The OONI probe TCP connect test (run by default from many probes) currently tests the TCP connectivity (successful connection: true/false) of the directory authorities and brigdes.
(Giving it some component, so it doesn't get lost)
Thanks.
Is the work here on the Tor side, or on the OONI side?
It's actually OONI's side, it will be good to find out if the list of fallback dir authorities can be exported in a CSV format as required by the OONI resources input test file: host,port,nickname,protocol
Trac: Description: The OONI probe TCP connect test (run by default from many probes) currently tests the TCP connectivity (successful connection: true/false) of the directory authorities and brigdes.
The OONI probe TCP connect test (run by default from many probes) currently tests the TCP connectivity (successful connection: true/false) of the directory authorities and brigdes.
Terminology note: these are "fallback directories", not "fallback directory authorities".
Thanks for the terminology note, updated the ticket accordingly.
Should this be an Ooni ticket? It doesn't seem to be something we can address in Core Tor...
Perhaps the contents of fallback_dirs.inc should be populated in a format (ticket:25534#comment:2) that can be added directly to ooni-resources repository (reachability input list). Having such a format ensures that we are going to have the input list up to date. Ideally this should also happen to the bridges (at least the ones listed in Tor Browser), directory authorities are not changing that often.
Terminology note: these are "fallback directories", not "fallback directory authorities".
Thanks for the terminology note, updated the ticket accordingly.
Should this be an Ooni ticket? It doesn't seem to be something we can address in Core Tor...
Perhaps the contents of fallback_dirs.inc should be populated in a format (ticket:25534#comment:2) that can be added directly to ooni-resources repository (reachability input list). Having such a format ensures that we are going to have the input list up to date. Ideally this should also happen to the bridges (at least the ones listed in Tor Browser), directory authorities are not changing that often.
The fallback file is currently used by Stem and Metrics (Relay Search). OONI can use it as well.
It should be very easy to parse the IPv4 address, DirPort (HTTP/TCP), and ORPort (TLS/TCP), and the IPv6 address and ORPort (TLS/TCP).
I recommend you use the fingerprint as the "nickname", because fallback nicknames are not guaranteed to be unique.
In future, we will make the authorities file into a separate list (#24854 (moved)), and change the format so it's easy to parse (#24818 (moved)). We also want to change the fallback format so it matches the authority format (#24852 (moved)).
I don't think there is anything that core tor needs to do to make this happen, so I'm closing the ticket.
(Tor Browser's default bridges are maintained by the Tor Browser team. You should probably parse Tor Browser's bridges file as well.)
Trac: Status: new to closed Resolution: N/Ato implemented Parent: N/Ato#24818 (moved)