I can dedicate 2 more IP’s from my network to this. You just want it to be 
obfs4 and iat-mode set to 2?

Thanks,
John C.

> On Aug 24, 2022, at 2:35 AM, elise.tora...@web.de wrote:
> 
> 
> As in the title, it took me over an hour to find one - for my security 
> requirements, the timing and sometimes, packet size obfuscation, is very 
> important.
>  
> Now this might sound a bit like sarcasm, but I also think that we should 
> harden the https://bridges.torproject.org page, just a captcha and not 
> delivering new bridges to the same IP is a bit weak, in my opinion.
>  
> Perhaps extend that block to an entire /16 range, or require some 
> computational power to be used up (could be easily implemented in JavaScript) 
> first.
>  
> The last suggestion would also eliminate bots that scrape bridge addresses 
> using plaintext clients entirely, at least until someone builds a chromium / 
> (insert arbitrary browser engine here) bot.
>  
> I know this is a cat and mouse game, but the bridge page should be as secure 
> as possible.
>  
> For example: I wouldn't mind waiting 5-15 minutes to get a list of 3 bridges 
> (optionally, with a button that says, iat-mode non-zero only, but we need to 
> harden more before implementing something like that), some government 
> agencies might be thrown off by this, along with the fact that they also only 
> have limited IP ranges.
>  
> Thoughts?
> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to