docs(bridge): update tor bridges section
This commit is contained in:
parent
c3520ccb58
commit
6f00deabbd
4 changed files with 92 additions and 17 deletions
BIN
docs/_static/bridges/edit.png
vendored
BIN
docs/_static/bridges/edit.png
vendored
Binary file not shown.
Before Width: | Height: | Size: 170 KiB After Width: | Height: | Size: 145 KiB |
BIN
docs/_static/bridges/list.png
vendored
BIN
docs/_static/bridges/list.png
vendored
Binary file not shown.
Before Width: | Height: | Size: 140 KiB After Width: | Height: | Size: 91 KiB |
BIN
docs/_static/bridges/new.png
vendored
BIN
docs/_static/bridges/new.png
vendored
Binary file not shown.
Before Width: | Height: | Size: 175 KiB After Width: | Height: | Size: 138 KiB |
|
@ -1,16 +1,64 @@
|
||||||
Tor Bridges
|
Tor Bridges
|
||||||
===========
|
===========
|
||||||
|
|
||||||
A Tor bridge is a special type of node on the Tor network that is not listed in the public directory of nodes.
|
Background
|
||||||
|
----------
|
||||||
|
|
||||||
|
When someone uses the Tor network to browse the internet, their traffic is routed through a series of relays, making it
|
||||||
|
difficult to trace the origin of the traffic or the content being accessed. However, in some countries or networks,
|
||||||
|
access to the Tor network is blocked, making it impossible to use the network.
|
||||||
|
|
||||||
|
A Tor bridge, a special type of node on the Tor network that is not listed in the public directory of nodes, is designed
|
||||||
|
to help users in these situations.
|
||||||
|
Instead of connecting directly to the Tor network, a user can connect to a Tor bridge first.
|
||||||
|
The bridge will then forward the user's traffic to the Tor network, effectively bypassing any censorship or blocking.
|
||||||
This makes it harder for governments and other organizations to block access to the Tor network, because users can
|
This makes it harder for governments and other organizations to block access to the Tor network, because users can
|
||||||
still connect to the network through these unlisted bridges. Bridges are often used in countries where access to the
|
still connect to the network through these unlisted bridges.
|
||||||
Tor network is heavily restricted, as they can provide a way for users to access the network and the anonymity and
|
|
||||||
privacy it offers.
|
Pluggable Transports
|
||||||
|
""""""""""""""""""""
|
||||||
|
|
||||||
|
A key feature of a Tor bridge is its "obfuscation" capability, provided by pluggable transports.
|
||||||
|
This means that the bridge's traffic is disguised in a way that makes it difficult for censors to detect that it is Tor
|
||||||
|
traffic through deep packet inspection (DPI).
|
||||||
|
For example, the bridge may use a different network protocol or port than standard Tor traffic, making it harder for
|
||||||
|
censors to identify and block it.
|
||||||
|
|
||||||
|
A pluggable transport allows users to obfuscate their Tor traffic using a variety of different protocols and techniques.
|
||||||
|
Different pluggable transports will have different levels of success in different censorship environments, and new
|
||||||
|
techniques are always being designed and studied. The portal currently only supports deploying bridges using the
|
||||||
|
obfs4proxy pluggable transport.
|
||||||
|
|
||||||
|
Distribution Methods
|
||||||
|
""""""""""""""""""""
|
||||||
|
|
||||||
|
`BridgeDB <https://bridges.torproject.org/>`_, and its upcoming replacement rdsys, is a service used by the Tor network
|
||||||
|
to distribute bridge addresses to users who need them.
|
||||||
|
If you're running bridges for the general public to use then BridgeDB will help users get hold of the details for your
|
||||||
|
bridges.
|
||||||
|
Unless you have specific requirements, you can let BridgeDB determine the best distribution method for your
|
||||||
|
bridge by choosing the "Any" method.
|
||||||
|
|
||||||
|
Within each distribution method the bridges are further split up into *pools* (a concept borrowed by the portal too,
|
||||||
|
see: *Resource Pools*). In some countries or networks, censors may attempt to block all known bridge addresses
|
||||||
|
associated with the Tor network. Depending on criteria such as geography, your ISP, and other secret factors, each
|
||||||
|
user request for a bridge is mapped to one of these pools.
|
||||||
|
The aim is to prevent any censor from being able to discover all of the bridges, leaving bridges unblocked for other
|
||||||
|
legitimate users.
|
||||||
|
|
||||||
|
If you already have a channel to your users then you should select the "None" BridgeDB distribution method to
|
||||||
|
ensure that your bridges remain private and only for use by your community.
|
||||||
|
|
||||||
|
Managing Configurations
|
||||||
|
-----------------------
|
||||||
|
|
||||||
As with other circumvention resources, the dashboard takes the approach of managing collections of resources that are
|
As with other circumvention resources, the dashboard takes the approach of managing collections of resources that are
|
||||||
uniformly configured and expendable. For this reason the only configuration that can be performed is at a high level
|
uniformly configured and expendable. For this reason the only configuration that can be performed is at a high level
|
||||||
with the management of individual resources taking place through the automation subsystem.
