docs(bridge): update tor bridges section

This commit is contained in:
Iain Learmonth 2023-02-26 18:07:15 +00:00
parent c3520ccb58
commit 6f00deabbd
4 changed files with 92 additions and 17 deletions

Binary file not shown.

Before

Width:  |  Height:  |  Size: 170 KiB

After

Width:  |  Height:  |  Size: 145 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 140 KiB

After

Width:  |  Height:  |  Size: 91 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 175 KiB

After

Width:  |  Height:  |  Size: 138 KiB

Before After
Before After

View file

@ -1,16 +1,64 @@
Tor Bridges Tor Bridges
=========== ===========
A Tor bridge is a special type of node on the Tor network that is not listed in the public directory of nodes. Background
----------
When someone uses the Tor network to browse the internet, their traffic is routed through a series of relays, making it
difficult to trace the origin of the traffic or the content being accessed. However, in some countries or networks,
access to the Tor network is blocked, making it impossible to use the network.
A Tor bridge, a special type of node on the Tor network that is not listed in the public directory of nodes, is designed
to help users in these situations.
Instead of connecting directly to the Tor network, a user can connect to a Tor bridge first.
The bridge will then forward the user's traffic to the Tor network, effectively bypassing any censorship or blocking.
This makes it harder for governments and other organizations to block access to the Tor network, because users can This makes it harder for governments and other organizations to block access to the Tor network, because users can
still connect to the network through these unlisted bridges. Bridges are often used in countries where access to the still connect to the network through these unlisted bridges.
Tor network is heavily restricted, as they can provide a way for users to access the network and the anonymity and
privacy it offers. Pluggable Transports
""""""""""""""""""""
A key feature of a Tor bridge is its "obfuscation" capability, provided by pluggable transports.
This means that the bridge's traffic is disguised in a way that makes it difficult for censors to detect that it is Tor
traffic through deep packet inspection (DPI).
For example, the bridge may use a different network protocol or port than standard Tor traffic, making it harder for
censors to identify and block it.
A pluggable transport allows users to obfuscate their Tor traffic using a variety of different protocols and techniques.
Different pluggable transports will have different levels of success in different censorship environments, and new
techniques are always being designed and studied. The portal currently only supports deploying bridges using the
obfs4proxy pluggable transport.
Distribution Methods
""""""""""""""""""""
`BridgeDB <https://bridges.torproject.org/>`_, and its upcoming replacement rdsys, is a service used by the Tor network
to distribute bridge addresses to users who need them.
If you're running bridges for the general public to use then BridgeDB will help users get hold of the details for your
bridges.
Unless you have specific requirements, you can let BridgeDB determine the best distribution method for your
bridge by choosing the "Any" method.
Within each distribution method the bridges are further split up into *pools* (a concept borrowed by the portal too,
see: *Resource Pools*). In some countries or networks, censors may attempt to block all known bridge addresses
associated with the Tor network. Depending on criteria such as geography, your ISP, and other secret factors, each
user request for a bridge is mapped to one of these pools.
The aim is to prevent any censor from being able to discover all of the bridges, leaving bridges unblocked for other
legitimate users.
If you already have a channel to your users then you should select the "None" BridgeDB distribution method to
ensure that your bridges remain private and only for use by your community.
Managing Configurations
-----------------------
As with other circumvention resources, the dashboard takes the approach of managing collections of resources that are As with other circumvention resources, the dashboard takes the approach of managing collections of resources that are
uniformly configured and expendable. For this reason the only configuration that can be performed is at a high level uniformly configured and expendable. For this reason the only configuration that can be performed is at a high level
with the management of individual resources taking place through the automation subsystem. with the management of individual resources taking place through the automation subsystem.
Bridges will be deployed to all available cloud providers, although you can disable providers by setting a zero instance
limit within the Cloud Account configuration.
Once your administrator has provided you access to the portal, you can begin to configure your Tor Bridge deployments. Once your administrator has provided you access to the portal, you can begin to configure your Tor Bridge deployments.
To get started, select "Tor Bridges" under "Configuration" from the menu on the left hand side. If you are using a To get started, select "Tor Bridges" under "Configuration" from the menu on the left hand side. If you are using a
mobile device, you may need to click the hamburger icon at the top of the screen to open the menu. mobile device, you may need to click the hamburger icon at the top of the screen to open the menu.
@ -27,12 +75,6 @@ you with the new configuration form:
.. image:: /_static/bridges/new.png .. image:: /_static/bridges/new.png
:width: 800 :width: 800
Provider
""""""""
The provider that the bridges should be deployed to. Your administrator must have configured this provider before any
resources will be deployed.
Distribution Method Distribution Method
""""""""""""""""""" """""""""""""""""""
@ -46,16 +88,44 @@ Description
A free-form text description to help identify the collection. A free-form text description to help identify the collection.
Group Pool
""""" """"
The group the collection belongs to. The Resource Pool the bridges in this configuration belong to.
If you distribute your bridges by Distribution List within the portal, this will allow you to split up which bridges
are distributed.
Number Target Number
"""""" """""""""""""
The number of bridges to deploy. When editing, increasing or decreasing this number will cause new bridges to be The target number of active bridges to have deployed at any time, excluding deprecated bridges. When editing, increasing
created, or existing bridges to be destroyed, so that the number deployed will match this number. or decreasing this number will cause new bridges to be created, or existing bridges to be destroyed, so that the number
deployed is less than the maximum number while having as close as possible to the target number of non-deprecated
bridges.
Maximum Number
""""""""""""""
The maximum number of bridges to deploy including deprecated bridges.
Expiry Timer
""""""""""""
The number of hours to wait after a bridge is deprecated before its destruction. It is not advisable to set this number
to zero as this does not allow any churn of IP address usage within the cloud provider and you are likely to get the
same IP address back for the new bridge, leading it to arriving dead on arrival. It is also not advisable to set this
number too high as this will result in cost incurred for a bridge that may not be able to be used. Remember that just
because the bridge is blocked in one network, it may remain accessible from other networks, and so it is not instantly
worthless when the first block is detected (with the exception perhaps of very specific community use cases).
Provider Allocation Method
""""""""""""""""""""""""""
Two provider allocation methods have been implemented:
* Use cheapest provider first - based on the prevailing cost of a Tor bridge at each provider, deploy on the cheapest
provider first until the quota is fully utilised, and then proceed to deploy on other providers in order of cost.
* Use providers randomly - each bridge deployed will go to a random choice of cloud provider (RNG is not cryptographic).
Edit Configuration Edit Configuration
------------------ ------------------
@ -65,6 +135,11 @@ Edit Configuration
See the "New Configuration" section above for the descriptions of each field. See the "New Configuration" section above for the descriptions of each field.
Once a configuration has been created, the Resource Pool and Distribution Method may not be modified. This is because
the bridges may already have been distributed by some method, and rather than reallocating the existing bridges to a
new Distribution Method or Resource Pool it would be more effective to destroy the configuration and then create a new
configuration with new bridges for those new users.
Destroy Configuration Destroy Configuration
--------------------- ---------------------