[Tor-BSD] freebsd-ports; tor, obfs4, browser & socks
Vinícius Zavam
egypcio at googlemail.com
Fri Aug 4 04:53:47 EDT 2017
2017-08-04 3:16 GMT+02:00 teor <teor2345 at gmail.com>:
>
> > On 4 Aug 2017, at 02:54, George Rosamond <george at ceetonetechnology.com>
> wrote:
> >
> > The default connection for censored users in the TB configuration is
> > obfs4, so a lot of relays allowing entry traffic and bridges are missing
> > a significant amount of connections.
>
G,
thank you for your feedback! the missing 'managed' at the end was added to
pkg-message.in (master). also shaped a bit the information on this file;
got things
from "pluggable-transports/obfs4.git/plain/README.md".
> Relays don't typically run pluggable transports like obfs4.
> And the default obfs4 in Tor Browser comes with a set of default bridges.
>
> BridgeDB's default is also obfs4, [0] so if BSD bridge operators want
> to have their bridges used by censored users, installing obfs4 is really
> important.
>
>
> [0]: https://bridges.torproject.org/
>
some boxes are running freebsd 11 and a mix of Tor 0.3.{0,1}. the bleeding
edge box
is running code from FreeBSD head (current), and Tor master (alpha-dev);
% file /usr/local/bin/tor
/usr/local/bin/tor: ELF 64-bit LSB executable, x86-64, version 1 (FreeBSD),
statically linked, for FreeBSD 12.0 (1200038), FreeBSD-style, not stripped
% tor version | head -1
Aug 04 10:39:02.479 [notice] Tor 0.3.2.0-alpha-dev (git-b2a7e8df900eabe4)
running on FreeBSD with Libevent 2.1.8-stable, OpenSSL 1.0.2l, Zlib 1.2.11,
Liblzma 5.2.3, and Libzstd 1.3.0.
% obfs4proxy -version
obfs4proxy-0.0.7
--
Vinícius Zavam
keybase.io/egypcio/key.asc
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nycbug.org/pipermail/tor-bsd/attachments/20170804/268ddb34/attachment.html>
More information about the Tor-BSD
mailing list