[tor-bugs] #8462 [Analysis]: Why don't .ir bridge users fall off when Tor gets censored by DPI?

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Mar 13 08:02:57 UTC 2013


#8462: Why don't .ir bridge users fall off when Tor gets censored by DPI?
----------------------+-----------------------------------------------------
 Reporter:  arma      |          Owner:     
     Type:  defect    |         Status:  new
 Priority:  normal    |      Milestone:     
Component:  Analysis  |        Version:     
 Keywords:            |         Parent:     
   Points:            |   Actualpoints:     
----------------------+-----------------------------------------------------

Comment(by karsten):

 The bridge graphs are still based on the old bridge user counting
 algorithm.  That means we simply show the sum of all unique connecting IP
 addresses over 24 hours.  My guess is that we either count IPs even if the
 SSL handshake doesn't finish, or that we also count IPs of connections to
 the unencrypted Dir port.  The new bridge user counting algorithm would
 probably show the same pattern as the direct user graphs.  Somebody should
 implement it.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8462#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list