TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How China Detects and Blocks Shadowsocks

8 点作者 JayXon超过 5 年前

1 comment

LinuxBender超过 5 年前
Suggestion to the folks in China: Consider using a combination of port knocking and conditional DNAT&#x27;s in iptables, so that legit sources port knocking with the right key will go to shadowsocks and probes will go to something that could be mistaken as it, but is harmless in the eyes of those managing the GFW.<p>There is a tool that does something similar, SSLH [1], that will route SSH, HTTPS and VPN traffic to the right daemon. Similar idea, different implementation. Perhaps you could contact the author and have them add support for Shadowsocks. Then have two daemons, the legit Shadowsocks, and a dummy daemon that is something else. Perhaps even get the devs for SS and SSLH to brainstorm together on this.<p>[1] - <a href="https:&#x2F;&#x2F;github.com&#x2F;yrutschle&#x2F;sslh" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;yrutschle&#x2F;sslh</a>