#33010: Monitor cloudflare captcha rate: do a periodic onionperf-like query to a cloudflare-hosted static site ----------------------------------+------------------------------ Reporter: arma | Owner: metrics-team Type: task | Status: new Priority: Medium | Milestone: Component: Metrics/Exit Scanner | Version: Severity: Normal | Resolution: Keywords: network-health | Actual Points: Parent ID: | Points: Reviewer: | Sponsor: ----------------------------------+------------------------------
Comment (by cypherpunks): Please consider setting up both, IPv4 - & IPv6 only domain. To test them individually. As the exiting IP will be punished differently like another's IP but while it's the same exit, only different protocol. Also important can be the first seen date of a fingerprint. To group out if only "fresh' exit IPs can reaches it's destinations for a short period of time until they are burned with endless troll captcha. This will hopefully help to proof all the frustration and headache that cloudflaw is throughing against all Tor users on daily basis. For every UA not a browser, I guess >90 fail rates. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33010#comment:2> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs