[tor-project] Anti-censorship team meeting notes, 2022-11-24

Shelikhoo shelikhoo at torproject.org
Thu Nov 24 16:20:28 UTC 2022


Hey everyone!

Here are our meeting logs:
http://meetbot.debian.net/tor-meeting/2022/tor-meeting.2022-11-24-15.58.html 
<http://meetbot.debian.net/tor-meeting/2022/tor-meeting.2022-03-31-15.59.html>

And our meeting pad:

Anti-censorship work meeting pad
--------------------------------

Next meeting: Thursday Dec 01 16:00 UTC

Weekly meetings, every Thursday at 16:00 UTC, in #tor-meeting at OFTC
(channel is logged while meetings are in progress)

== Goal of this meeting ==

Weekly check-in about the status of anti-censorship work at Tor.
Coordinate collaboration between people/teams on anti-censorship at the 
Tor Project and Tor community.

== Links to Useful documents ==

     * Our anti-censorship roadmap:
         * Roadmap: 
https://gitlab.torproject.org/groups/tpo/anti-censorship/-/boards
     * The anti-censorship team's wiki page:
         * 
https://gitlab.torproject.org/tpo/anti-censorship/team/-/wikis/home
     * Past meeting notes can be found at:
         * https://lists.torproject.org/pipermail/tor-project/
     * Tickets that need reviews:  from sponsors we are working on:
         * All needs review tickets:
             * 
https://gitlab.torproject.org/groups/tpo/anti-censorship/-/merge_requests?scope=all&utf8=%E2%9C%93&state=opened&assignee_id=None
         * Sponsor 28
             * must-do tickets: 
https://gitlab.torproject.org/groups/tpo/-/milestones/10
             * possible tickets: 
https://gitlab.torproject.org/groups/tpo/-/issues?scope=all&utf8=%E2%9C%93&state=opened&label_name%5b%5d=Sponsor%2028&milestone_title=None
         * Sponsor 96
             * https://gitlab.torproject.org/groups/tpo/-/milestones/24

== Announcements ==

     *

== Discussion ==

(OLD)
     * security policy
         * 
https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/SecurityPolicy
         * we are working on a project wide security policy on how to 
handle security issues
         * the starting point is the NetworkTeam security policy, and 
from ACT we'll try to propose changes to addapt it to our needs.
     * domain fronting deprecation in azure
         * 
https://gitlab.torproject.org/tpo/anti-censorship/team/-/issues/33#note_2853813
         * azure is going to block all domain front traffic after Nov 8 2023
         * we only use it for meek
         * we'll discuss 6 months before the block if we can deprecate 
meek or need to find an alternative
(NEW)
    [We exchanged the current progress and difficulty. The meeting 
summarily closed.]
== Actions ==


== Interesting links ==

     * https://news.ycombinator.com/item?id=33573477
         * "It's been many years, and I am still angry and disappointed 
by Cloudflare's decision to block domain fronting and drop Lantern as a 
customer..."
     * https://github.com/aleixrodriala/wa-tunnel
         * HTTP Tunneling through WhatsApp

== Reading group ==

     * We will discuss "Measuring DoT/DoH Blocking Using OONI Probe: a 
Preliminary Study" on Dec 1
         * https://www.ndss-symposium.org/ndss-paper/auto-draft-123/
         * 
https://www.ndss-symposium.org/wp-content/uploads/dnspriv21-02-paper.pdf
         * Questions to ask and goals to have:
             * What aspects of the paper are questionable?
             * Are there immediate actions we can take based on this work?
             * Are there long-term actions we can take based on this work?
             * Is there future work that we want to call out in hopes 
that others will pick it up?

== Updates ==

Name:
     This week:
         - What you worked on this week.
     Next week:
         - What you are planning to work on next week.
     Help with:
          - Something you need help with.

cecylia (cohosh): last updated 2022-11-24
     Last week:
         - wrote a fix to make go fmt CI more verbose (snowflake!122)
     This week:
         - continue work on conjure client
         - more work on reputation-based bridge dist
         - fixup snowflake!108
     Needs help with:

dcf: 2022-11-23
     Last week:
         - reviewed merge request to make `go fmt` errors in CI more 
obvious 
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/122
     Next week:
         - disable non-WireGuard SSH access to snowflake-02 
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40122
         - migrate goptlib to gitlab 
https://gitlab.torproject.org/tpo/anti-censorship/team/-/issues/86#note_2823122
         - try Conjure PT development version 
https://forum.torproject.net/t/tor-dev-introducing-a-conjure-pt-for-tor/4429
         - document recent performance optimizations in Snowflake bridge 
installation guide
         - make the number of KCP state machines a command-line option 
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/119
     Help with:
         - review of remaining snowflake-server performance improvements
             - 
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/115
             - 
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/118

meskio: 2022-11-17
    Last week:
        - send a reminderder? to all bridge operators to upgrade obfs4
        - fail to deploy a new version of OnionSproutsBot and roll back
        - investigate gettor freeze (rdsys#129)
        - update snowflake (2.3.1) package in debian (snowflake#40233)
        - add circumvention settings for AE (team#106)
        - many merge requests reviews in rdsys and snowflake
        - work with TAILS to find a qr code setup that works for them in 
BridgeDB
    Next week:
        - check if we are distributing blocked bridges in moat (rdsys#80)
        - investigate gettor freeze (rdsys#129)


Shelikhoo: 2022-11-24
    Last Week:
         - [Merge Request Awaiting] Add SOCKS5 forward proxy support to 
snowflake (snowflake!64)
         - [Discussion & Deployment] Rollout of Distributed Snowflake 
Support
         - [Coding & Deployment] Proposal: Centralized Probe Result 
Collector (anti-censorship/team#54)
         - [Research] HTTPT Planning 
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/httpt/-/issues/1
         - [Research] Censorship analysis for UDP traffic between Iran 
and rest of Internet: 2022 Q4: 
https://gitlab.torproject.org/tpo/anti-censorship/censorship- 
analysis/-/issues/40036
         - [Merge Request] Add Version Output Support to Snowflake (This 
also shows utls client hello names) 
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/111 
(Continue)
         - [Coding] Get Webtunnel to build together with tor browser
         - Reviewed a lot of merge requests
    Next Week:
         - [Research] WebTunnel planning (Continue)
         - [Research] Fix vantage point summary upload in China
         - [Coding] Get Webtunnel to build together with tor 
browser(Continue)
         - [Coding] fix "utls RoundTripper does not work when it is 
supposed to use HTTP/1" 
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40224
      - Finish all the reviews (cont)

Itchy Onion: 2022-11-24
     Last week:
       - continue working on snowflake in RACE; it passes one of the 
integration tests, but fails the second one with heavier load
       - worked on "Abbreviate `ice` list in bridge lines" (interruptted 
by RACE test results)

     This week:
       - continue working on snowflake in RACE; trying to cut down the 
number of times snowflake peers establish connection bc it's expensive 
(right now multiple connections are needed for messages between the same 
hosts)
       - review some MRs




-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20221124/62d73a64/attachment.sig>


More information about the tor-project mailing list