Ник | Пост | Дата |
---|---|---|
tango |
Pluggable transports like meek and obfs4 can be difficult to use outside of Tor. That’s because they communicate with a parent process using a specification that is not widely implemented. ptadapter wraps pluggable transports to provide a simple local TCP interface so that pluggable transports can easily be used by other programs. Author’s announcement: https://groups.google.com/d/msg/traffic-obf/cPc8JgwK2_k/S6TJjCweEAAJ Here is a tutorial on using ptadapter and obfs4 to obfuscate a simple HTTP proxy. ServerInstall the dependencies.
Run your HTTP proxy, listening on a localhost port. (You can replace this step with any kind of server you want.)
Create a file called
Run ptadapter on the configuration file. Now you have an external obfs4 listener on 0.0.0.0:9999 that will deobfuscate traffic and forward it to 127.0.0.1:3128.
Get the bridge’s certificate for
ClientInstall the dependencies.
Create a file called
Run ptadapter on the configuration file. Now you have a local listener at 127.0.0.1:3128 that will obfuscate and forward to server:9999, which will then deobfuscate and forward to its own 127.0.0.1:3128. Basically, the client’s port 3128 is connected to the server’s port 3128 through a magic obfuscated tunnel.
Now you can test the tunnel, treating the client’s local 127.0.0.1:3128 as if it were an HTTP proxy.
You can also configure 127.0.0.1:3128 in your web browser, etc. TroubleshootingUse the
Enable obfs4proxy logging in
| 2019-12-19T20:20:23.345Z |
tango |
The above documentation link doesn’t work for me anymore. Here is a working link: https://ptadapter.readthedocs.io/en/latest/console_script.html#config-file | 2021-12-31T05:48:45.343Z |