Note that Rostelecom appears in both lists, under different ASes (12389 is common to both lists). AS 16345 also appears in both lists, but it had only a single normal measurement.
@championquizzer I created a new article on RT to support Russian users. It seems vanilla Tor connections, built-in obfs4, Snowflake, and meek-azure aren't working. So, we should give them some HTTPS bridges (https://bridges.torproject.org). Follow @dcflink and you find the ongoing analysis.
@emmapeel could you translate the RT article to Russian?
According to ValdikSS's tests, yes, it looks like in most cases it is IP address blocking: no response to the client's TCP SYN. This applies even to the IP addresses of ajax.aspnetcdn.com, 152.199.19.160 and 40.118.185.161.
However, in one case, ajax.aspnetcdn.com looks like it's blocked by SNI in the ClientHello, because SNI-less TLS to the IP address works. The measurement site that showed that behavior is located in Yuzhno-Sakhalinsk, in the far east of Russia, far from Moscow, so it may be an unrelated phenomenon.
Today, TPA has received a notice of abuse because the message below was flagged as spam/undesirable and contains a URL of ours.
Reproducing here in case it provides any additional info.
Направляется уведомление о внесении в «Единый реестр доменных имен, указателей страниц сайтов в сети «Интернет» и сетевых адресов, позволяющих идентифицировать сайты в сети «Интернет», содержащие информацию, распространение которой в Российской Федерации запрещено» следующего(их) указателя (указателей) страницы (страниц) сайта в сети «Интернет»: https://www.torproject.org .
В случае непринятия провайдером хостинга и (или) владельцем сайта мер по удалению запрещенной информации и (или) ограничению доступа к сайту в сети «Интернет», будет принято решение о включении в единый реестр сетевого адреса, позволяющего идентифицировать сайт в сети «Интернет», содержащий информацию, распространение которой в Российской Федерации запрещено, а доступ к нему будет ограничен.
Сведения о включении доменных имен, указателей страниц сайтов сети «Интернет» и сетевых адресов доступны круглосуточно в сети «Интернет» по адресу http://eais.rkn.gov.ru .
С уважением,
ФЕДЕРАЛЬНАЯ СЛУЖБА ПО НАДЗОРУ В СФЕРЕ СВЯЗИ, ИНФОРМАЦИОННЫХ ТЕХНОЛОГИЙ И МАССОВЫХ КОММУНИКАЦИЙ.
Запущено официальное мобильное приложение РОСКОМНАДЗОРА.
Посредством мобильного приложения возможно:
Подать жалобу в «Единый реестр запрещенной информации» на обнаруженный в сети «Интернет» запрещенный контент;
Проверить ограничение доступа к интернет-ресурсам;
It is notice of making an entry into the "Unified register of domain names, Internet web-site page links and network addresses enabling to identify the Internet web-sites containing the information prohibited for public distribution in the Russian Federation” the Internet web-site page (s) link (s): https://www.torproject.org .
In case the hosting provider and (or) the Internet web-site owner fail to take these measures, the network address enabling to identify Internet web-sites containing the information prohibited for distribution in the Russian Federation will be decided to be entered into the Register and access will be limited.
The information about entering the domain names, Internet web-site page links and network addresses into the Register shall be available on a 24-hour basis at the following Internet address: http://eais.rkn.gov.ru/en/ .
Federal Service for Supervision in the Sphere of Telecom, Information Technologies and Mass Communications (ROSKOMNADZOR).
The official mobile application of ROSKOMNADZOR has been launched.
Through the mobile application, it is possible to:
Submit a complaint to the "Unified Register of Prohibited Information" about the prohibited content revealed on the Internet;
Check the restriction of access to Internet resources;
@lavamind - you received the message forwarded in an abuse notice? In other words, some third party received an email from Roskomnadzor regarding torproject.org, did not understand what it was about, and reported it as abuse?
What's confusing me is why some random third party is getting notices for torproject.org, rather than the notices going to the whois contact or whatever. Is this the "notification on inclusion of an Internet resource ... if you are its owner or hosting provider" feature of the RKN app that's mentioned? Did someone sign up for notices for torproject.org?
The mentioned «Единый Реестр» "Unified Register" is queryable at https://eais.rkn.gov.ru/en/. A query for "www.torproject.org" returns a response that I don't know how to interpret: one part says "blacklisted" but another says "not restricted".
