Skip to content

Instantly share code, notes, and snippets.

@tzarskyz
Created July 2, 2013 20:49
Show Gist options
  • Save tzarskyz/5912970 to your computer and use it in GitHub Desktop.
Save tzarskyz/5912970 to your computer and use it in GitHub Desktop.
# Dependencies:
sudo yum install autoconf automake gcc git make openssl-devel pkgconfig
# Libevent2:
wget https://github.com/downloads/libevent/libevent/libevent-2.0.16-stable.tar.gz
tar xf libevent-2.0.16-stable.tar.gz
cd libevent-2.0.16-stable
./configure
make
sudo make install
cd ..
# Obsproxy:
git clone https://git.torproject.org/obfsproxy.git
cd obfsproxy
export libevent_CFLAGS=-I/usr/local/include
export libevent_LIBS="-L/usr/local/lib -levent"
./autogen.sh
./configure
make
sudo make install
cd ..
# Tor:
wget https://www.torproject.org/dist/tor-0.2.3.11-alpha.tar.gz
tar xf tor-0.2.3.11-alpha.tar.gz
cd tor-0.2.3.11-alpha
./configure --with-libevent-dir=/usr/local
make
sudo make install
cd ..
# Get a basic configuration file for tor:
sudo cp /usr/local/etc/tor/torrc.sample /usr/local/etc/tor/torrc
# You might need to prepend LD_LIBRARY_PATH=/usr/local/lib to tor and obfsproxy commands
# Setup Tor as a bridge: https://www.torproject.org/docs/bridges.html.en#RunningABridge
# Start obfsproxy in stand-alone mode with obfsproxy obfs2 --dest=127.0.0.1:9001 server 0.0.0.0:1051.
# 9001 is the bridge port configured in tor and 1051 is the port which will accepted obfuscated connections.
# I think that a random listening port is chosen by obfsproxy in managed mode, so you might want to change 1051.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment