You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Sep 1, 2022. It is now read-only.
I have checked that the issue I am reporting can be replicated or that the feature I am suggesting is not present.
I have checked opened or recently closed pull requests for existing solutions/implementations to my issue/suggestion.
Place an X inside the bracket to confirm
I confirm.
Mentioned in #149, we should have a client option to tunnel reseed requests through a SOCKS server. Ideally, we have a SOCKS client that tunnels whatever we want through the server; e.g. all traffic or just NTCP when we implement 'hidden mode/disabled inbound/disabled UDP'.
Non-Tor PT implementation has been discussed in the past but, for the time being, a simple SOCKS client would be of great service; especially for obfsproxy users or anyone who wants to reseed through Tor.
Boost has a classic SOCKS4 client example available and making it 4a would not take much work. SOCKS5 on the other hand will take a little more work; at least to do well. We have a SOCKS server that looks mostly functional and at first glance appears to adhere to spec (but no guarantees) should anyone wish to look at a server implementation for client-related material.
Whether this SOCKS4/4a/5 client is available in libcore and/or libclient is up for debate.
The text was updated successfully, but these errors were encountered:
By submitting this issue, I confirm the following:
Place an X inside the bracket to confirm
Mentioned in #149, we should have a client option to tunnel reseed requests through a SOCKS server. Ideally, we have a SOCKS client that tunnels whatever we want through the server; e.g. all traffic or just NTCP when we implement 'hidden mode/disabled inbound/disabled UDP'.
Non-Tor PT implementation has been discussed in the past but, for the time being, a simple SOCKS client would be of great service; especially for
obfsproxy
users or anyone who wants to reseed through Tor.Boost has a classic SOCKS4 client example available and making it 4a would not take much work. SOCKS5 on the other hand will take a little more work; at least to do well. We have a SOCKS server that looks mostly functional and at first glance appears to adhere to spec (but no guarantees) should anyone wish to look at a server implementation for client-related material.
Whether this SOCKS4/4a/5 client is available in libcore and/or libclient is up for debate.
The text was updated successfully, but these errors were encountered: