[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #22871 [Obfuscation/BridgeDB]: Implement backend for moat
#22871: Implement backend for moat
----------------------------------------+----------------------
Reporter: isis | Owner: isis
Type: enhancement | Status: new
Priority: High | Milestone:
Component: Obfuscation/BridgeDB | Version:
Severity: Normal | Resolution:
Keywords: SponsorM, bridgedb-captcha | Actual Points:
Parent ID: | Points: 3
Reviewer: | Sponsor:
----------------------------------------+----------------------
Comment (by isis):
Replying to [comment:4 iry]:
> Hi isis!
>
> I am posting the reply in this ticket since it seems to be more related
to the topic:
>
> isis:
> >This API won't be publicly accessible though, it'll be reachable
through the API for #22871, and even then it's only reachable through a
special meek reflector as part of #16650.
> I love the idea to "Set up domain fronting for BridgeDB:. The benefits
are huge as described in #16650.
>
> However, meek has not been supported neither by Whonix nor by Tails so
far. It is very likely because meek has not been packaged in to Debian as
a standalone client because of its increasingly high-coupling with TBB:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764007
That makes sense, although it's unfortunate. There is a `meek-client`
program included in meek, however, as I understand it, the TLS is more
fingerprintable which is why dcf went the route of instrumenting a
browser. It would be better to ask dcf about this.
I also just remembered that you actually ''can't'' do a `POST /meek/*` to
BridgeDB unless you go through the meek reflector, because of the way the
TLS termination is handled. Also FYI, this distributor relies on getting
the client's IP address in an `X-Forwarded-For` header from the meek
reflector. We could consider setting up the same moat API as its own
separate distributor for clients which can't use meek, but that should be
a new ticket. (Also, I'd prefer that they be separate distributors, since
there's a possibility that we may need to allocate differently, or treat
different automated bridge distribution clients differently, e.g.
different rate limiting, in the future.)
> I will also ask Tails about why meek is not available in Tails, given
that Tails does ship a Tor Browser (unlike Whonix-gateway).
Thanks! I'd be curious to hear why.
> > Is anon-connection-wizard what Tails uses now? I'd be happy to support
Tails as well (but I'd strongly prefer the connection to go through the
meek reflector).
>
> anon-connection-wizard has not been used by Tails so far. But some quick
and dirty test on integrating anon-connection-wizard has been done by
anonym from Tails. Some details can be found here:
> https://mailman.boum.org/pipermail/tails-dev/2017-September/011638.html
That's great! Is it being considered because Firefox is removing support
for extensions? (Wasn't Tails doing something special to run Tor Launcher
as a desktop app?)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/22871#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs