#30472: Implement a mechanism for PT reachability testing
-----------------------------------------------+---------------------------
 Reporter:  phw                                |          Owner:  phw
     Type:  project                            |         Status:  closed
 Priority:  High                               |      Milestone:
Component:  Circumvention/Pluggable transport  |        Version:
 Severity:  Major                              |     Resolution:  fixed
 Keywords:  reachability                       |  Actual Points:  2
Parent ID:  #30471                             |         Points:
 Reviewer:                                     |        Sponsor:  Sponsor19
-----------------------------------------------+---------------------------
Changes (by phw):

 * status:  needs_review => closed
 * resolution:   => fixed
 * actualpoints:   => 2


Comment:

 I'm closing this because our short-term solution is now in place. Here's a
 summary:

 * The service is now deployed at https://bridges.torproject.org/scan/.
 * The code is available at https://github.com/NullHypothesis/obfs4PortScan
 (and, once #30715 is done, on our gitweb).
 * We're using polyanthum's Apache reverse proxy as front for the service
 (see #30703), so we only need to listen on localhost.
 * The service runs as user `bridgescan` (see #30714) and we're using a
 [https://help.torproject.org/tsa/doc/services/ local systemd script] to
 have it start at boot.
 *
 
[https://trac.torproject.org/projects/tor/wiki/org/teams/AntiCensorshipTeam/InfrastructureMonitoring
 Our sysmon deployment] is monitoring the service.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30472#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Reply via email to