[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Better bridge management for clients
- To: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Subject: Re: [tor-talk] Better bridge management for clients
- From: Georg Koppen <gk@xxxxxxxxxxxxxx>
- Date: Fri, 18 May 2018 16:40:00 +0000
- Autocrypt: addr=gk@xxxxxxxxxxxxxx; prefer-encrypt=mutual; keydata= xsFNBFH3/woBEADHs/Q4t69Vm+mNMW0vH0Ms6HtjpzBsto/yyDAoLitmAxfMIeCuWuyuBdHR krdq9Rk5WQLYtP9eROGkuABK/UaxpLw8zkwkmqbxQ2wxytVwgonOmAFPXvPjzVy+ToJvKWJj tRGFoWwO9OEZ8q6xhVnwLUJXRQF01/XhBhU2RPzzUTHrgiY2bi6Ko34nSM8qAuidykqd/elI wE+kn4+TZ+yBC7pzwUfRK0bOqc05qtq5ooH7rYGpvdOkt9DuoFEjhLrBaL3UiP5J6D9W1Ltv 7Y239RGZyGr0wO5ClhuJwipnw6yWDt493cw4fOy7J1Lbo8dZyU4pnFIgt1Cu506/CvdQ53pR UHhCSIS/IyOiEL9PI/PPByG9UhwNQYk9U22h4MalPwa+4rZ1XA6mf5+T4QQRmghAnegPwyQw qnQzHc2ZPAal+Ill15AncyfIeMfuCLyA/TVWwQTQMzdcVwu3nljBfGOjOSTHOafBqsVlvgEo R9GB9OaTbriP7lCDJmBsgFFZ5F0m6us2pP72TpM0GMYCae7PHk7POhvcE5VJg03E3tjyQUQA zt5ZcpzjZtbcWIoYjxEJMq1Wzj0PYfZYFYZGq2lQx7xJ54gb+RlXEaKiXhDQH+EkrKZHBDWi atMbfkMWiknmn8O7VkuT4LOHsF1I9oJt1VTZ0dx2MVvk2hhs3QARAQABzSBHZW9yZyBLb3Bw ZW4gPGdrQHRvcnByb2plY3Qub3JnPsLBegQTAQgAJAIbAwULCQgHAwUVCgkICwUWAwIBAAIe AQIXgAUCUuzzUQIZAQAKCRCUNzqpS3wyI694D/90P74XiDzioGbNEH37W9P5G6unLUKp/zLf 5Ifosf6ijS5EvhKXpSXAqWu4eSpUh+i72Kr53SvzAIggWjUM61e92xt0bg4+VFaguMh6d9l0 MpDMfRJB+qoRNaDDyGk1VH9ZLBJOpTY59HcIIyg2LIMt1PHk+3npr0MnDfh/5fgyPvFRv9ZK WkKdwD4ImlqGXaxsES2pPk8tn21k7J4N8jzRAYM8oV9cMeeCbMgERilU2sRxNORs55zV6GiD A68lmwY6+OHjaKd0k+Oibs63PrTl1+P4EYBZTlXK9gSSWKiUydVP+2lQoyGVmuH0VpepEcnv zu06g+YU4TiH3f7t1chknGlEm1s872nyZo7Nd+zVDcIa4iklBMpeEsPDB6zRT7KBH+oCw5vK G+Ngjv3AO8hD2RTFHw8oAD8WPBbrOB2C9qSha/XSl7rjxTpqRillP+543xhQncC3b2x+Vk4C wlJdrjOvweMnM4xCEeg03WUeRz6a4Uuh6A9x4WZia+5Y5PrKG4GKPeBbskFdw6N0/10Gk1nF wpS42esKsrvqeltRLPzwFj0FEO+mole3y2f+iR8rJd/rik7AW9PM2YkhiF8kmcyh07GSjcCo qg7AkOJ87Bv2knZ0KYlukY5wBKK/DY55GTLGQ7w6kR/BzMOlKnru1e0+zvyZ4KijODEuaUi1 2c7BTQRZtjOTARAA6shR5ZXE/QxgtGHHckRcFH7scCHe1eCAfVIkbafQcFyaYWrhhZY8aXGl UlqGJkZCRAwFAr6cDYZSZrT066+SYr8qUftmE/LdY8Q6/Jhrbsscmuwz8YDcCewlMn9U6OYr yMQdNIpLbPjS9npCpYK68+XvbqMBEM6afKla6lXzYWmYxaO3jyH3CsOBujeMgF/StS+QM8vr ydDliuvs8i75oHaibCt/DVSwfGAhb7dvoKo613xKwzpyJCAi8NaK6UaxNSJ7lbt+klr6J7KC fpHTeMU9SHzEwkalbOWXKZ3SLvN80TKyJQSXBIxRUrTWmshmKvm0xID7xlZceRe0yJJky40B YxnSCTQ6KzUTzuXJTTe19fpISgqud/54KbtpT9RrgeA+amgM8hjKCalZYzuede6kzi4j1qmd QDoBbvMFUvW6s9ibET1NP6WTdF+d2PT83XozFVQD9Se+bxiT/Qy+jqjKj7B8I5SSD560pqZv 5l5SvQuw4jiRBoa5z6dzvFL4l4wTwZM7nvrBibz1yWr6EnX74+Yv28AP0fYRyERvnqsAwJYX m/1zeBTntiGCyatacsiEluVmfxGuLyJSto95IPrh14nFhEox1cgTHsPYMnBv0/jRgesy1lX4 OSXGLAiYDkHPRT/MYJ2TQOK+/LxBYUMGryc8FTBWby/d53Pk3jsAEQEAAcLBfAQYAQoAJhYh BDXNdMJKmxWhnhqBoZQ3OqlLfDIjBQJZtjOTAhsMBQkB4TOAAAoJEJQ3OqlLfDIjinEQAMDD Mv7rpIWoscsxF62NOG2wWpKl2z5fgkxbflnyOCfFHkjPeOT1eaFY200DuDEZYVRJfjb0/LcE NpTLS2GPiO3ncpYiZJ3Lq1k5vOn1doGur4DxJsakKzir8TehtwILxmnc1Lk+sLFFbo0vki0X sYixFhzohtMeFEAwF2NJ9ExT76ODhXoZcRxeqKid43XIgAwad4ihSS1GpdyUgXezK2u8ihIE CjuiznYLUmHF6Akz3eoJLENUl2DfJOMjv+w14kN5SDtqIIVeAT7v7bdQy5kDnsbE91Z91XWn K8TxTaZ5/3WsS9Y5p0RWtCO4VCLmGsbps1948Gttes7pCJ3kmFS+ksJ+Z2cGmYIcmL8vntUr utywRyEq2mOvQCBPuO12/o4EMJVurLOvyTDhqOCB5A5UyPp91tG4+JkcE6B2sJE3RPXhP7y8 xG3Vx/QIyyl9J/u01Qp8a9zQWRpXNmNL5230zcnM+xTKO+jSocXj3ERWKS1+CjGUfEykcmX4 D7P3OG/nul/MhpphMLKf8YP9nJITsy6niERlKfiruohpnUE9wFz7MW8QfVPyJldwxrwU9iud IRcWjWbqk1T9DCNRvl1uzpz/sGnOr/FM4cPRvUzKQ+KksfzRS56hSmS57x8loHCuAjAdLxrU vs1wl6OXI3f5RPfIwop5UfEaQG/B3hnb
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Fri, 18 May 2018 12:41:01 -0400
- In-reply-to: <b8953c4a-ef09-f5cc-8643-3fbbff8908da@getbackinthe.kitchen>
- List-archive: <http://lists.torproject.org/pipermail/tor-talk/>
- List-help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
- List-id: "all discussion about theory, design, and development of Onion Routing" <tor-talk.lists.torproject.org>
- List-post: <mailto:tor-talk@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
- Openpgp: preference=signencrypt
- References: <b8953c4a-ef09-f5cc-8643-3fbbff8908da@getbackinthe.kitchen>
- Reply-to: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-talk" <tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx>
CarlSpackler@getbackinthe.kitchen:
> When using bridges on a daily basis, how may I know which
> work and which don't? (Say for example you added multiple
> bridge lines and not simply one bridge)
>
> It would be nice to add to the GUI some color coded buttons,
> like "green" for "working bridge" and "red" for "bridge
> is no longer usable" and the user is either given the option
> to tick a box and remove the non functioning bridges with the
> red color beside them or have them pruned automatically before
> all is said and done. An option to save (overwrite) the user's saved
> list of bridges with only working bridges would be nice.
>
> In addition to this being a healthy way of managing bridges
> for clients, it would prevent users from hammering away
> at IPs where bridges are down, IPs may be dynamic, and some
> poor fool obtaining an IP formerly used as a Tor Bridge and
> wondering why he's seeing all of this incoming traffic!
>
> Now there may be some internal way of Tor checking this
> but it does no good to the Tor client user if he is reusing
> the same set of bridges every day, with no apparent feedback
> to which are good and which are no longer up.
>
I think I agree with the general idea and that it would be a benefit to
have some kind of differntiation between "bridge is working right now"
and "bridge is not working right now".
However, I wonder how we (say Tor Browser) should measure that safely
and make sure that it is actually the bridge that is down (maybe there
was just an upstream issue at that time). Or do you mean the latter does
not really matter to users anyway and as long as bridges are not
reachable for whatever reason they should be treated as down? Moreover,
once bridges are marked as down I am not convinced yet we should just
discard them. Bridges are scarce and it might be just a short time the
bridge was/is actually not reachable/down.
An other option could be to incorporate external measurement data but
that comes with the price of enhanced complexity making sure that all
users have up-to-date data about bridge reachability readily available.
And even that is error-prone because even though that external
measurement might indidicate a bridge is down/up that might not match
the experience an individual user has.
So, hrm,
Georg
Attachment:
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk