Changes between Version 4 and Version 5 of TrafficObfuscation

02/13/13 20:21:59 (5 years ago)
David Sommerseth

Added example on how to use obfsproxy


  • TrafficObfuscation

    v4 v5  
     34== A quick obfsproxy setup ==
     36This setup will start obfsproxy on your openvpn server, listening to the port 21194.  On the client it will start a obfsproxy serving as a SOCKS proxy, listening on the client on port 10194.  The part which says "<some-random-key>" needs to be the same value on both server and client.  The key can be a longer text string, with just random letters.  I'd recommend to keep it long (at least 32 characters, which is 256 bits).
     38=== Client side ===
     39Add the following lines to your existing openvpn config file:
     43socks-proxy 10194
     46and change the --remote option to be
     48remote <YOUR-VPN-SERVER> 21194
     51That is, changing the port number to match the port number the server side obfsproxy will listen to.
     53Then start the obfsproxy like this:
     56 [user@host: ~] $ obfsproxy --log-file=obfsproxy.log --log-min-severity=info obfs2 \
     57      --shared-secret=<some-random-key> socks
     60=== Server side ===
     61Here we tell obfsproxy to listen to TCP port 21194 and to send any obfsproxy clients to the OpenVPN server, listening on, port 1194.  And remember to allow TCP connections from the "outside" to port 21194 in your firewall config.  Start obfsproxy like this:
     63 [user@host: ~] $ obfsproxy --log-file=obfsproxy.log --log-min-severity=info obfs2 \
     64      --dest= --shared-secret=<some-random-key> server
     67The OpenVPN server needs in this case just this line in the config:
     69port 1194
     72That's all the magic, and should be a complete working setup.
    3374A user provided an OpenVPN installer which bundles OpenVPN with obfsproxy. Look [ here] for downloads and instructions.