Re: [tor-relays] Metrics

Hi,

There are some issues[1][2] with the status indicator on Metrics for bridges.

That said, I tested your bridge with bridgestrap[3], and it tells me:

Bridge ED3B1CBDEFAB89B6546B77984076969DDD19DDB7 advertises:

* obfs4: dysfunctional
  Error: timed out waiting for bridge descriptor
  Last tested: 2023-09-05 16:00:16.040172317 +0000 UTC (15h18m32.726072356s ago)

Have you tried to connect to your own bridge and see if it works?
Here is how you build your obfs4 bridge line (note: it's your bridge
fingerprint and not your hashed bridge fingerprint):

Which obfs4 port are you using? Can you check if it's externally reachable?
Here is how you can test it: Tor Project | TCP Reachability Test

cheers,
Gus

[1] Reported as offline in metrics, some bridges are online and running (#112) · Issues · The Tor Project / Anti-censorship / Team · GitLab
[2] Blocking ORPort Recommend not exposing OrPort for bridges (#129) · Issues · The Tor Project / Anti-censorship / Team · GitLab
[3] https://bridges.torproject.org/status?id=ED3B1CBDEFAB89B6546B77984076969DDD19DDB7

···

On Wed, Sep 06, 2023 at 02:27:07AM +0000, BridgeOverStyx via tor-relays wrote:

My bridge styxVortex is up and running. I know this because the Nyx monitor shows activity. However, a search of metrics.torproject.org shows it down. It has been in this state for at least a month. Do you have any suggestions of what could be the possible cause of this?

I am using pfblockerng on my network, but the machine that is running Tor bridge is not filtered by it. I do have a couple of TOR feed enabled in pfblockerng but only incoming traffic is filtered.

I have no idea how the bridge stats are passed to metrics.torproject.org so it is very challenging for me to tamp down on the cause.
Any suggestion, at this point, will be helpful.

Sent with [Proton Mail](https://proton.me/) secure email.

_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
tor-relays Info Page

--
The Tor Project
Community Team Lead

1 Like

Hi,

Have you tried to connect to your own bridge and see if it works?
Here is how you build your obfs4 bridge line (note: it's your bridge
fingerprint and not your hashed bridge fingerprint):
Tor Project | Post-install

there seems to be a mismatch between the description linked above and the Tor browser UI to manually add a Tor bridge: If one starts the Tor browser, click on "Configure Tor connections" and then on "Add a Bridge Manually" (seems to be the only possibility to test your own Bridge directly in the Tor browser), there is only the option to provide the bridge's IP address and the obfs4 port, but not, as mentioned in the description linked above the fingerprint and the obfs4 certificate. When I try to add the fingerprint and the obfs4 certificate of my bridges, no connection is established.

So, where is the advantage on additionally providing the fingerprint and the obfs4 certificate when connecting to Tor (I can imagine that it has something to do with authenticity)? And how can one do that using the Tor software respectively the Tor browser bundle?

Kind regards
telekobold

···

On 06.09.23 09:25, gus wrote:
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Hi,

Hi,

> Have you tried to connect to your own bridge and see if it works?
> Here is how you build your obfs4 bridge line (note: it's your bridge
> fingerprint and not your hashed bridge fingerprint):
> Tor Project | Post-install

there seems to be a mismatch between the description linked above and the
Tor browser UI to manually add a Tor bridge: If one starts the Tor browser,
click on "Configure Tor connections" and then on "Add a Bridge Manually"
(seems to be the only possibility to test your own Bridge directly in the
Tor browser), there is only the option to provide the bridge's IP address
and the obfs4 port, but not, as mentioned in the description linked above
the fingerprint and the obfs4 certificate. When I try to add the fingerprint
and the obfs4 certificate of my bridges, no connection is established.

Yes, there is a mismatch in Tor Browser UI. See these tickets:

So, where is the advantage on additionally providing the fingerprint and the
obfs4 certificate when connecting to Tor (I can imagine that it has
something to do with authenticity)? And how can one do that using the Tor
software respectively the Tor browser bundle?

If you add just IP:ORPort (**ORPort** and not the OBFS4 Port) you have a
"vanilla" Tor bridge: a bridge that doesn't obfuscate your Tor traffic.
So it may not work in countries/ISPs doing DPI.
To use your own obfs4 bridge, you need to build the "complete bridge line"[1].

cheers,
Gus
[1] Manual on Bridges speaks of "addresses" but means whole bridge lines (#130) · Issues · The Tor Project / Web / manual · GitLab

···

On Wed, Sep 06, 2023 at 09:11:02PM +0200, telekobold wrote:

On 06.09.23 09:25, gus wrote:

--
The Tor Project
Community Team Lead

2 Likes

Hi gus,

···

On 06.09.23 21:27, gus wrote:

If you add just IP:ORPort (**ORPort** and not the OBFS4 Port) you have a
"vanilla" Tor bridge: a bridge that doesn't obfuscate your Tor traffic.
So it may not work in countries/ISPs doing DPI.
To use your own obfs4 bridge, you need to build the "complete bridge line"[1].

cheers,
Gus
[1] Manual on Bridges speaks of "addresses" but means whole bridge lines (#130) · Issues · The Tor Project / Web / manual · GitLab

thank you for the clarification! To be honest, I indeed confused "ORPort" and "obfs4port" for a moment.

Kind regards
telekobold
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

What is the "complete" bridge line?

Bridge obfs4 <IP ADDRESS>:<PORT> <FINGERPRINT> cert=<CERTIFICATE> iat-mode=0

where PORT is the obfs4 port, not the ORPort. (When using IPv6, <IP

must be in ).

See also Tor Project | Post-install

···

On 07.09.23 12:43, Anonforpeace via tor-relays wrote:
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

So you don't have to dig through the logs:
(as root or sudo)
~# cat /var/lib/tor/pt_state/obfs4_bridgeline.txt
~# cat /var/lib/tor/fingerprint

or with multiple instances:
~# cat /var/lib/tor-instances/NN/pt_state/obfs4_bridgeline.txt

···

--
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

So you don't have to dig through the logs:
(as root or sudo)
~# cat /var/lib/tor/pt_state/obfs4_bridgeline.txt
~# cat /var/lib/tor/fingerprint

or with multiple instances:
~# cat /var/lib/tor-instances/NN/pt_state/obfs4_bridgeline.txt

Or when running obfs4 in docker:
docker exec `docker ps -aqf "name=obfs4"` get-bridge-line

···

_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays