[tor-bugs] #31701 [Circumvention/Obfs4]: Reachability tests for new obfs4 bridges
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Mar 9 16:17:46 UTC 2020
#31701: Reachability tests for new obfs4 bridges
---------------------------------------+--------------------------
Reporter: cohosh | Owner: cohosh
Type: defect | Status: assigned
Priority: Medium | Milestone:
Component: Circumvention/Obfs4 | Version:
Severity: Normal | Resolution:
Keywords: reachability, measurement | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
---------------------------------------+--------------------------
Comment (by cohosh):
Replying to [comment:4 sigvids]:
> > I just re-ran these tests and looks like at least 2 bridges that were
previously unreachable in China are now reachable again.
>
> I have seen some reports saying that the GFW will unblock blocked IP
addresses after a period of time. One report for Outline (i.e.,
Shadowsocks) says unblocking can happen after as little as three days.
However, if you start reusing the server for the same purpose, it will be
blocked again:
>
> https://github.com/Jigsaw-Code/outline-
server/issues/193#issuecomment-405042583
>
> It's possible that this unblocking rule applies also to IP addresses
scraped from web/email/moat.
>
Thanks! This is a useful link. Indeed, blocking seems to be very
intermittent for all of our bridges.
> > So perhaps the block list populated by BridgeDB scraping is not
static.
>
> Are the reachability tests based on a single connection, or on multiple
connections with a realistic volume of traffic? It's possible that the GFW
uses other detection methods in addition to scraping. A thread on Github
suggests that blocking can be triggered by factors that include (1) volume
of traffic, (2) traffic being fully encrypted, (3) very high entropy, and
(4) use of popular VPS locations. The pattern is initially an IP/port ban,
and then if you change ports multiple times, you get a full IP ban:
>
> https://github.com/shadowsocks/shadowsocks-libev/issues/2288
You can see the test script
[https://github.com/cohosh/bridgetest/blob/master/obfs4test here]. This is
run approximately 4x a day from our probe point.
We do download a large(ish) file, but it's possible it doesn't look like
realistic traffic to a censor. As far as blocking based on use or
suspicious traffic patterns, that's possible but as far as we know private
obfs4 bridges are still working in China, which leads us to believe that
they are not blocking based on traffic patterns.
>
> > It also looks like there are some bridges that are no longer reachable
in North America. Might be worth checking into that.
>
> Is it possible that the bridges that are no longer reachable in North
America have been taken offline? I sometimes see complaints by volunteers
that their bridges don't get any traffic. For example:
Yes I suspect it is because the bridges are
misconfigured/unmaintained/down etc.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31701#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list