The requested address is blacklisted
Blacklisting authorization number and date
Blacklisting decision maker
Access restriction
2-1-1373/2017 от [of] 18.12.2017
Саратовский районный суд - Саратовская область [Saratov District Court - Saratov oblast]
доступ не ограничивается [access is not restricted]
https://github.com/zapret-info/z-i is an independent archive of the Unified Register, I believe. I checked it at commit c7cf9b08c7dd49d40ba439a134c11793ecd20e28 (2021-12-06 18:16:45) and did not find "torproject.org", nor the IP addresses "38.229.82.25", "116.202.120.165", "95.216.163.36", "116.202.120.166" listed anywhere.
We are automatically forwarding this complaint on to you, for your information. You do not need to respond, but we do expect you to check the complaint and to resolve any potential issues.
Please note again that this is a notification email only, you do not need to respond.
Metrics are reporting a massive spike in Moat requests (100k). I believe that bridges distributed by Moat aren't working (maybe it was enumerated), and users are trying again and again to get a new bridge line.
But it seems that we're limiting how many bridges you can get via Moat per IP/day. See ValdikSS comment: "obfs4 bridges requested from Tor Browser: no successful connection with 176.170.168.5, 213.135.244.242, 82.65.171.173. This is the only bridge set which Torproject returned, I’ve tried to request multiple times and also disconnected and connected again to the cellular network to change my IP."
ajax.aspnetcdn.com is filtered on even fewer networks than Tor is (still only in Moscow and Saint Petersburg, apparently). For some people for whom Tor is censored, meek-azure may still work.
It's also possible that while torproject.org is universally blocked in Russia, the Tor network is only blocked for a few users.
On the "censored" network, did you try connecting to Tor directly? If it failed, the network is "censored". It could be possible you tested moat on an "uncensored" network, or a network where Tor was "unblocked" (unlikely), since I put in my Moat Bridge IP address into https://blocklist.rkn.gov.ru/ and it didn't show anything.
I connected a Tor browser via a Russian proxy server on Rostelecom (Russian ISP) and could still get on.
I did some investigations on the meek-azure blocking today. We first thought that they blocked ajax.aspnetcdn.com by SNI (which would have been bad enough for collateral damage), but it turns out they blocked the whole IP address 152.199.19.160, which is what domains like ajax.aspnetcdn.com, clientlogin.cdn.skype.com, and many many others resolve to in that region of the world.
I set a line in /etc/hosts to resolve ajax.aspnetcdn.com to a different azure IP address (not really practical as a suggestion for users, but good for doing the test), and meek-azure connected successfully from behind the censorship.
Then @anadahz suggested I try www.santorini-view.com as a front, since it resolves to a different address, and it works as a front out-of-the-box with meek-azure.
Conclusion 1, Russia was happy to sign up for significant collateral damage here. Wonder if they thought that through. Maybe they did (see previous run-ins with Russia and domain fronting).
Conclusion 2, I now believe it makes sense to load up the meek-azure line with a variety of front domains to round-robin among -- and ideally we should pick ones that don't resolve to the same IP address.
but it turns out they blocked the whole IP address 152.199.19.160, which is what domains like ajax.aspnetcdn.com, clientlogin.cdn.skype.com, and many many others resolve to in that region of the world.
Looks like clientlogin.cdn.skype.com now resolves to a different (reachable, working) IP address. But ajax.aspnetcdn.com remains on the same (blocked, not working) IP address.
Update from Dec 13: ajax.aspnetcdn.com still resolves to 152.199.19.160 from a censored location, but now that IP address is reachable from that censored location.
I just did a test launch of Tor using Tor Browser's default meek_lite bridge, and it bootstrapped (albeit super super slowly).
Snowflake is blocked with DPI by recognizing the supported_groups extension in ServerHello that is sent by the pion WebRTC library. This extension is not present in the browser's WebRTC implementation's packet. We have prepared a workaround for this with help from ValdikSS.
Apologies if this is already answered somewhere on the metrics.tpo page, but what is the distributor of the blocked relay? (Default/moat/https/gmail/telegram/riseup)
I believe it is a public relay, i.e. not a bridge, so the distribution mechanism is "the IP address is listed in the public Tor consensus".
So, it does seem like they are freshing some of their IP-based blocks, which we knew was inevitable in the arms race but it's still sad to see it happen.