I think I'm suppling the ServerTransport parameters incorrectly… the log seems to indicate it is listening on the wrong ports for obfs2 and obfs3.
Since it was the only compiled package I saw for Windows with obfs support, I downloaded the tor-pluggable-transports-browser-2.4.11-alpha-2.
I am using the following .torrc --
Address *obfuscated*
AvoidDiskWrites 1
BridgeRelay 1
LearnCircuitBuildTimeout 0
CircuitBuildTimeout 60
ClientTransportPlugin websocket exec flashproxy-client --register :0 :56833 *[not useful, I realize]*
ContactInfo *obfuscated*
ControlPort 9051
CookieAuthentication 1
DataDirectory *obfuscated*
DirPort 0
DirReqStatistics 0
ExitPolicy reject *:*
GeoIPFile *obfuscated*/geoip
GeoIPv6File *obfuscated*/geoip6
HardwareAccel 1
ServerTransportPlugin obfs2,obfs3 exec pyobfsproxy managed
ServerTransportListenAddr obfs2,obfs3 0.0.0.0:56831 0.0.0.0:56832
Log notice stdout
Nickname *obfuscated*
NumCPUs 4
ORPort 56830
RelayBandwidthBurst 97280
RelayBandwidthRate 71680
SocksListenAddress 127.0.0.1
SocksPort 9050
I get the following log messages on starting Tor:
[Notice] Tor v0.2.4.11-alpha (git-fcd9248387249d68) running on Windows 7 with Libevent 2.0.21-stable and OpenSSL 1.0.0k.
[Notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
[Notice] This version is not a stable Tor release. Expect more bugs than usual.
[Notice] Read configuration file "*obfuscated*\torrc".
[Notice] Opening Socks listener on 127.0.0.1:9050
[Notice] Opening Control listener on 127.0.0.1:9051
[Notice] Opening OR listener on 0.0.0.0:56830
[Notice] Parsing GEOIP IPv4 file *obfuscated*/geoip.
[Notice] Parsing GEOIP IPv6 file *obfuscated*/geoip6.
[Notice] Your Tor server's identity key fingerprint is '*obfuscated* *obfuscated*'
[Notice] We now have enough directory information to build circuits.
[Notice] Bootstrapped 80%: Connecting to the Tor network.
[Notice] New control connection opened.
[Notice] Bootstrapped 85%: Finishing handshake with first hop.
[Notice] Registered server transport 'obfs3' at '0.0.0.0:60093'
[Notice] Registered server transport 'obfs2' at '0.0.0.0:60094'
[Notice] Bootstrapped 90%: Establishing a Tor circuit.
[Notice] Tor has successfully opened a circuit. Looks like client functionality is working.
[Notice] Bootstrapped 100%: Done.
I have ports 56830, 56831, 56832, and 56833 forwarded to this machine from my router/nat.
I get connections on my ORPort 56830 -- though in 2-3 days, not a single client. Seems to be directory exchanges (?) or my own Tor Browser use. Isn't 2-3 days long enough to be discovered?
Looks like it is listening on 60093 and 60094 for obfs3 and obfs2 instead of the intended 56832 and 56831 (the ports I have forwarded) for the purpose.
Any help? Is it just a syntax error on my part (I tried using two lines for the ServerTransportListenAddr but one was automatically deleted after editing in Vidalia), or am I further off-track?
Thanks a bundle :)
Asa