Snowflake is known for using WebRTC, but there is a phase called rendezvous before the WebRTC phase. The rendezvous phase and the WebRTC may be attacked separately. In case the default rendezvous (based on domain fronting) is blocked, there is a backup. But there is no easy way to enable the backup: you have to edit a configuration file.
Open the Tor Browser folder and find the torrc-defaults file:
platform | location |
---|---|
linux | Browser/TorBrowser/Data/Tor/torrc-defaults |
windows | Browser\TorBrowser\Data\Tor\torrc-defaults |
osx | Contents/Resources/TorBrowser/Tor/torrc-defaults |
Find the part that says:
## snowflake configuration
ClientTransportPlugin snowflake exec ...
Remove the following options from the line:
-url https://snowflake-broker.torproject.net.global.prod.fastly.net/ -front cdn.sstatic.net
And replace them with these options:
-url https://snowflake-broker.torproject.net/ -ampcache https://cdn.ampproject.org/ -front www.google.com
Leave all the other options the same. Then start Tor Browser, and configure it to use Snowflake as a bridge at about:preferences#tor
.
In place of -front www.google.com
, you can try other Google domains.
For extra debugging information, you can add the options -log snowflake.log -log-to-state-dir
. Search for a file called snowflake.log.
The torrc-defaults file will be overwritten when Tor Browser self-upgrades, and you will have to apply the change again.
Information on how the backup rendezvous works: AMP cache rendezvous#Overview.