-
-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Traffic obfuscation to bypass firewall #1914
Comments
I can't even publish my blog without connecting peers through proxy now. |
For me looks like shadowsocks is a socks5 proxy, so you should able to use it with --proxy 127.0.0.1:1080 |
Nope. I mean each peer should use shadowsocks as reverse proxy. It's a tunnel |
Are any of the trackers working for you? Do you have 1.tracker.eu.org in the tracker list? What do you see if you visit https://1.tracker.eu.org in the browser? (there should be a big welcome message) Do you have port opened? |
That's not about trackers. There're hardly any peers connected on my blog. IPFS nodes are also banned by GFW here No open port |
@shortcutme ZeroNet is almost dead in China |
still under draftTHIS IS URGENT . ZN IS DYING OUT of CHINA we can seperate Chinese ZN users into 2 categaries, one with a proxy (ss,ssr,v2ray,brook and so on),the other one don't. and it's easy for the first categary to connect to trackers and other peers. so my idea is under such assumption "local ISPs dont have same capabilities as of GFW",so a Chinese obfs plugin might work just to bypass ISPs, and A Chinese obfs plugin might offer such following sub-functions. subfun A. basic obfs tunnel for "virgin" client. 1.this sub func offer simple obfs without need a zeroname ID and work on fixed port and pre-defined encryption algo .fixed port same as mostly common port used in China to p2p servers, such as 2.once a new "virgin" client has been actviated for the first time ,it can send its registering request using this predefined encryption protocal to other 5 relay peers, 3.and relay peers will decrypt the registering request and forward it to the zeroname server using its own proxy.once registered ,a "virgin" peer will go to step 2nd. subfunc B. dynamic and varified obfs for peers to peers communications in subfuncA a "virgin" will got mature and send and receive encrypted streams for later communications.
since this algo is much more complex in de/encryption, new version of pypy should be considered(pypy and uvloop is fast as golang in async as reported ) |
@HelloZeroNet this may help a bit |
@blurHY, @emacsenli, try Rev3860. |
Note that all current IP addresses of ZeroNet peers may be blocked in China, and it's better to test new obfuscation changes on new peers. For example, you can set up ZeroNet on a VPS, with bootstrap plugin, and test if it's connectable from China. |
According to my test it does not blocks the ips, but the ip:port combination, so changing to other port can be sufficient |
@HelloZeroNet at least two of my IP addresses no longer respond to ICMP (ping) accorting to ping.pe. |
I just changed my port and according to http://port.ping.pe/ it can be connected again from china regions. But it's possible that different isp/regions has different blocking |
I used to setup a blog on Vultr. GFW blocked ssh connections after a few days, but port 80 remains available. That's weird |
So, did this help? Does ZeroNet work in China? |
My ip is still banned, so maybe the filter is not based on network traffic patterns. |
Chinese millions of coders use obfs tunnel to resist gfw. |
Recently, GFW started to block peers. As Chinese developers have to bypass GFW to visit some sites, so we developed various protocols to achieve it. The protocols are strong enough to cheat GFW.
So, just integrate them into zeronet.
@shortcutme
DHT with traffic obfuscation is the solution
The text was updated successfully, but these errors were encountered: