Replies: 1 comment
-
The problemChina and Iran's GFW have a bunch of systems to detect and drop connections, one of which is the live packet sniffing system. TLS (SSL)Let's first see how a TLS handshake works The packet they are sniffing is the ClientHello packet. Which is structured like this: Plain HTTPThe same goes for plain HTTP, but this time, there is no SolutionThere is a big issue with these "live" systems. There are too many packets, and holding on to previous packets puts a huge toll on these systems as there are a lot of source-destination IP pairs. TLSThere is a solution for "large packets" is network layer 3 (IP Layer): Fragmentation Let's say I'm sending a packet of size Relying on GFW's inability to hold previous fragments of a ClientHello packet, we'll create artificial fragments from a ClientHello packet. Plain HTTPWhen the host header is seen, split the packet into 2 from the middle of the value of that host. DNSPlain DNS requests are sniffable (and hijackable). So we can use DNS over HTTPS and DNS over TLS to tackle this issue. ReferencesFragmentation image source: https://en.wikipedia.org/wiki/IP_fragmentation |
Beta Was this translation helpful? Give feedback.
-
"we send it in 2 parts: first comes GET / HTTP/1.0 \n Host: www.you and second sends as tube.com \n .... In this example, ISP cannot find blocked word youtube in packets and you can bypass it!"
-This works because we still have the real ip of the server while the domain name can be used by the server to find out which service it's hosting right ?
"GreenTunnel use DNS over HTTPS and DNS over TLS to get real IP address and bypass DNS Spoofing."
-DNS HTTPS to a neutral non blocking DNS like cloudflare 1.1.1.1 ?
pls help :D
Beta Was this translation helpful? Give feedback.
All reactions