Yes, but are all guard and bridge relays configured like this?
Maybe this should be a requirement for running a guard or bridge relay for this reason.
What does everyone think?
From: Matthew Glennon
Sent: Friday, June 22, 2018 5:18 AM
To: tor-relays@xxxxxxxxxxxxxxxxxxxx
Subject: Re: [tor-relays] Prepping bridges for censorship_______________________________________________
This is the reasoning I go with for using 443/80.
On Fri, Jun 22, 2018 at 8:11 AM Martin Kepplinger <martink@xxxxxxxxx> wrote:
Am 21.06.2018 21:48 schrieb Keifer Bly:
> Hi,
>
> So I had a thought. It seems like a lot of the relays run off of
> various port numbers (of course). However if all of the relays and
> bridges are running off of various port numbers (ie 9001, 10000,
> etc.), couldn’t this stop censored users (who’s isp or local firewall
> only allows certain ports like 80 and 443) from being able to connect
> to the tor network even when using bridges due to the port that the
> bridge of guard relay being run on a port number that is blocked by
> the isp or local firewall?
>
> Just a thought.
Sure, just like for guard relays, for bridges it makes sense to
configure
ORPort to be 443 or 80, to be reachable from behind messy firewalls.
martin
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays--
Matthew Glennon
matthew@glennon.online
PGP Signing Available Upon Request
https://keybase.io/crazysane
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays