On 22 Jun 2018, at 17:45, Arturo Filastò <art@torproject.org> wrote:

On 21 June 2018 at 20:11:45, Roger Dingledine (arma@mit.edu) wrote:
I've been working with a person in #tor for the past few days, to
try various configurations. My current best guess is that cantv is
blocking by IP address only, and not doing DPI. It is blocking many of
the public relay IP addresses, and it is blocking the default (built
in to Tor Browser) obfs4 bridges. But obfs4 bridges from bridgedb work,
and also vanilla bridges from bridgedb work.

That means it would be worthwhile for the OONI folks to do TCP
reachability checks of all of the IP:ports for the Tor fallbackdir list.
 

We currently test the set of default dir auths, but I don’t think we test the fallbackdir list.

Here's the ticket:
https://github.com/OpenObservatory/ooni-resources/issues/11

Here is the list of Tor related addresses we currently check for:

https://github.com/OpenObservatory/ooni-resources/blob/master/bridge_reachability/tor-bridges-ip-port.csv

A pull request with the fallback dirs (or even just a email diff) would be gladly merged!

If you like working with text files, here is the current list of fallbacks:
https://gitweb.torproject.org/tor.git/tree/src/or/fallback_dirs.inc

If you like python, here is the stem API for the fallback list:
https://stem.torproject.org/api/directory.html#stem.directory.Fallback

T