[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Bridge clients don't *really* update dynamic bridge IPs from fingerprints?



It may be partially related, in that I've seen it take weeks to gradually gain a new set of clients after an IP change, which is why I think it's so important to not be abandoning all your clients each time but instead let them update their bridge entries to your new address. If you've been up for 2 months and changed your IP in the middle, you probably cut off and abandoned all your clients after a month just when you were starting to get somewhat known, and had to start over from scratch and are just now beginning to build up a fresh client list again. If you typically get a new IP address every month, you may never be able to build up enough clients to see much traffic with the way things currently seem to work.

And of course there's a large random factor in just which clients you end up being handed out to. If you end up with mostly just people doing a little web email once in a while, they won't add up to much traffic. I like to watch my bridge's status page on globe.torproject.org to see the traffic history and number of connected clients history graphs, and also the Vidalia "Who has used my bridge?" status (or the bridge-stats file in your bridge's data directory) to get more detailed feedback than just the total bandwidth used.

But another issue may be the random luck of the draw of which bridge assignment pool you end up being placed in. As I understand it, to make it harder for threats to find all the bridges and censor them, the bridges are partitioned off into pools which are only assigned to limited subsets of clients via particular distribution methods and client IP address ranges, so that no threat source can find out about bridges outside of the pool they're allowed to pull from. So if your bridge ends up placed in a pool that just doesn't have many clients using it, your info will be handed out that much less often. In the worst case (from the bridge provider's point of view anyway), I believe some bridges are simply held in reserve for emergency use, such as when a common obfuscation plugin becomes censored, so that there's a ready supply of previously unused and therefore uncensored bridges to hand out once Tor figures out how to avoid the new attack method. That's good for the network of course, but I'm afraid it's not very satisfying for the eager bridge provider who's basically left on the bench as a backup in case a first string player gets injured. I suspect there's a lot of churn in that pool as people feel useless and quit bothering to provide the unused bridge. For what it's worth, the globe status page will also show you what pool your bridge has been placed in, which may help reassure (or confirm :( ) that worry.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays