[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
problem with bridges and a suggestion
- To: tor-relays@xxxxxxxxxxxxx
- Subject: problem with bridges and a suggestion
- From: t f <for.tor.bridge@xxxxxxxxx>
- Date: Tue, 25 May 2010 17:23:18 +0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: tor-relays-outgoing@xxxxxxxx
- Delivered-to: tor-relays@xxxxxxxx
- Delivery-date: Tue, 25 May 2010 05:31:07 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:date:message-id :subject:from:to:content-type:content-transfer-encoding; bh=Kfach+wYocgQgdefPtKvBeeZo9FMPOLjaU2T89JDUNU=; b=fVjkdl8jjIUUjbjTqL5mYLoaEscpMfX+towqKFf+YM0BFtWkyyCd3bANyQnf58+sYk NWWU5vvTN8t4+qoGvyO4lfN/nzzMzWe/eSrb0wsYh/XLnxU5IYamGEak0XM0mzG1uxO5 hU3Coef78hk9ZbNg+UaVkYNQuNbOqvCbwQnIM=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type :content-transfer-encoding; b=dx6GFxo8i/6EsvaZrM1e05oNLP2tG+Aec3RhfslYIRJsWat4zFEnq8Hz24Ujh6lF58 Gg7lnU6nyzkBl47iSxyDHKLvdzJQtHacTpWARgzK1jHcU1loRairTNPjPW2EcSogF2qc /vAzOOQT3nLtWePj6vEWSr4TCKOt6M686JoFk=
- Reply-to: tor-relays@xxxxxxxxxxxxxx
- Sender: owner-tor-relays@xxxxxxxxxxxxxx
dear friends,
problem:
china is blocking TOR more and more strict,
I can't establish a TOR circuit even I updated bridges in config file
of torrc with info retrieved from https://bridges.torproject.org and
email replies from bridges@xxxxxxxxxxxxxxx
this morning, I got some new bridges through a hidden https proxy and
established a TOR circuit, but after some time, I lost the connection
and couldn't establish a TOR circuit any more.
from my knowledge to china's blocking methods, I believe they found my
newly got bridges through network traffic protocol analysis, and
blocked them.
so my suggestion is:
1.
use a general protocol for TOR clients to interact with bridges, so
that they can't distinguish the traffic between TOR clients and
bridges,
so that they can't find new bridges got through private ways.
2.
the general protocol could be https which is encryption protected;
the general protocol could be plain http, if you can encode its
content dynamically and privately, and don't make it display any
fingerprints.
by the way, I'm not a native english speaker, please pardon my awkward english.
sincerely
frank