[tor-relays] Dropping packets with TCP MSS=1400 to foil GFW active probing

teor teor at riseup.net
Wed Aug 22 01:18:48 UTC 2018


> On 22 Aug 2018, at 02:16, Nathaniel Suchy <me at lunorian.is> wrote:
> 
> Couldn't I firewall the non-obfs port so only looback addresses may access it?

For a private or hard-coded bridge, you can firewall your ORPort and set:
AssumeReachable 1

Public BridgeDB bridges need an ORPort to pass bridge authority reachability checks.

T

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20180822/131a100a/attachment.sig>


More information about the tor-relays mailing list