-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 What type of server?Systems details needed. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQEcBAEBAgAGBQJRiTQDAAoJEHJ6fv5JwWqhTBAH/3mwGm0NQFlO5W8o8cFR9NKO L/U1knFMUWgP1fRXx6bEYUkv9ZAMbcH0skzdWk+nr9ojij7oAY1rsUf33b/dUBmK K1dNtSAQKWzr1GAOnnciaqzItwQbqTKBUeMvpHhQmFddLBxQVjf0jU9ZH2pYAfIj vWIyQ6yFEm2+pWGdaJ/dkqlRlfpHsxqO+q+DMcvrOsrbULL2DuB/8WZkdms1UmyH r8glZiyhhtSXZ3TETYvJdqUGhGL8O9v5ResG2OxFadG0FosyLGO7ivJbN54Mg2HB Y7Dl/sE9+ctnTBDlT5HJ+QcfOLIhipMrdEsh3656+sYXMbA2CyvYOM3W6zatfU8= =PdBC -----END PGP SIGNATURE-----
On Tue, May 7, 2013 at 12:58 PM, John Crick <[email protected]> wrote: > I want to run pyobfsproxy standalone on my server to obfuscate ssh > traffic. It works without --ext-cookie-file, but it'll also be visible > to the supervisor. > > So I want --ext-cookie-file to be enabled, it works on the server > side, but how to config it on the client side? > > In my opinion, ext-cookie-file is a 64 bytes random data, am I right? > _______________________________________________ > tor-talk mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
