Hi Dan. Very cool. Would you like some analysis of how well your pluggable
transport mimicks real BitTorrent traffic?

I don't have time to install bitsmuggler myself right now as I am currently
at a conference. However, if you send me a .pcap file recorded with tcpdump
or Wireshark of bitsmuggler traffic, I will test it against BitTorrent
traffic using the Adversary Labs tools I have been developing.

By the way, George is on my committee as well!

On Saturday, February 28, 2015, Dan Cristian Octavian <
danoctavia...@gmail.com> wrote:

> Hello!
>
> My name is Dan, I've been working on a pluggable transport for Tor based
> on bittorrent as cover traffic and wanted to let you know about it.
>
> https://github.com/danoctavian/bit-smuggler
>
> In a nutshell, I'm tunnelling a data stream through a bittorrent peer
> connection that is created by real bittorrent clients (uTorrent for this
> implementation) - to avoid "parroting" traffic pitfalls and active probing.
> This made the implementation quite tricky to get right, so my reasoning is
> that it's a worthy trade-off.
>
> I worked with Dr. George Danezis as my supervisor for the project. He came
> up with the idea to try bittorrent, the crypto strategy and advised me
> throughout.
>
> The docs in the repo contain more information. I researched this topic for
> my master thesis, and the last 2 months i did a rewrite of the project. At
> the moment I did not integrate with Tor (working on an Extended orPort
> implementation) and I need to do more work on the server to make it run
> properly as a long running process.
>
> Please ask me anything for clarification and let me know how can i make
> this useful for the Tor project. Any kind of feedback is very welcome. I'm
> working a 9-5 starting next week, but I'm going to work on it in my spare
> time.
>
> Thanks!
>
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to