After the suggestion to remove #19714 (closed), dgoulet offered an obfs4 bridge as a default TB obfs4 bridge. The other obfs4 bridge operators have told me their bridges are saturated, so, provided that dgoulet's bridge can provide bandwidth similar to the others (see #18113 (moved) for how the round robining doesn't yet take bandwidth into account) then I propose we add it.
@dgoulet Could we get the bridge line for it privately (so that dcf can continue to run tests on how things are blocked)? Or, if you feel like it, you can patch it into Bundle-Data/PTConfigs/bridge_prefs.js in the tor-browser-bundle repo, and give one of the TB team the patch.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
@dcf, should I attach the diff on this ticket or should I give it to the TBB team? Asking so I don't reveal the bridge before being merged and thus adding a chance to "break" your testing?
@dcf, should I attach the diff on this ticket or should I give it to the TBB team? Asking so I don't reveal the bridge before being merged and thus adding a chance to "break" your testing?
Also, I'm not sure if TvdW emailed you, but I have details for a second bridge to go along with dgoulet's. Please tell me how/who to give it to, in keeping with the experiments.
@dcf, should I attach the diff on this ticket or should I give it to the TBB team? Asking so I don't reveal the bridge before being merged and thus adding a chance to "break" your testing?
Also, I'm not sure if TvdW emailed you, but I have details for a second bridge to go along with dgoulet's. Please tell me how/who to give it to, in keeping with the experiments.
I guess send the bridge line to by encrypted email. We can start measuring it in advance. We might ask to preemptively forward some alternate ports in order to be able to change quickly if we have to.
Update on where we're at with this: I want to send a summary of what we're doing to the new Tor Research Safety Board to get feedback on alternatives for using these bridges.
We just attached the patch which adds David Goulet's bridge, Lisbeth. NX01 is currently commented out (intentionally) and we just asked tvdw to check it since we could not fully bootstrap to it. Don't merge this just yet until we hear back from tvdw that NX01 is working :)
Alright, I applied the patch to master, maint-6.0 and hardened-builds (commit 7e0acfc779d22d5e4a1c5efdca9c75f082021f67, 585e546d589a89366a41ea54f268e703cdf89481, and 84cf9fff2adaf61e94c6f90e7e0c2ff3b04f7279).
Trac: Status: needs_information to closed Resolution: N/Ato fixed
So after rebooting my server, the bridge stopped working and I realized after investigation that for some still unknown reason to me, it regenerated new keys.... changing the bridge line of course. I've since then restarted multiple time the machine and the daemon resulting in the bridge not regenerating again so it should be good.
Here is the new value (signed with my known GPG key):
Thanks. Applied the patch to master, maint-6.0 and hardened-builds (commits 6f0f3056e1cc896ee56ff03d5e306a672b17b75a, 08da98bfd734581660db11e0cc599a5a362fdccf and 0194cfb1ce4019d9d34ac3fa32a05ae242bd4c55).
Trac: Status: reopened to closed Resolution: N/Ato fixed