TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

An unidentifiable mechanism that helps bypass the Great Firewall of China

102 pointsby unlit_sparkover 5 years ago

6 comments

netsharcover 5 years ago
This page has more details than the &quot;executive summary&quot; <a href="https:&#x2F;&#x2F;github.com&#x2F;trojan-gfw&#x2F;trojan&#x2F;blob&#x2F;master&#x2F;docs&#x2F;protocol.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;trojan-gfw&#x2F;trojan&#x2F;blob&#x2F;master&#x2F;docs&#x2F;protoc...</a><p>As far as I understand it:<p>1. Client connects to the standard HTTPS port.<p>2. If it provides a packet with the right (encrypted) password, then the server acts as a SOCKS5 proxy.<p>3. If it doesn&#x27;t provide the right password, the server responds like a normal HTTP server over the TLS connection.<p>Seems pretty clever, the hard bit is making sure the passwords don&#x27;t leak and the firewall starts bombarding suspect servers with requests (brute-forcing passwords). Also if there are timing differences between a genuinely confused HTTP server and a &quot;Trojan&quot; server faking the confusion, they&#x27;d figure that out too.<p>Also, things like continuous back-and-forth between the client and a simple webserver would be suspicious, because usually clients send small requests in bursts, get the response, and activity would stop (it doesn&#x27;t apply to streaming sites, obviously, but there the clients won&#x27;t be as chatty either). So things like Skype calls might be easily recognized...
评论 #22063695 未加载
评论 #22065471 未加载
kohtatsuover 5 years ago
I think anything looking to serve China should at least avoid hosting on github pages until encrypted SNI is widely available. When someone visits the online documentation at trojan-gfw.github.io, the FQDN is sent plaintext as part of HTTPS.<p>If the data is plainly on github.com (like the wiki), it would at least require an MITM to see what you are reading. Of course an MITM might be likely in China regardless.<p>It&#x27;s also worth noting the Tor project has done a lot of work in this area: <a href="https:&#x2F;&#x2F;2019.www.torproject.org&#x2F;docs&#x2F;pluggable-transports.html.en" rel="nofollow">https:&#x2F;&#x2F;2019.www.torproject.org&#x2F;docs&#x2F;pluggable-transports.ht...</a>
评论 #22067100 未加载
评论 #22063554 未加载
exabrialover 5 years ago
I don&#x27;t think it would be very difficult for the Chinese government to demand a compromised root cert authority be installed on every device sold there.
评论 #22064449 未加载
评论 #22065073 未加载
rvnxover 5 years ago
&quot;unidentifiable mechanism&quot; I&#x27;m not sure this is actually true.<p>You can determine that it is a VPN by checking the amount of exchanged packets between interval of time (e.g. if 5 kbps are routinely sent every 30 seconds for 5 minutes this is totally abnormal)<p>Another alternative for the government could be to limit the bandwidth and time of hosts who have a big standard deviation in the amount of the packets per second they transmit.<p>So undetectable I don&#x27;t think so and I believe smarter people here can find even better ideas.<p>That being said it&#x27;s a very nice tool, certainly useful in corporate environments as well (except of course, that it&#x27;ll be suspicious that one single host is exchanging so much data and keeping so long connections)
m3kw9over 5 years ago
Maybe subscribe to satellite internet
fnord77over 5 years ago
it took me a few minutes to figure out what &quot;GFW&quot; meant
评论 #22065026 未加载
评论 #22063888 未加载
评论 #22063770 未加载
评论 #22066431 未加载
评论 #22066974 未加载
评论 #22063636 未加载
评论 #22064873 未加载