Combined flash proxy + pyobfsproxy browser bundles

Please help us test new experimental bundles that have flash proxy and pyobfsproxy enabled by default.

Flash proxy is a transport that uses proxies running in web browsers as access points into Tor. pyobfsproxy is a Python implementation of the obfsproxy modular transport that makes network traffic look unlike normal Tor traffic. Both of these technologies make it harder to block access to Tor. If you previously used the obfsproxy bundle, please upgrade to this bundle, which in addition to flash proxy has new obfsproxy bridges.

Flash proxy works differently than other pluggable transports, and you need to take extra steps to make it work. In particular, you will probably need to configure port forwarding in order to receive connections from browser proxies. There are instructions and hints on how to do that at this page: flash proxy howto.

These bundles contain fresh obfs2 bridge addresses, which may work for you if the bridges in the obfsproxy bundle are blocked. The bundles also includes an experimental obfs3 bridge—obfs3 is a new protocol designed to be harder to identify than the previous obfs2. If even these new bridges become blocked, you can find your own obfs2 bridges.

We are looking for feedback on how the bundles work. Please leave comments on the flash proxy usability wiki page or ticket #7824 with your experience, good or bad.

There are other ways you can help beyond testing the bundles. One is to run a bridge with pyobfsproxy. Another is to put the flash proxy badge on your web site or blog, or add it to your Wikipedia profile. If you want your browser to continue to be a proxy after a switch to an opt-in model, click the “Yes” button on the options page.

Anonymous

March 04, 2013

Permalink

In XP sp3,

2013-03-05 10:54:18 flashproxy-reg-email: Failed to register: [Errno 1] _ssl.c:504: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
2013-03-05 10:54:18 flashproxy-reg-email exited with status 1.

Anonymous

March 13, 2013

Permalink

Is their a mirror for this. I need the mac version but the link is blocked/won't load. Thanks

Anonymous

March 23, 2013

Permalink

Please help me verify the signature of this package. I can verify all other tor signatures except for tor-pluggable-transports-browser-gnu-linux-x86_64-2.4.11-alpha-1-dev-en-US.tar.gz.asc. The reason given by GPG is that there are multiple signatures. How can I import and verify multiple signatures? Also there is no mention of who signs for this and other obfsproxy packages in the signature page at https://www.torproject.org/docs/verifying-signatures.html.en

Anonymous

April 13, 2013

Permalink

"There is a security update available for the Tor Browser Bundle"
This is what I see with this bundle as with the Tor itself but I do not know how to upgrade because there is no update for this specific bundle.

Anonymous

April 13, 2013

Permalink

There is a security update available for the Tor Browser Bundle. This is what I see on open but I cannot update bundle with the other one. I think you should update this bundle too in order to not be confused

Anonymous

April 17, 2013

Permalink

downloaded and installed Tor browser bundle and then the Obfsproxy on windows 7, desktop Dell company computer 5 days ago. Network provider firewall and company Sonic wall in copany Cisco router were bypassed and was able to surf the net and open all sites. Thank you. Middle east.

Anonymous

April 17, 2013

Permalink

installed the Tor browser and the Obfsproxy on Dell desktop Windows 7 company computer. It bypassed the network provider firewall and the company's Sonic wall in Cisco router, and was able to open all sites anonymously. Thank you. Middle east