wangyu- / udp2raw

A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
MIT License
7.16k stars 1.16k forks source link

udp2raw被识别了? #446

Open frostashe opened 1 year ago

frostashe commented 1 year ago

先被封端口一次,昨天ip被封了

bigmammoth commented 1 year ago

什么时候被封的端口?前几天耳屎大的时候我这里的V2RAY全挂,只有用UDP2RAW的活下来了。

frostashe commented 1 year ago

什么时候被封的端口?前几天耳屎大的时候我这里的V2RAY全挂,只有用UDP2RAW的活下来了。

[2022-11-23 09:44:01][INFO]state back to client_idle from client_ready bc of client-->server direction timeout [2022-11-23 09:44:02][INFO]source_addr is now [ip] [2022-11-23 09:44:02][INFO]using port 47153 [2022-11-23 09:44:02][INFO]state changed from client_idle to client_tcp_handshake [2022-11-23 09:44:02]INFOsent tcp syn [2022-11-23 09:44:02][INFO]state changed from client_tcp_handshake to client_handshake1 [2022-11-23 09:44:02]INFOsent handshake1 [2022-11-23 09:44:02][INFO]changed state from to client_handshake1 to client_handshake2,my_id is f55323d7,oppsite id is 826370a2 [2022-11-23 09:44:02]INFOsent handshake2 [2022-11-23 09:44:02][INFO]changed state from to client_handshake2 to client_ready [2022-11-23 09:44:15][INFO]state back to client_idle from client_ready bc of client-->server direction timeout [2022-11-23 09:44:15][INFO]source_addr is now [ip] [2022-11-23 09:44:15][INFO]using port 56007 [2022-11-23 09:44:15][INFO]state changed from client_idle to client_tcp_handshake [2022-11-23 09:44:15]INFOsent tcp syn [2022-11-23 09:44:15][INFO]state changed from client_tcp_handshake to client_handshake1 [2022-11-23 09:44:15]INFOsent handshake1 [2022-11-23 09:44:15][INFO]changed state from to client_handshake1 to client_handshake2,my_id is f987f340,oppsite id is fff1b9df [2022-11-23 09:44:15]INFOsent handshake2 [2022-11-23 09:44:15][INFO]changed state from to client_handshake2 to client_ready [2022-11-23 09:44:28][INFO]state back to client_idle from client_ready bc of client-->server direction timeout [2022-11-23 09:44:28][INFO]source_addr is now [ip] [2022-11-23 09:44:28][INFO]using port 30638 [2022-11-23 09:44:28][INFO]state changed from client_idle to client_tcp_handshake [2022-11-23 09:44:28]INFOsent tcp syn [2022-11-23 09:44:28][INFO]state changed from client_tcp_handshake to client_handshake1 [2022-11-23 09:44:28]INFOsent handshake1 [2022-11-23 09:44:28][INFO]changed state from to client_handshake1 to client_handshake2,my_id is f8c2044f,oppsite id is 6e9af9f0 [2022-11-23 09:44:28]INFOsent handshake2 [2022-11-23 09:44:28][INFO]changed state from to client_handshake2 to client_ready

gpg88 commented 1 year ago

I think udp2raw packet should be padded to avoid AI detection. Just padding the first few initial packets might help, and set mtu to different size