gfw_resist_HTTPS_proxy
gfw_resist_HTTPS_proxy copied to clipboard
تغییراتی برای رسیدن به سرعت بالاتر
در پروژه شما @GFW-knocker تغییراتی دادم و روی همه ی اوپراتور ها به سرعت بهتری رسیدم. شما هم تست کنید، امیدوارم مفید باشه https://github.com/Ehsanfarahi22/Bypassing-SNI-based-HTTPS-Filtering
تشکر خوب بود حالت محدود یوتیوب را از بین برد یعنی کامنت ها نمایش داده می شود و بقیه مشکلاتش هم برطرف شد فقط با این روش شما گیتهاب بالا نمیاد! با تشکر بابت وقتتون
یوتیوب باز میشه ولی ویدیو ها پخش نمیشن. اینترنت شاتل
try changing these parts first import this
import binascii
def send_data_in_fragment(data , sock): try: data2 = data.split(b"\x16\x03\x01")[1] session_id_len = data2[40] cipher_suite_len = data2[40+session_id_len+2] data2 = data2[40+session_id_len+3+cipher_suite_len:] sni_len = int(binascii.b2a_hex(data2[11:13]),base=16) sni = data2[13:13+sni_len] data = data.split(sni) sock.sendall(data[0]) time.sleep(fragment_sleep) for i in sni.decode(): sock.sendall(i.encode()) time.sleep(fragment_sleep) sock.sendall(data[1]) except: sock.sendall(data) print('----------finish------------')
and change this function maybe improves ...
در پروژه شما @GFW-knocker تغییراتی دادم و روی همه ی اوپراتور ها به سرعت بهتری رسیدم. شما هم تست کنید، امیدوارم مفید باشه https://github.com/Ehsanfarahi22/Bypassing-SNI-based-HTTPS-Filtering
@Ehsanfarahi22 Your hypothesis about server hello packet inspection for famous services using TLS v.1.3 like YouTube is not correct. That's simply because in TLS v1.3, certificate is encrypted. Even some websites that still use TLS v1.2, certificate can be not present in or after server hello. Probably MCI(TCI) ISP has another method that effects fragmentation. @GFW-knocker
Your hypothesis about server hello ...
@free-the-internet if the server hello is analyzed, it would contain a "certificate common name" (which again is nothing but hostname for which the TLS certificate was issued), which might match against the blocklist.
https://0x00sec.org/t/bypassing-sni-filtering-feat-dpitunnel-zapret-and-geneva/31001
see this great analysis mentioned by @Ehsanfarahi22
@Ehsanfarahi22 @free-the-internet i will be glad to keep in touch with you in telegram for faster conversation
Your hypothesis about server hello ...
@free-the-internet if the server hello is analyzed, it would contain a "certificate common name" (which again is nothing but hostname for which the TLS certificate was issued), which might match against the blocklist.
https://0x00sec.org/t/bypassing-sni-filtering-feat-dpitunnel-zapret-and-geneva/31001
see this great analysis mentioned by @Ehsanfarahi22
But this is not the case despite that it is written at your reference. You can try it yourself and see. Specially with TLS v1.3.