Age | Commit message (Collapse) | Author |
|
* Related: #40354
|
|
We switched to a CDN77, a cloud provider that supports domain fronting.
|
|
|
|
|
|
|
|
|
|
Co-authored-by: Michael Pu <michael.pu@uwaterloo.ca>
|
|
Co-authored-by: Michael Pu <michael.pu@uwaterloo.ca>
|
|
Co-authored-by: Michael Pu <michael.pu@uwaterloo.ca>
|
|
This features adds an additional rendezvous method to send client offers
and receive proxy answers through the use of Amazon SQS queues.
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/26151
|
|
shelikhoo/dev-udp-performance-rebased branch
https://gitlab.torproject.org/shelikhoo/snowflake/-/commits/9dce28cfc2093490473432ffecd9abaab7ebdbdb
|
|
For #40294
|
|
|
|
|
|
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/154#note_2919109
Still ignoring the io.ErrShortBuffer at the callers, which retains
current behavior.
|
|
Instead of unconditionally allocating its own.
|
|
This fixes a regression introduced in 9fdfb3d1, where the list of front
domains always contained an empty string if none were supplied via the
commandline options, causing rendezvous failures for both amp cache and
domain fronting. This fix checks to see whether the commandline option
was supplied.
|
|
|
|
Introduce a new commandline and SOCKS argument for comma-separated
domain fronts rather than repurposing the old one so that we can
maintain backwards compatability with users running old versions of the
client. A new bridge line shared on circumvention settings could have
both the front= and fronts= options set.
|
|
This commmit changes the command-line and Bridge line arguments to take
a comma-separated list of front domains. The change is backwards
compatible with old Bridge and ClientTransportPlugin lines. At
rendezvous time, a front domain will be randomly chosen from the list.
|
|
For details, see https://github.com/shadow/shadow/issues/2980
|
|
This is a workaround for older versions of android that do not trust
the Let's Encrypt root certificate.
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40087
|
|
Related: tpo/anti-censorship/team#86
|
|
|
|
|
|
|
|
|
|
|
|
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commits/fc89e8b10c3ff30db2079b2fb327d05b2b5f3c80/projects/common/bridges_list.snowflake.txt
* Use port 80 in placeholder IP addresses
tpo/applications/tor-browser-build!516
* Enable uTLS
tpo/applications/tor-browser-build!540
* Shorten bridge line (remove stun.voip.blackberry.com)
tpo/applications/tor-browser-build!558
* Add snowflake-02 bridge
tpo/applications/tor-browser-build!571
|
|
|
|
Removed stun.stunprotocol.org after a discussion with the operator, and
stun.altar.com.pl after noticing it has gone offline.
https://lists.torproject.org/pipermail/anti-censorship-team/2022-December/000272.html
https://lists.torproject.org/pipermail/anti-censorship-team/2022-December/000276.html
|
|
|
|
From now on, there will be a file at common/version/version.go that includes current version number.
|
|
|
|
|
|
|
|
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40123
The purpose of the patch is to prevent Pion from opening the mDNS port,
thus preventing snowflake from directly leaking .local candidates.
What this doesn't prevent is the resolution of .local candidates
once they are passed on to the system DNS.
|
|
|
|
Remove client/pt_event_logger.go file as is very minimal.
|
|
To make it safe for logging safelog.Scrub function is now public.
Closes: #40141
|
|
|
|
|
|
gitlab 28651
|
|
This continues to asserts the known version while decoding. The client
will only ever generate the latest version while encoding and if the
response needs to change, the impetus will be a new feature, set in the
deserialized request, which can be used as a distinguisher.
|
|
A follow-up wants to pass in a new property from the ClientConfig but it
would be an API breaking change to NewBrokerChannel.
However, it's unclear why NewBrokerChannel is exported at all. No other
package in the repo depends on it and the known users of the library
probably wouldn't be construct them.
While this patch was being reviewed, a new constructor was added,
NewBrokerChannelWithUTLSSettings, with effectively the same issue.
Both of those exported ones are deleted here.
|
|
Instead of IPC.ClientOffers. This makes things consistent with
EncodeClientPollRequest which adds the version while serializing.
|
|
|
|
|
|
|
|
|