Adding possable GSoC obfsproxy projects
Damian Johnson

Damian Johnson commited on 2012-03-01 17:54:05
Zeige 1 geänderte Dateien mit 86 Einfügungen und 0 Löschungen.


Project ideas provided by George (I made a few minor tweaks so it would be more
fitting with the current listing).


... ...
@@ -469,6 +469,13 @@ meetings around the world.</li>
469 469
     block Tor.
470 470
     </p>
471 471
     
472
+    <p>
473
+    <b>Project Ideas:</b><br />
474
+    <i><a href="#obfsproxy-new-transports">New and innovative pluggable transports</a></i><br />
475
+    <i><a href="#obfsproxy-scanning-measures">Defensive bridge active scanning measures</a></i><br />
476
+    <i><a href="#obfsproxy-fuzzer">Fuzzer for the Tor protocol</a></i>
477
+    </p>
478
+    
472 479
     <a id="project-thandy"></a>
473 480
     <h3>Thandy (<a
474 481
     href="https://gitweb.torproject.org/thandy.git">code</a>)</h3>
... ...
@@ -763,6 +770,54 @@ meetings around the world.</li>
763 770
     on this so far.</p>
764 771
     </li>
765 772
     
773
+    <a id="obfsproxy-new-transports"></a>
774
+    <li>
775
+    <b>New and innovative pluggable transports</b>
776
+    <br>
777
+    Priority: <i>High</i>
778
+    <br>
779
+    Effort Level: <i>High</i>
780
+    <br>
781
+    Skill Level: <i>High</i>
782
+    <br>
783
+    Likely Mentors: <i>asn</i>
784
+    <p>Not-very-smart transports like ROT13 and base64 are nice but not super
785
+    interesting. Other ideas like bittorrent transports might be relevant,
786
+    but you will have to provide security proofs on why they are harder to
787
+    detect and block than other less-sophisticated transports.</p>
788
+    
789
+    <p>The whole point of this project, though, is to come up with new
790
+    transports that we haven't already thought of. Be creative.</p>
791
+    
792
+    <p>Bonus points if your idea is interesting and still implementable
793
+    through the summer period.</p>
794
+    
795
+    <p>More bonus points if it's implemented on top of obfsproxy, or if your
796
+    implementation has a pluggable transport interface on top of it (as
797
+    specified <a href="https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/180-pluggable-transport.txt">here</a>).</p>
798
+    </li>
799
+    
800
+    <a id="obfsproxy-scanning-measures"></a>
801
+    <li>
802
+    <b>Defensive bridge active scanning measures</b>
803
+    <br>
804
+    Priority: <i>High</i>
805
+    <br>
806
+    Effort Level: <i>High</i>
807
+    <br>
808
+    Skill Level: <i>High</i>
809
+    <br>
810
+    Likely Mentors: <i>asn</i>
811
+    <p>Involves providing good answers to <a
812
+    href="https://lists.torproject.org/pipermail/tor-dev/2011-November/003073.html">this
813
+    thread</a> as well as concrete implementation plans for it.</p>
814
+    
815
+    <p>This also involves implementing proposals <a
816
+    href="https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/189-authorize-cell.txt">189</a>
817
+    and <a
818
+    href="https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/190-shared-secret-bridge-authorization.txt">190</a>.</p>
819
+    </li>
820
+    
766 821
     <a id="orbot-userInterface"></a>
767 822
     <li>
768 823
     <b>Build a better user interface for Orbot</b>
... ...
@@ -1341,6 +1396,37 @@ meetings around the world.</li>
1341 1396
     </p>
1342 1397
     </li>
1343 1398
     
1399
+    <a id="obfsproxy-fuzzer"></a>
1400
+    <li>
1401
+    <b>Fuzzer for the Tor protocol</b>
1402
+    <br>
1403
+    Priority: <i>Low to Medium</i>
1404
+    <br>
1405
+    Effort Level: <i>Medium to High</i>
1406
+    <br>
1407
+    Skill Level: <i>High</i>
1408
+    <br>
1409
+    Likely Mentors: <i>asn</i>
1410
+    <p>Involves researching good and smart ways to fuzz stateful network
1411
+    protocols, and also implementing the fuzzer.</p>
1412
+    
1413
+    <p>We are mostly looking for a fuzzer that fuzzes the Tor protocol
1414
+    itself, and not the Tor directory protocol.</p>
1415
+    
1416
+    <p>Bonus points if it's extremely modular. Relevant research:</p>
1417
+    
1418
+    <ul>
1419
+      <li>PROTOS - Security Testing of Protocol Implementations</li>
1420
+      <li>INTERSTATE: A Stateful Protocol Fuzzer for SIP</li>
1421
+      <li>Detecting Communication Protocol Security Flaws by Formal Fuzz
1422
+      Testing and Machine Learning</li>
1423
+      <li>SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZE</li>
1424
+      <li>Michal Zalewski's &quot;bugger&quot;</li>
1425
+      <li>Also look at the concepts of &quot;model checking&quot; and
1426
+      &quot;symbolic execution&quot; to get inspired.</li>
1427
+    </ul>
1428
+    </li>
1429
+    
1344 1430
     <!--
1345 1431
     <a id="armGui"></a>
1346 1432
     <li>
1347 1433