[tor-project] Anti-censorship team meeting notes, 2022-02-10

meskio meskio at torproject.org
Thu Feb 10 16:50:52 UTC 2022

Hey everyone!

Here are our meeting logs:


And our meeting pad:

Anti-censorship work meeting pad

Next meeting: Thursday February 10th 16:00 UTC

Weekly meetings, every Thursday at 16:00 UTC, in #tor-meeting at OFTC (channel is logged while meetings are in progress)

== Goal of this meeting ==

Weekly checkin about the status of anti-censorship work at Tor.
Coordinate collaboration between people/teams on anti-censorship at Tor.

== Links to Useful documents ==

    Our anti-censorship roadmap:

    Roadmap: https://gitlab.torproject.org/groups/tpo/anti-censorship/-/boards

    The anti-censorship team's wiki page:


    Past meeting notes can be found at:


    Tickets that need reviews:  from sponsors we are working on:

    All needs review tickets: https://gitlab.torproject.org/groups/tpo/anti-censorship/-/merge_requests?scope=all&utf8=%E2%9C%93&state=opened&assignee_id=None

    Sponsor 30





    Sponsor 28

    must-do tickets: https://gitlab.torproject.org/groups/tpo/-/milestones/10

    possible tickets: https://gitlab.torproject.org/groups/tpo/-/issues?scope=all&utf8=%E2%9C%93&state=opened&label_name%5b%5d=Sponsor%2028&milestone_title=None

== Announcements ==

== Discussion ==

    Add SOCKS5 forward proxy support: https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/64

    a complex non-essential function, do we want it in?

    previous discussion on the topic: http://meetbot.debian.net/tor-meeting/2021/tor-meeting.2021-12-02-15.59.html 

    current implementation has DNS leaks in osx/ios

    shell is going to implement the work around the DNS leaks, and we'll evaluate if is mergeable or too complex.

    What failures count as emergencies for the anti-censorship team?



    will close after a few days if there is nothing to add

== Actions ==

== Interesting links ==


    report of meek probabilistically not working in Russia since 2022-02-06

    > Statistical analysis with respect to meek-azure is not unique, apparently, some VPN services are blocked in a similar way. The difference is in the number of packets.

    > Blocking meek-azure (fixed address and SNI) requires fewer than 20 TCP segments with data (including TLSv1.3 handshake), client traffic is not counted. Blocking is probabilistic.

    > By changing the address (in the hosts file) or the front domain, exclude this analysis. Change the server traffic (within the analysis window), bypass it. For example, add to the line with meek-azure: utls=helloios_auto

    Lessons from the January 2022 Internet shutdown in Kazakhstan for censorship circumvention https://github.com/net4people/bbs/issues/102

== Reading group ==

    We will discuss "Weaponizing Middleboxes for TCP Reflected Amplification" on 2022-02-17


    Questions to ask and goals to have:

    What aspects of the paper are questionable?

    Are there immediate actions we can take based on this work?

    Are there long-term actions we can take based on this work?

    Is there future work that we want to call out, in hopes that others will pick it up?

== Updates ==

    This week:
        - What you worked on this week.
    Next week:
        - What you are planning to work on next week.
    Help with:

         - Something you need help with.

anadahz: 2022-01-27

    Last week:

    - Increase timeout check cycles for default-bridge-felix-1 and default-bridge-felix-2 as they have been generating too many alerts: https://gitlab.torproject.org/tpo/anti-censorship/monit-configuration/-/merge_requests/1

cecylia (cohosh): last updated 2022-02-10
Last week:
    - remove oneshot mode from snowflake server (snowflake#40098)
    - lots of documentation for handing off s28 work
    - bumped version of snowflake library to v2.1.0
    - responded again to ooni's snowflake test questions
    - wrote patch to fix unitialized field of SnowflakeListener (snowflake#40099)
    - finished prepping our s28 snowflake evaluation for this month
    - wrote up a wiki page documenting what counts as an emergency (team#48)
This week:
    - reviews if needed
    - shadow testing
    - around for questions
Needs help with:

dcf: 2022-02-10

    Last week:

    - updated snowflake bridge installation and survival guides for the load-balanced setup https://gitlab.torproject.org/tpo/anti-censorship/team/-/wikis/Survival-Guides/Snowflake-Bridge-Installation-Guide https://gitlab.torproject.org/tpo/anti-censorship/team/-/wikis/Survival-Guides/Snowflake-Bridge-Survival-Guide

    - opened an issue for metrics graphs with load-balanced relays https://gitlab.torproject.org/tpo/network-health/metrics/onionoo/-/issues/40022

    - started a thread on tor-dev about alternatives for ExtORPort authentication and disabling onion key rotation https://lists.torproject.org/pipermail/tor-dev/2022-February/014695.html

    - snowflake CDN bookkeeping https://gitlab.torproject.org/tpo/anti-censorship/team/-/wikis/Snowflake-costs

    Next week:

    Help with:

agix: 2021-02-10

    Last week:

    - Continued work on gettor-twitter

    Next week:

    - Hopefully finish the task

    Help with:


arlolra: 2022-01-20

    Last week:

    - [added 2022-01-20 by dcf] ALPN support for pion DTLS https://github.com/pion/dtls/pull/415

    Next week:

    - Figure out where in pion/webrtc ALPN should be configured and used

    - Maybe add Chacha20Poly1305 to pion/dtls



    Help with:


maxb: 2021-09-23

    Last week:

    - Worked on https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40054 re: utls for broker negotiation

    - Had conversation with someone about upstream utls http round tripper https://github.com/refraction-networking/utls/pull/74

    - Too busy with work :/

    Next week:

    - _Really_ want to get a PR for utls round tripper

meskio: 2022-02-10

    Last week:

    - bridgedb reconnection issues with rdsys

    - fixes on bridge port scan (bridge-port-scan#6)

    - digging into bridge authority IPv6 issues

    - obfs4 debian package support (obfs4#33736)

    - telegram bot bridges rotation

    - test deployment for the new rdsys/bridgedb setup is live!!! (rdsys#12)

    - review snowflakes suppression of verbosity in logs (snowflake!74)

    Next week:

    - make easier to test bridgedb ater rdsys change (bridgedb#40034)

    - bridgestrap is not displaying the results (bridgestrap#31)

    - bridgedb reconnection issues with rdsys

Shelikhoo: 2022-02-10
   Last Week:
       - [Merge Request Awaiting] Add SOCKS5 forward proxy support to snowflake(snowflake!64)
       - [Merge Request Done] Add verbosity switch to suppress diagnostic output(snowflake#40079, snowflake!74)

      - [Discussion] Implement metrics to measure snowflake churn(snowflake#34075)

      - [Discussion] Proposal: Support for Dynamic IP obfs4 bridges with unattended proxy information update(aka "Subscription")

      - [Discussion] Proposal: Push Notification Based Signaling Channel

      - [Discussion] Proposal: Centralized Probe Result Collector(anti-censorship/team#54)

      - [Discussion] HTTPT & Websocket(https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/httpt/-/issues/7#note_2773546)

      - [Investigate] Is there a better moat/snowflake SNI than cdn.sstatic.net? (snowflake#40068)

      - [Investigate] Multi-instance Load Balanced Tor - Snowflake Deployment

      - [Investigate] China "Anti-Fraud" Webpage Redirection Censorship(censorship-analysis#40026)

      - [Investigate] uTLS for broker negotiation

   Next Week:
       - [Discussion] Implement metrics to measure snowflake churn (snowflake#34075)
       - [Discussion] Proposal: Push Notification Based Signaling Channel
       - [Coding] uTLS for broker negotiation
       - [Coding] Proposal: Centralized Probe Result Collector(anti-censorship/team#54)

HackerNCoder: 2021-12-16
This week:
        Setup web mirror on tor.encryptionin.space
        Get (new VPs with) new IP and setup new web mirror on new domain

hanneloresx: 2021-3-4

    Last week: 

    - Submitted MR for bridgestrap issue #14

    Next week:

    - Finish bridgestrap #14

    - Find new issue to work on

    Help with:


meskio | https://meskio.net/
 My contact info: https://meskio.net/crypto.txt
Nos vamos a Croatan.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: signature
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20220210/dd72fbd9/attachment.sig>

More information about the tor-project mailing list