On Tuesday, January 25, 2022 11:29:31 PM CET juckiuscaesar@xxxxxx wrote: > Yes is true, but this does not work, I think they use DPI devices and if > obfs4 / underlying Tor signature is detected, a permanent block for that > bridge is added to firewall rules. I tried this many times, only when both > side have iat-mode=1 or 2, it is undetected. > > If one side has iat-mode=0, internet service provider permanently blocks > access to the subnet of the bridge IP (/24), even ICMP / ping don't work > anymore for all 255 ip's.. it's sad. > > Thank you for hosting bridges, really!! Please make 5 with iat-mode 1 and 5 > with iat-mode 2, just in case one iat-mode get's blocked. Done, 16 days ago. ;-) A few dozen more are coming in 2-3 weeks. > خداحاف -- ╰_╯ Ciao Marco! Debian GNU/Linux It's free software and it gives you freedom!
Attachment:
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays