[tor-bugs] #32597 [Circumvention/Snowflake]: Hello, currently, in China, Tor Browser 9.5a2 still can't connect to Tor network through snowflake bridge

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Dec 5 19:22:49 UTC 2019


#32597: Hello, currently, in China, Tor Browser 9.5a2 still can't connect to Tor
network through snowflake bridge
-------------------------------------+------------------------
 Reporter:  amiableclarity2011       |          Owner:  (none)
     Type:  defect                   |         Status:  new
 Priority:  Immediate                |      Milestone:
Component:  Circumvention/Snowflake  |        Version:
 Severity:  Normal                   |     Resolution:
 Keywords:                           |  Actual Points:
Parent ID:                           |         Points:
 Reviewer:                           |        Sponsor:
-------------------------------------+------------------------

Comment (by dcf):

 Replying to [comment:7 cohosh]:
 > Replying to [comment:5 amiableclarity2011]:
 > > thank you very much for your help. i really appreciate it.
 > >
 > > but it seems that stun.ekiga.net is not blocked by great firewall
 > >
 > >
 > > {{{
 > > ping stun.ekiga.net
 > > PING stun.ekiga.net (216.93.246.18) 56(84) bytes of data.
 > > }}}
 >
 > > {{{
 > > --- stun.ekiga.net ping statistics ---
 > > 25 packets transmitted, 24 received, 4% packet loss, time 28759ms
 > > rtt min/avg/max/mdev = 222.237/226.342/242.273/4.449 ms
 > > }}}
 > >
 > >
 > >
 > > above is the ping result.
 > Thanks for the information, that matches what I'm seeing on the VPS
 then.

 I suppose it's possible that stun.ekiga.net's IP address could be
 reachable to ICMP echo, but still have its UDP STUN port blocked. Could
 you try one of these commands? The data string is a
 [https://tools.ietf.org/html/rfc5389#section-6 Binding request] that
 should elicit a response.

 {{{
 $ nping -d --udp -p 3478 stun.ekiga.net --data
 000100002112a442aaaaaaaabbbbbbbbcccccccc

 Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-12-05 12:10
 SENT (0.0062s) UDP packet with 20 bytes to stun.ekiga.net:3478
 (216.93.246.18:3478)
 RCVD (0.0914s) UDP packet with 92 bytes from stun.ekiga.net:3478
 (216.93.246.18:3478)
 SENT (1.0076s) UDP packet with 20 bytes to stun.ekiga.net:3478
 (216.93.246.18:3478)
 RCVD (1.0911s) UDP packet with 92 bytes from stun.ekiga.net:3478
 (216.93.246.18:3478)
 SENT (2.0093s) UDP packet with 20 bytes to stun.ekiga.net:3478
 (216.93.246.18:3478)
 RCVD (2.0819s) UDP packet with 92 bytes from stun.ekiga.net:3478
 (216.93.246.18:3478)
 SENT (3.0103s) UDP packet with 20 bytes to stun.ekiga.net:3478
 (216.93.246.18:3478)
 RCVD (3.1011s) UDP packet with 92 bytes from stun.ekiga.net:3478
 (216.93.246.18:3478)
 SENT (4.0123s) UDP packet with 20 bytes to stun.ekiga.net:3478
 (216.93.246.18:3478)
 RCVD (4.1005s) UDP packet with 92 bytes from stun.ekiga.net:3478
 (216.93.246.18:3478)

 Max rtt: 90.767ms | Min rtt: 72.616ms | Avg rtt: 84.077ms
 UDP packets sent: 5 | Rcvd: 5 | Lost: 0 (0.00%)
 Tx time: 4.00710s | Tx bytes/s: 24.96 | Tx pkts/s: 1.25
 Rx time: 4.09550s | Rx bytes/s: 112.32 | Rx pkts/s: 1.22
 Nping done: 1 IP address pinged in 4.10 seconds
 }}}

 {{{
 $ echo 000100002112a442aaaaaaaabbbbbbbbcccccccc | xxd -p -r > payload
 $ sudo /usr/sbin/hping3 -c 5 --udp -p 3478 stun.ekiga.net -d 20 -E payload
 HPING stun.ekiga.net (216.93.246.18): udp mode set, 28 headers + 20 data
 bytes
 len=120 ip=216.93.246.18 ttl=48 DF id=0 seq=0 rtt=83.8 ms
 len=120 ip=216.93.246.18 ttl=48 DF id=0 seq=1 rtt=83.6 ms
 len=120 ip=216.93.246.18 ttl=48 DF id=0 seq=2 rtt=91.5 ms
 len=120 ip=216.93.246.18 ttl=48 DF id=0 seq=3 rtt=87.4 ms

 --- stun.ekiga.net hping statistic ---
 5 packets transmitted, 4 packets received, 20% packet loss
 round-trip min/avg/max = 83.6/86.6/91.5 ms
 }}}

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32597#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list