Would it be bad to just add obfsproxy to our current bridge images for amazon? Then everybody running a bridge image would be accessible as a normal bridge or as an obfsproxy bridge.
Also, then we don't create a new image we have to maintain.
Would it be bad to just add obfsproxy to our current bridge images for amazon? Then everybody running a bridge image would be accessible as a normal bridge or as an obfsproxy bridge.
I don't think it works that way. My understanding is that when someone launches an ‘instance’ of one of our images, Amazon makes a copy of its hard disk image in their account.
Would it be bad to just add obfsproxy to our current bridge images for amazon? Then everybody running a bridge image would be accessible as a normal bridge or as an obfsproxy bridge.
I don't think it works that way. My understanding is that when someone launches an ‘instance’ of one of our images, Amazon makes a copy of its hard disk image in their account.
Sure. Fine. So that hard disk image should include obfsproxy, and the part of the hard disk image that configures what their Tor does should include launching the obfsproxy.
(We will want to change Tor so it advertises its obfsproxy address in, say, its extrainfo desc, if we want bridgedb to be able to learn about the obfsproxy address. That's probably on somebody's roadmap already.)
Building obfsproxy bridge images with Ubuntu isn't as easy as I thought it would be. We currently have more than enough obfsproxy bridge addresses, so I'm going to close with as wontfix and reopen when we do need these images.
Trac: Resolution: N/Ato wontfix Status: new to closed
Looks like we need to include Tor version 0.2.4x-alpha to have the bridges report directly to BridgeDB. Any chance we can have 0.2.4.x-alpha Debian packages?
Trac: Priority: normal to blocker Resolution: wontfix toN/A Status: closed to reopened