RPRX
RPRX
> I might be missing something here, but to me blocking 1.1.1.1 on TCP/443 seems more like an attempt to block the WARP website and DoH on 1.1.1.1 than a...
以及如果 GFW 做不到精准封锁所有真 ECH,不能排除的是它很有可能干脆封了那个 extension,就像 ESNI 的遭遇。即使有一天像 Chrome 这样的浏览器默认启用了 ECH,人们也只能进入 chrome://flags 把 ECH 关掉,以换取对境外“正常”网站的直接访问。 *And if GFW can't accurately block all true ECHs, it can't be ruled out that it...
> There are only 1 or 2 OONI measurements of 1.1.1.1 per day from China. Even before today, most of them presented as anomalous, timeout making a TCP connection. 中国...
> I don't think blocking 1.1.1.1 is a noteworthy signal, many DNS over HTTPS servers have been blocked in China. 是的,很多 DoH 早就被封了,还有些一直没被封的可以说是个奇迹,比如 https://1.1.1.1 ,**但 GFW 已经不得不补上这种“漏洞”。** 它在这个时间点开始封锁剩下的 DoH,主要会给刚开始推广的 ECH...
我这边新版的 tor browser 会被 Microsoft Defender 报毒并删除 *The new version of tor browser on my side gets detected and deleted by Microsoft Defender.*
> It's a known issue; or at least, it's being discussed on the Tor forum. It looks like it has to do with tor.exe, nothing related to any changes with...
> * obfs4 Elligator > > * [Non-canonical public key representatives](https://bugs.torproject.org/tpo/applications/tor-browser/40804#note_2834533) > * [One bit always 0 in public key representatives](https://bugs.torproject.org/tpo/anti-censorship/team/91) > * [Public key representatives restricted to a subgroup](https://bugs.torproject.org/tpo/anti-censorship/pluggable-transports/lyrebird/40007)...
关于 fully encrypted protocols 的设计问题,补充一些我在 AEAD 时代的研究: Shadowsocks AEAD 和 Brook 的加密设计存在“响应未关联请求”等问题(这些问题也存在于 Shadowsocks 的流加密中) https://github.com/shadowsocks/shadowsocks-org/issues/183 https://github.com/txthinking/brook/discussions/1164 Shadowsocks、VMess 等协议为了避免握手成为特征,不预先进行握手,为了防重放攻击导致了可被“拒绝服务攻击”的问题 https://github.com/shadowsocks/shadowsocks-org/issues/184 VMess AEAD 未认证 packet length(未默认修复)、结尾发空包(已修复)、客户端没有 drain(已修复)的问题 https://github.com/v2fly/v2ray-core/pull/940 第三点和第二点还可以扩展到 [协议边界探测问题](https://github.com/v2fly/v2ray-core/pull/940#issuecomment-830046764) 和最近聊的 [TLS-in-whatever...
Cloak 的 Client Hello 存在设计失误,可以被检测出异常,该特征与哪个浏览器或哪个版本的指纹无关:https://github.com/net4people/bbs/issues/287#issuecomment-1718887813 但是我们收到了 REALITY 被伊朗 GFW 封锁的报告 https://github.com/XTLS/Xray-core/issues/2778 ,并且 Cloak 似乎没有过于流行以至于会被单独针对,所以伊朗 GFW 可能尚未针对上述小众特征,更有可能是在针对普遍的 IP、域名、流量特征等,它们也会导致 Cloak 被封锁。 此外,我们收到的一份秘密报告称,若对 REALITY 进行特殊的设置,伊朗 GFW 就不会封锁它,但报告者不希望公开这个方法。 *Cloak's Client Hello has a design...
@5e2t 针对河南 GFW 和广州国际出口 GFW 测试过 tlshello 分片:https://github.com/XTLS/Xray-core/issues/2426#issuecomment-1719685919 我的观点是这些分片 **可能可用,但 GFW 并不需要重组它们,目前来说,一个报文只含一部分而不是完整的 client hello 即为异常** *@5e2t tested tlshello fragmentation against Henan GFW and Guangzhou international outbound GFW: https://github.com/XTLS/Xray-core/issues/2426#issuecomment-1719685919* *My view...