GFW-knocker / gfw_resist_http_proxy

knock up gfw active-probe by redirecting to nginx
41 stars 5 forks source link

Security and detectablity #3

Closed free-the-internet closed 1 year ago

free-the-internet commented 1 year ago

As you are using port 80, any encrypted traffic will be observed by the adversary and based on the randomness of data or entropy they can detect the proxy tunnel traffic and then ban it. Also, the headers and all the details in the HTTP packet is obvious to the censor. These data cant be used by the censor? In any case, TLS based proxy is more promising to use in encrypted ports (443, etc) even if they are throttled.

Could you please tell more about the settings and technologies that your setup is using? Do you use any xray/v2ray technology like trojan/vless/vmess? (you are showing some settings, but it is not complete as it just shows TCP)

GFW-knocker commented 1 year ago

@free-the-internet

free-the-internet commented 1 year ago

Thanks for the information. Great work, keep on.

I've done some tests, and I see that HTTP traffic on port 80 encrypted with xray, can be detected easily by GFW, and then if they consider this as a proxy (simple censor rule by entropy analysis as payloads are encrypted anyway) they would ban the proxy server. My question is that how we can prevent this?

GFW-knocker commented 1 year ago

@free-the-internet GFW is heavy platform (software+hardware) bought from china censorman in iran just use it. i promise they have little knowledge if they update , then we update too.

we build "pyprox" for our personal usage without this, server blocked before 5GB usage after using , it reach +700GB to get blocked in some ISP in tehran and after 17 days it reach +4TB and yet not blocked in most cities.