Re: [tor-dev] Combining obfsproxy+scramblesuit with OpenVPN

2014-03-06 Thread Yawning Angel
On Thu, 06 Mar 2014 19:22:16 +0200 irregulator wrote: > On 03/05/2014 07:58 PM, Yawning Angel wrote: > Hey people thanks for your input, > > I'm actually passing password inline while starting obfsproxy > (client-side) like that : > > python pyobfsproxy.py --log-min-severity=info scramblesuit --

Re: [tor-dev] Combining obfsproxy+scramblesuit with OpenVPN

2014-03-06 Thread irregulator
On 03/05/2014 07:58 PM, Yawning Angel wrote: > >> So, while testing OpenVPN with obfsproxy and the latest patch, the vpn >> client enters the authentication phase. > Yay. > >> Do the credentials depend on the pluggable transport in use by the >> obfsproxy? > Yes. It only should happen for obfs2 (i

Re: [tor-dev] Guard node security: ways forward (An update from the dev meeting)

2014-03-06 Thread Tariq Elahi
On 05-Mar-14 5:19 PM, George Kadianakis wrote: OK, let's get back to this. This subthread is blocking us from writing a proposal for this project, so we should resolve it soon. There is one very important performance factor that I can't figure out how to measure well, and that's the impact on t

Re: [tor-dev] GSoC - Profile UDP transport protocols

2014-03-06 Thread Yawning Angel
On Thu, 6 Mar 2014 09:55:42 -0300 Danilo Carvalho wrote: > I am interested in profiling the UDP transport protocols, I think > using a different underlying protocol could significantly improve > Tor's performance and I would like to be part of that. https://research.torproject.org/techreports/lib

[tor-dev] GSoC - Profile UDP transport protocols

2014-03-06 Thread Danilo Carvalho
Hello I am interested in profiling the UDP transport protocols, I think using a different underlying protocol could significantly improve Tor's performance and I would like to be part of that. At first, I thought that the project consisted of profiling existing udp transport code. However, I could