Build the obfsclient binary
  • check - Build/Run obfsclient_test
  • docs - Build the doxygen documentation

Usage

In your torrc:

UseBridges 1
Bridge obfs2 ip:port fingerprint
Bridge obfs3 ip:port fingerprint
Bridge scramblesuit ip:port password=sharedsecret
ClientTransportPlugin obfs2,obfs3,scramblesuit exec /path/to/the/binary/obfsclient

Implementation notes

Like the rest of my C++ code, C++ exceptions and RTTI are not used, and it is expected that the appropriate compiler flags are passed in to disable these functions. The obfsclient binary will assert() on fatal errors (out of memory), because that's realistically the only safe thing to do.

Caveats:

  • My UniformDH implementation is not quite constant time, though the modular exponentiation is. I do not belive that this is a problem since the cryptographic components of obfs3 are intended for obfuscation and not secrecy.
  • The UniformDH implementation is glacially slow. I may be spoiled by using Curve25519 so much lately.

TODO (Patches accepted!)

WON'T DO

  • No, I do not care if this compiles out of the box on Windows.
  • No, I do not care that this doesn't compile with ancient compilers.
  • Unmanaged mode might be a nice to have, but all I care about is Tor.
  • Server implementations of all the protocols (Use the Python version).

About

A C++11 obfs2/3 Tor managed pluggable transport client

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages