#30472: Implement a mechanism for PT reachability testing -----------------------------------------------+--------------------------- Reporter: phw | Owner: phw Type: project | Status: closed Priority: High | Milestone: Component: Circumvention/Pluggable transport | Version: Severity: Major | Resolution: fixed Keywords: reachability | Actual Points: 2 Parent ID: #30471 | Points: Reviewer: | Sponsor: Sponsor19 -----------------------------------------------+--------------------------- Changes (by phw):
* status: needs_review => closed * resolution: => fixed * actualpoints: => 2 Comment: I'm closing this because our short-term solution is now in place. Here's a summary: * The service is now deployed at https://bridges.torproject.org/scan/. * The code is available at https://github.com/NullHypothesis/obfs4PortScan (and, once #30715 is done, on our gitweb). * We're using polyanthum's Apache reverse proxy as front for the service (see #30703), so we only need to listen on localhost. * The service runs as user `bridgescan` (see #30714) and we're using a [https://help.torproject.org/tsa/doc/services/ local systemd script] to have it start at boot. * [https://trac.torproject.org/projects/tor/wiki/org/teams/AntiCensorshipTeam/InfrastructureMonitoring Our sysmon deployment] is monitoring the service. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30472#comment:13> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs