[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Dropping packets with TCP MSS=1400 to foil GFW active probing



> On 22 Aug 2018, at 02:16, Nathaniel Suchy <me@xxxxxxxxxxx> wrote:
> 
> Couldn't I firewall the non-obfs port so only looback addresses may access it?

For a private or hard-coded bridge, you can firewall your ORPort and set:
AssumeReachable 1

Public BridgeDB bridges need an ORPort to pass bridge authority reachability checks.

T

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays