[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #6414 [Ooni]: Automating Bridge Reachability Testing
#6414: Automating Bridge Reachability Testing
--------------------------------------------------------------------------------+
Reporter: isis | Owner: isis
Type: project | Status: accepted
Priority: normal | Milestone:
Component: Ooni | Version:
Keywords: bridge-reachability metrics-db automation testing SponsorF20121101 | Parent:
Points: | Actualpoints:
--------------------------------------------------------------------------------+
Comment(by asn):
Replying to [comment:9 isis]:
> Replying to [comment:4 aagbsn]:
> > Replying to [comment:2 asn]:
> >
> > > b) How many bridges should you test each time? Should we test _all_
bridges, or just a small sample of bridges (with diverse characteristics
(like country, tor version, etc.))?
> >
> > No single measurement point should have a complete view of all the
bridges.
> >
> > How often are bridges being scanned? Hourly? Daily? Weekly? Longer?
> >
>
> For testing the reachability tests, I was assuming that we'd set up our
own bridges. In addition to not risking burning volunteer's bridges, we'd
also have a more controlled setting for getting better data about what's
safe to do from a given country and what isn't (at least for the present).
>
> And, for the general case, once the tests are established, I don't think
unwarranted scanning should be done very often, perhaps once per week or
likely even less. By unwarranted, I mean, "we're not noticing a drastic
drop in connections to bridges from this country, but we're going to scan
from there anyway just as a check."
>
> Also, in the case of unwarranted scanning, I would guess that scanning
about 5 bridges would suffice, but I do not know the statistical
percentage of them likely to be duds to begin with. Do either of you have
any opinions on what would be a good number to scan, that would give us
accurate results, but also be as small and risk averse as possible?
>
I think I would approach this problem by finding some bridge properties
that are interesting from a reachability PoV (tor version, country,
uptime, etc.) and then I would try to compile a diverse list of bridges
wrt those properties.
Finding the right properties and the right amount of bridges will probably
require some tweaking and real life testing.
> > >
> > > c) How much do we care about burning a bridge during reachability
testing?
> >
> > What scenarios do you think could cause a bridge to get burned in a
way that would not also apply to every other bridge being scanned as well?
> >
>
> I'm not sure if I understand this question? Could you please explain
more?
>
Oops, sorry for the confusion. I wanted to ask: how much do we care if a
bridge gets blocked during reachability testing? That is, how much do we
value our bridges?
I think that answering this question will help us tackle many other
questions (including "how many bridges should we test each time?" and
"which tests should we run for each bridge?").
I suspect that the answer to this question is variable and depends on many
factors (like, how many unblocked bridges we have in total, where the
bridge is located, how fast it is, how much usage it sees, etc.).
> > >
> > > f) What about reachability testing on bridges that support pluggable
transports?
> >
> > This is also a necessary component for the Bridge Authority -- bridges
(0.2.4) can spam whatever transport lines they please, and BridgeDB eats
it up and advertises it. For every pluggable transport type, there ought
to be a corresponding reachability test.
>
> I was wondering about this and forgot to add it as a question. Is there
any way to test that an Obfs2 bridge is actually running without compiling
Obfsproxy and controlling an Obfs2-configured Tor client?
>
You can't be 100% sure without running an obfs2-configured Tor client.
I mean, you can run cheap tests like TCP port scans, or checking the
entropy of the data returned by the server, but you will never be sure
that it's obfs2 without speaking the Tor protocol with the bridge.
This pretty-much comes down to #6396.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6414#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs