On 22 Jun 2018, at 17:45, Arturo Filastò art@torproject.org wrote:
On 21 June 2018 at 20:11:45, Roger Dingledine (arma@mit.edu) wrote: I've been working with a person in #tor for the past few days, to try various configurations. My current best guess is that cantv is blocking by IP address only, and not doing DPI. It is blocking many of the public relay IP addresses, and it is blocking the default (built in to Tor Browser) obfs4 bridges. But obfs4 bridges from bridgedb work, and also vanilla bridges from bridgedb work.
That means it would be worthwhile for the OONI folks to do TCP reachability checks of all of the IP:ports for the Tor fallbackdir list.
We currently test the set of default dir auths, but I don’t think we test the fallbackdir list.
Here's the ticket: https://github.com/OpenObservatory/ooni-resources/issues/11
Here is the list of Tor related addresses we currently check for:
https://github.com/OpenObservatory/ooni-resources/blob/master/bridge_reachab...
A pull request with the fallback dirs (or even just a email diff) would be gladly merged!
If you like working with text files, here is the current list of fallbacks: https://gitweb.torproject.org/tor.git/tree/src/or/fallback_dirs.inc
If you like python, here is the stem API for the fallback list: https://stem.torproject.org/api/directory.html#stem.directory.Fallback
T