alexbers / mtprotoproxy

Async MTProto proxy for Telegram
MIT License
1.59k stars 351 forks source link

Today TLS FAKE has blocked in Iran #222

Open amidsh1988 opened 4 years ago

amidsh1988 commented 4 years ago

Today TLS FAKE has blocked in Iran, and we can't connect to telegram proxy. Also, another VPN that worked with the TLS protocol doesn't work. What's your solution for that?

erfantkerfan commented 4 years ago

My proxy uses latest stable version and it works.

amidsh1988 commented 4 years ago

My proxy uses latest stable version and it works.

From which source you installed?

FaridAghili commented 4 years ago

@erfantkerfan Can you please share your config.py

Mine doesn't work on ADSL internet, it works on Mobile Data thu.

mimzand commented 4 years ago

@erfantkerfan Can you please share your config.py

Mine doesn't work on ADSL internet, it works on Mobile Data thu.

i have same problem, some body help please!!

HirbodBehnam commented 4 years ago

I'm not really sure about what I'm going to say but this problems might be because of something called "The Whitelister". So what is it? In nutshell, it's a service that allows only some specific packets to reach the server. To be more specific, it allows HTTP, HTTPS and DNS. Also this thing whitelists specific servers. For example hetzner servers. Here is my source: https://geneva.cs.umd.edu/posts/iran-whitelister/

The fake tls mode of mtproto proxy used to actually bypass the whitelister but it seems that they have patched it recently to drop fake tls connection.

Once again I'm not sure about this theory.

P.S: I don't know if there is a solution to bypass the whitelister.

Edit: Just to give you an example, I can connect to my own mtproto server on Eonix Corporation, but I could not do it on Hetzner servers.

amidsh1988 commented 4 years ago

I'm not really sure about what I'm going to say but this problems might be because of something called "The Whitelister". So what is it? In nutshell, it's a service that allows only some specific packets to reach the server. To be more specific, it allows HTTP, HTTPS and DNS. Also this thing whitelists specific servers. For example hetzner servers. Here is my source: https://geneva.cs.umd.edu/posts/iran-whitelister/

The fake tls mode of mtproto proxy used to actually bypass the whitelister but it seems that they have patched it recently to drop fake tls connection.

Once again I'm not sure about this theory.

P.S: I don't know if there is a solution to bypass the whitelister.

Edit: Just to give you an example, I can connect to my own mtproto server on Eonix Corporation, but I could not do it on Hetzner servers.

So, if we run the Mtproto on Eonix or another datacenter, it works??

HirbodBehnam commented 4 years ago

I'm not sure which data centers are ok, but I can confirm MTproto will work on Eonix at least right now.

FaridAghili commented 4 years ago

@HirbodBehnam Thank you, looks interesting :|

What's the website of Eonix? Couldn't find it in Google!

HirbodBehnam commented 4 years ago

I bought my server with Bitcoin via virmach

amidsh1988 commented 4 years ago

I'm not sure which data centers are ok, but I can confirm MTproto will work on Eonix at least right now.

dear Hirbod, you connect by which ISP? our proxy is working by MCI (4G - HamraheAval) only now. I mean you test it by all ISPs?

HirbodBehnam commented 4 years ago

Tested it on pars online, Irancell and Rightel

amidsh1988 commented 4 years ago

Tested it on pars online, Irancell and Rightel

OK, is the Eonix safe? I visit Virmach website for buying VPS, they need personal information such as mobile phone and so on. you take them real info & phone number?

HirbodBehnam commented 4 years ago

I entered my real address and phone. Been using it for 2 years I guess.

ghost commented 4 years ago

It has been suggested that you should use the fake TLS hostname equal to your actual server hostname. One proposed solution is documented here: https://github.com/freejohn123/mtproto-tls-server

FaridAghili commented 4 years ago

@freejohn123 Thanks, got a server running as you explained, let's see how long it survives.

ghost commented 4 years ago

@freejohn123 Thanks, got a server running as you explained, let's see how long it survives.

You're welcome. There is also a discussion and test server for this technique https://t.me/joinchat/CDAbzUY_DnYc3cxsokkikg

FaridAghili commented 4 years ago

@freejohn123 Unfortunately MTProto traffic got blocked in less than 24 hours. Server is still accessible via SSH and browser (nginx html page) but MTProto Proxy doesn't connect.

Well, my bad, it's still working!

ghost commented 4 years ago

Sorry to hear that. Thank you for testing.

FaridAghili commented 4 years ago

@freejohn123 Sorry, just updated my previous comment!

masoudelete commented 2 years ago

@freejohn123 @FaridAghili Hi, Are you still running the same server and has it survived?

FaridAghili commented 2 years ago

@masoudelete No, ofc not. don't have any live server atm.