TOR Pluggable Transport Bridges

Tor mempunyai beberapa cara untuk bypass firewall dengan menggunakan Transport Bridges

  • Obfsproxy is a Python framework for implementing new pluggable transports. It uses Twisted for its networking needs, and pyptlib for some pluggable transport-related features. It supports the obfs2 and obfs3 pluggable transports. Maintained by asn. 
    Status: Deployed
  • Flashproxy turns ordinary web browsers into bridges using websockets, and has a little python stub to hook Tor clients to the websocket connection. See its git repository, and design paper. Maintained by David Fifield. 
    Status: Deployed
  • Format-Transforming Encryption (FTE) transforms Tor traffic to arbitrary formats using their language descriptions. See the research paper
    Status: Deployed
  • ScrambleSuit is a pluggable transport that protects against follow-up probing attacks and is also capable of changing its network fingerprint (packet length distribution, inter-arrival times, etc.). It's part of the Obfsproxy framework. Maintained by Philipp Winter. 
    Status: To be deployed
  • Meek is a transport that uses HTTP for carrying bytes and TLS for obfuscation. Traffic is relayed through a third-party server (​Google App Engine). It uses a trick to talk to the third party so that it looks like it is talking to an unblocked server. Maintained by David Fifield. 
    Status: Coming soon
  • obfs4 is a transport with the same features as ScrambleSuit but utilizing Dan Bernstein's elligator2 technique for public key obfuscation, and the ntor protocol for one-way authentication. This results in a faster protocol. Written in Go. Maintained by Yawning Angel. 
    Status: Coming soon
  • obfsclient is a multi-transport pluggable transport proxy (like obfsproxy), written in C++ that implements the client-side of obfs2obfs3 and scramblesuit. It's used by Orbot on Android because of the difficulties of using Python applications. Maintained by Yawning Angel. 
    Status: Deployed
  • StegoTorus is an Obfsproxy fork that extends it to a) split Tor streams across multiple connections to avoid packet size signatures, and b) embed the traffic flows in traces that look like html, javascript, or pdf. See its git repository. Maintained by Zack Weinberg. 
    Status: Undeployed
  • SkypeMorph transforms Tor traffic flows so they look like Skype Video. See its source code and design paper. Maintained by Ian Goldberg. 
    Status: Undeployed
  • Dust aims to provide a packet-based (rather than connection-based) DPI-resistant protocol. See its git repository. Maintained by Brandon Wiley. 
    Status: Undeployed