8000 GitHub - dead-man1/gfw_resist_tcp_proxy: knock up GFW IP blockage
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

dead-man1/gfw_resist_tcp_proxy

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

gfw_resist_tcp_proxy

knock up GFW IP blockage

goodbye IP filtering & goodbye GFW mf'er


main Idea -> TCP violation:

  • GFW needs to check every packet against large list of filtered ip in order to drop them
  • since its not practical in huge traffic, they separate tcp handshake (SYN) and check them only.
  • in fact, they only drop SYN packet with blocked ip in both direction.
  • so we can bypass ip filtering by building communication link without tcp handshake.



how important is it?

  • it bypass ip blockage, so it bypass principal core of filtering
  • it change the paradigm of anti-censorship from "hiding traffic" / "escaping blockage" to "drilling whatever blocked"
  • what more can a censorman do after detecting a VPN, beside blocking ip?
  • similar to fragment that bypass filtered Domain/SNI , it operate at the lower network layer
  • no matter which protocol used at upper level, it can drill everything, even blocked port

can GFW block tcp violation method?

  • this method is not based on a bug nor a protocol at application layer
  • it operate on lowest possible layer of network (transport and ip layer)
  • need lots of dedicated Hardware to fight with (not achievable in software)
  • we use TCP ACK/PUSH packets which is 100000X more frequent than SYN
  • they have large list of blocked ip that want to drop
  • they simply cant hold & check every single packet in high speed traffic. (unless with millions of dollar HW investment)

how to run

  • need a VPS
  • need root/admin access in both client & server to modify/send/sniff crafted packet
  • we implement method1 : a prototype for proof-of-concept that can run on both windows & linux
  • its not ready for production yet but we plan to build stable and standalone version in near future

what is Next?

  • next step is to implement on xray-core
  • thus anyone can easily create a "tcp violation" config and revive blocked vps ip

About

knock up GFW IP blockage

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%
0