|
with the management of individual resources taking place through the automation subsystem.
|
||||||
|
|
||||||
|
Bridges will be deployed to all available cloud providers, although you can disable providers by setting a zero instance
|
||||||
|
limit within the Cloud Account configuration.
|
||||||
|
|
||||||
Once your administrator has provided you access to the portal, you can begin to configure your Tor Bridge deployments.
|
Once your administrator has provided you access to the portal, you can begin to configure your Tor Bridge deployments.
|
||||||
To get started, select "Tor Bridges" under "Configuration" from the menu on the left hand side. If you are using a
|
To get started, select "Tor Bridges" under "Configuration" from the menu on the left hand side. If you are using a
|
||||||
mobile device, you may need to click the hamburger icon at the top of the screen to open the menu.
|
mobile device, you may need to click the hamburger icon at the top of the screen to open the menu.
|
||||||
|
@ -27,12 +75,6 @@ you with the new configuration form:
|
||||||
.. image:: /_static/bridges/new.png
|
.. image:: /_static/bridges/new.png
|
||||||
:width: 800
|
:width: 800
|
||||||
|
|
||||||
Provider
|
|
||||||
""""""""
|
|
||||||
|
|
||||||
The provider that the bridges should be deployed to. Your administrator must have configured this provider before any
|
|
||||||
resources will be deployed.
|
|
||||||
|
|
||||||
Distribution Method
|
Distribution Method
|
||||||
"""""""""""""""""""
|
"""""""""""""""""""
|
||||||
|
|
||||||
|
@ -46,16 +88,44 @@ Description
|
||||||
|
|
||||||
A free-form text description to help identify the collection.
|
A free-form text description to help identify the collection.
|
||||||
|
|
||||||
Group
|
Pool
|
||||||
"""""
|
""""
|
||||||
|
|
||||||
The group the collection belongs to.
|
The Resource Pool the bridges in this configuration belong to.
|
||||||
|
If you distribute your bridges by Distribution List within the portal, this will allow you to split up which bridges
|
||||||
|
are distributed.
|
||||||
|
|
||||||
Number
|
Target Number
|
||||||
""""""
|
"""""""""""""
|
||||||
|
|
||||||
The number of bridges to deploy. When editing, increasing or decreasing this number will cause new bridges to be
|
The target number of active bridges to have deployed at any time, excluding deprecated bridges. When editing, increasing
|
||||||
created, or existing bridges to be destroyed, so that the number deployed will match this number.
|
or decreasing this number will cause new bridges to be created, or existing bridges to be destroyed, so that the number
|
||||||
|
deployed is less than the maximum number while having as close as possible to the target number of non-deprecated
|
||||||
|
bridges.
|
||||||
|
|
||||||
|
Maximum Number
|
||||||
|
""""""""""""""
|
||||||
|
|
||||||
|
The maximum number of bridges to deploy including deprecated bridges.
|
||||||
|
|
||||||
|
Expiry Timer
|
||||||
|
""""""""""""
|
||||||
|
|
||||||
|
The number of hours to wait after a bridge is deprecated before its destruction. It is not advisable to set this number
|
||||||
|
to zero as this does not allow any churn of IP address usage within the cloud provider and you are likely to get the
|
||||||
|
same IP address back for the new bridge, leading it to arriving dead on arrival. It is also not advisable to set this
|
||||||
|
number too high as this will result in cost incurred for a bridge that may not be able to be used. Remember that just
|
||||||
|
because the bridge is blocked in one network, it may remain accessible from other networks, and so it is not instantly
|
||||||
|
worthless when the first block is detected (with the exception perhaps of very specific community use cases).
|
||||||
|
|
||||||
|
Provider Allocation Method
|
||||||
|
""""""""""""""""""""""""""
|
||||||
|
|
||||||
|
Two provider allocation methods have been implemented:
|
||||||
|
|
||||||
|
* Use cheapest provider first - based on the prevailing cost of a Tor bridge at each provider, deploy on the cheapest
|
||||||
|
provider first until the quota is fully utilised, and then proceed to deploy on other providers in order of cost.
|
||||||
|
* Use providers randomly - each bridge deployed will go to a random choice of cloud provider (RNG is not cryptographic).
|
||||||
|
|
||||||
Edit Configuration
|
Edit Configuration
|
||||||
------------------
|
------------------
|
||||||
|
@ -65,6 +135,11 @@ Edit Configuration
|
||||||
|
|
||||||
See the "New Configuration" section above for the descriptions of each field.
|
See the "New Configuration" section above for the descriptions of each field.
|
||||||
|
|
||||||
|
Once a configuration has been created, the Resource Pool and Distribution Method may not be modified. This is because
|
||||||
|
the bridges may already have been distributed by some method, and rather than reallocating the existing bridges to a
|
||||||
|
new Distribution Method or Resource Pool it would be more effective to destroy the configuration and then create a new
|
||||||
|
configuration with new bridges for those new users.
|
||||||
|
|
||||||
Destroy Configuration
|
Destroy Configuration
|
||||||
---------------------
|
---------------------
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue