Hi Dan. Very cool. Would you like some analysis of how well your pluggable transport mimicks real BitTorrent traffic?
I don't have time to install bitsmuggler myself right now as I am currently at a conference. However, if you send me a .pcap file recorded with tcpdump or Wireshark of bitsmuggler traffic, I will test it against BitTorrent traffic using the Adversary Labs tools I have been developing. By the way, George is on my committee as well! On Saturday, February 28, 2015, Dan Cristian Octavian < danoctavia...@gmail.com> wrote: > Hello! > > My name is Dan, I've been working on a pluggable transport for Tor based > on bittorrent as cover traffic and wanted to let you know about it. > > https://github.com/danoctavian/bit-smuggler > > In a nutshell, I'm tunnelling a data stream through a bittorrent peer > connection that is created by real bittorrent clients (uTorrent for this > implementation) - to avoid "parroting" traffic pitfalls and active probing. > This made the implementation quite tricky to get right, so my reasoning is > that it's a worthy trade-off. > > I worked with Dr. George Danezis as my supervisor for the project. He came > up with the idea to try bittorrent, the crypto strategy and advised me > throughout. > > The docs in the repo contain more information. I researched this topic for > my master thesis, and the last 2 months i did a rewrite of the project. At > the moment I did not integrate with Tor (working on an Extended orPort > implementation) and I need to do more work on the server to make it run > properly as a long running process. > > Please ask me anything for clarification and let me know how can i make > this useful for the Tor project. Any kind of feedback is very welcome. I'm > working a 9-5 starting next week, but I'm going to work on it in my spare > time. > > Thanks! >
_______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev