On Thu, Apr 10, 2014 at 1:57 PM, Roger Dingledine <a...@mit.edu> wrote:
> On Thu, Apr 10, 2014 at 06:24:00PM +0100, John Williams wrote: > > 3. If I run obfsproxy, should I open the regular tor port 9001 to the > > internet also? Or will that get me onto blacklists of "known tor > > bridges" and cause my whole IP address to be blocked? > > Alas, if you don't open the ORPort to the Internet also, your bridge > won't find itself reachable, so it won't publish to the bridge > directory authority, and so bridges.torproject.org won't give out your > bridge address automatically: > https://trac.torproject.org/projects/tor/ticket/7349 > So it is fine to leave ORPort closed if you're giving the bridge > address out manually, but if you want the automated system to do it, > you need ORPort reachable. > > Fortunately, in practice China censors by IP:port, not by blacklisting > the whole IP address, for now. Is there a list of the automated system's IP addresses that we can allow to reach that port and block everything else, as suggested in the bug? -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk