[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #19487 [Obfuscation/meek]: Meek and ReachableAddresses
#19487: Meek and ReachableAddresses
----------------------------------+-----------------
Reporter: cypherpunks | Owner: dcf
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Obfuscation/meek | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
----------------------------------+-----------------
This came to my attention through an old StackExchange ticket that the
Community accound had bumped: http://tor.stackexchange.com/q/9500
The user appears to have setup some combination of
`ReachableAddresses`,`FirewallPorts`, and `FascistFirewall`. While the
ports they can reach might be set correctly, when using `meek` `tor` sees
the destination address as a fake destination. You end up with a log that
looks like this:
{{{
NOTICE: Bridge at '0.0.2.0:1' isn't reachable by our firewall policy.
Skipping.
}}}
This happens because they haven't defined `0.0.2.0:1` as being a reachable
address, while in reality it's using (most likely) port 443 on some CDN,
which might actually be defined reachable.
Maybe not a common issue but an interesting edge case that may be
clarified, avoided, or documented somewhere.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19487>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs