[tor-dev] Internet-wide scanning for bridges
    Sebastian Hahn 
    sebastian at torproject.org
       
    Wed Dec 17 19:11:43 UTC 2014
    
    
  
Hi there,
On 14 Dec 2014, at 20:06, Vlad Tsyrklevich <vlad at tsyrklevich.net> wrote:
> I'm not against keeping some around, but this warning is unlikely to turn around the thousands that currently match this configuration--hopefully it'll just encourage future bridge operators to use a 'safer' configuration. The obfs4proxy README shows users how to set-up obfs4 running over port 443 which is probably the most desirable option: those users can evade network restrictions without enabling discovery by scanning.
I really dislike warnings unless we absolutely need to have
them, and this imo is in the category of "change the default,
update the docs", especially because just changing the port
is not a real solution in my book.
Cheers
Sebastian
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20141217/15779568/attachment.sig>
    
    
More information about the tor-dev
mailing list