juckiuscaesar@xxxxxx wrote:
Hey,I live in Iran. Can't disclose my ISP because one person using Tor was sent to jail recently even though he did nothing wrong.For all Bridge Admins: You can turn change iat-mode with this config entry in your torrc: ServerTransportOptions obfs4 iat-mode=2 Good Luck.
Hello, Wasn't that iat-mode can be used either at one side either at both sides?E.g. if you use only at your side (client) iat-mode=2 but the bridge runs with iat-mode=0, then only your client will inject traffic but it might still be enough to bypass the filters of the censor.
Of course if both sides (client and bridge) use iat-mode=2 both sides contribute and offering a higher degree of obfuscation, but still, worth trying with just client set to iat-mode=2 and bridge set to iat-mode=0 just so we know here.
So, could you please get an obfs4 bridge from the usual location (bridges.torproject.org) that has a iat-mode=0 (like tha majority of course) and run it in your client with an overwritten iat-mode=2 setting, then tell us if it connects to Tor? This will let us know how helpful the current iat-mode=0 obfs4 bridges are for Iran.
I am spinning 10 new bridges within 24 hours with obfs4, ipv6, low ports and iat-mode=2 natively for Iran anyway, just because you mailed us, but still if you could try what I suggested and let us know it would be great.
Thank you, stay safe!
Attachment:
OpenPGP_signature
Description: OpenPGP digital signature
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays