Re: [tor-relays] Dropping packets with TCP MSS=1400 to foil GFW active probing

2018-08-21 Thread teor
> On 22 Aug 2018, at 02:16, Nathaniel Suchy wrote: > > Couldn't I firewall the non-obfs port so only looback addresses may access it? For a private or hard-coded bridge, you can firewall your ORPort and set: AssumeReachable 1 Public BridgeDB bridges need an ORPort to pass bridge authority

Re: [tor-relays] Cloudflare Onions Beta and Network Stability

2018-08-21 Thread Nathaniel Suchy
Imagine if Cloudflare adds CAPTCHAs to Onion services. Now that’d be something  On Tue, Aug 21, 2018 at 1:18 PM grarpamp wrote: > On Mon, Aug 20, 2018 at 7:19 PM, Alec Muffett > wrote: > > Even if Cloudflare onionified a bazillion domain names, there are still > only > > a few million people

[tor-relays] Snowflake PT

2018-08-21 Thread Nathaniel Suchy
Hi everyone, Tor Browser 8 Alpha includes the Snowflake PT as it comes near a final release, the adoption and usage of the Snowflake PT will continue to rise. I now have the following questions... 1) Will a command line tool like an obfs4proxy come out so those of us with infrastructure can run

[tor-relays] Interested in running a FreeBSD Relay on Cogent?

2018-08-21 Thread Conrad Rockenhaus
Would you like to trial a FreeBSD Relay on Cogent until October 1st? Yes, it has to be FreeBSD, because I use Bhyve as my hypervisor and some of my blades don’t support UG, which means, I support FreeBSD only on these series of servers. If you’re interested in a Model “A” (25GB HDD, 1vCPU, 2GB

Re: [tor-relays] Cloudflare Onions Beta and Network Stability

2018-08-21 Thread grarpamp
On Mon, Aug 20, 2018 at 7:19 PM, Alec Muffett wrote: > Even if Cloudflare onionified a bazillion domain names, there are still only > a few million people who use Tor who could generate the load to connect to > them. And none of those who could, will, because cloudflare will google recaptcha

Re: [tor-relays] Dropping packets with TCP MSS=1400 to foil GFW active probing

2018-08-21 Thread Nathaniel Suchy
Hi David, Couldn't I firewall the non-obfs port so only looback addresses may access it? Cordially, Nathaniel Suchy On Tue, Aug 21, 2018 at 11:37 AM David Fifield wrote: > On Mon, Aug 20, 2018 at 02:25:40PM -0400, Nathaniel Suchy wrote: > > Interesting. Is there any reason to not use an

Re: [tor-relays] Dropping packets with TCP MSS=1400 to foil GFW active probing

2018-08-21 Thread David Fifield
On Mon, Aug 20, 2018 at 02:25:40PM -0400, Nathaniel Suchy wrote: > Interesting. Is there any reason to not use an obfuscated bridge? No, not really. obfs4 resists active probing without any special additional steps. But I can think of one reason why the MSS trick is worth trying, anyway. Due to a

Re: [tor-relays] Cloudflare Onions Beta and Network Stability

2018-08-21 Thread teor
> On 21 Aug 2018, at 07:39, DaKnOb wrote: > > Cloudflare had a post yesterday[1] on their blog[2] that said they have about > 10,000,000 domain names using their service. So that’s a rough number of the > maximum number of websites that will be made available over Tor. Now in > reality I

Re: [tor-relays] Cloudflare Onions Beta and Network Stability

2018-08-21 Thread Roman Mamedov
On Tue, 21 Aug 2018 06:53:00 + Georg Koppen wrote: > nusenu: > > > > > > Nathaniel Suchy: > >> As some of you may have heard, Cloudflare is beta testing opportunistic > >> onions. This of course is going to create more Tor traffic. Cloudflare has > >> several concerns about running their

Re: [tor-relays] Cloudflare Onions Beta and Network Stability

2018-08-21 Thread Alec Muffett
On Tue, 21 Aug 2018 at 07:09, DaKnOb wrote: > Also, I don’t think Cloudflare spent so much time in engineering, just to take down Tor.. I've known people at Cloudflare talking about doing something like this for 2+ years, and the goal has been to do something nice for Tor and to make it easier