On Tue, Jan 12, 2021 at 10:03:52PM +0100, li...@for-privacy.net wrote: > On 11.01.2021 21:59, Toralf Förster wrote: > > On 1/11/21 9:03 PM, Philipp Winter wrote: > > > FINGERPRINT is your bridge's fingerprint or its hashed fingerprint -- > > > either works. > > > > for public bridges ;-) > > Bridges (PublishServerDescriptor 1 + BridgeDistribution none) work.
Yes, that's because the backend needs a bridge's descriptor but doesn't care about its distribution method. > Completely private bridges (PublishServerDescriptor 0 + BridgeDistribution > none) can look here: > https://bridges.torproject.org/scan/ Note that this service only tests the target's TCP port. The port may be reachable but the bridge may still be dysfunctional. The /status page actually fetches the target's descriptor, which gives you more assurance that the bridge actually works. _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays