[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Prepping bridges for censorship



Yes, but are all guard and bridge relays configured like this?

 

Maybe this should be a requirement for running a guard or bridge relay for this reason.

 

What does everyone think?

 

From: Matthew Glennon
Sent: Friday, June 22, 2018 5:18 AM
To: tor-relays@xxxxxxxxxxxxxxxxxxxx
Subject: Re: [tor-relays] Prepping bridges for censorship

 

This is the reasoning I go with for using 443/80.

 

On Fri, Jun 22, 2018 at 8:11 AM Martin Kepplinger <martink@xxxxxxxxx> wrote:

Am 21.06.2018 21:48 schrieb Keifer Bly:
> Hi,
>
> So I had a thought. It seems like a lot of the relays run off of
> various port numbers (of course). However if all of the relays and
> bridges are running off of various port numbers (ie 9001, 10000,
> etc.), couldn’t this stop censored users (who’s isp or local firewall
> only allows certain ports like 80 and 443) from being able to connect
> to the tor network even when using bridges due to the port that the
> bridge of guard relay being run on a port number that is blocked by
> the isp or local firewall?
>
> Just a thought.

Sure, just like for guard relays, for bridges it makes sense to
configure
ORPort to be 443 or 80, to be reachable from behind messy firewalls.

                            martin

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

--

Matthew Glennon

matthew@glennon.online

PGP Signing Available Upon Request
https://keybase.io/crazysane

 

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays