Running Tor's Snowflake Proxy in Docker

Achtung! Dieser Artikel ist älter als ein Jahr. Der Inhalt ist möglicherweise nicht mehr aktuell!

Due to Iran’s internet blocking I stumbled over Tor’s Snowflake proxy. A pluggable transport plugin based on WebRTC. They work similar to Tor’s bridge and relay system. The standalone proxy which this post is all about is written in golang. Snowflake proxies are not published making it harder to block them. User traffic towards the internet never exits the proxy. The last hop is always a Tor exit node. This makes it easy for people to help without having to deal with abuse reports or worse.
For easy hosting an official Docker image is available.

Links:

I run the following docker compose file on my VPS and at home:

version: "3.8"

services:
    snowflake-proxy:
        image: thetorproject/snowflake-proxy:latest
        network_mode: host
        container_name: snowflake-proxy
        pull_policy: always
        restart: unless-stopped
        command: ["-verbose", "-unsafe-logging", "-summary-interval", "1m"]

My version differs slightly from the official one. I’ve added a command statement enabling logs (the default is absolute silence which is pretty annoying) with summaries every minute and a pull_policy to automatically pull on restart.

I’ve made some observations the last couple of days:


Du hast einen Kommentar, einen Wunsch oder eine Verbesserung? Schreib mir doch eine E-Mail! Die Infos dazu stehen hier.

🖇️ = Link zu anderer Webseite
🔐 = Webseite nutzt HTTPS (verschlüsselter Transportweg)
Zurück