-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
udp2raw has stopped working, all the faketcp, icmp, udp have stopped working #505
Comments
I don't think it's the "censorship FW" detecting udp2raw. The traffic is already obfuscated with AES or XOR, with AES the traffic looks like random bits from outside. If you suspect the obfuscation is detected, you can try different If fakeTCP is detected by censorship, it's possible since anyway it's not real TCP. But in your case UDP also stops working. udp2raw's UDP mode is not fakeUDP, it's completely legit UDP traffic. Which makes me believe "censorship FW" is not the case even more. If all the 3 modes stop working together, it's very likely some bigger problem that's not limited to udp2raw, it's possible your environment's problem. I would suggest you troubleshoot your enviroment, e.g. try if other tunnels works on your environment. |
By the way, I realized your account is registed less than 1 hour before you post the issue... |
@wangyu- In my first attempt I setup another VPS server abroad which comes with not-filtered internet, let's name this VPS instance udp2raw-client-vps-new. That said, I was able to connect from udp2raw-client-vps-new to udp2raw-server-vps-old without any issues (I got server_ready log on the server side and client_ready on the client side) using both udp and icmp modes. So, I confirmed that my udp2raw-server-vps-old server is a functioning server. In the second scenario I tried to connect my router device that I have setup as my wg+udp2raw client to an unrestricted internet via WAN interface, my router worked fine and connected to udp2raw-server-vps-old for both modes icmp and udp with no issue. So, I confirmed that my router setup and configuration is working fine too. I was only suspected to the my ISP-Filternet which has upgraded its restriction rules and has managed to interfere/block/drop my router connections to the udp2raw-server-vps-old server. In addition I checked whether the VPS provider of the udp2raw-server-vps-old might have blocked connections from my public ISP-Filternet but I was able to ssh and connect to my udp2raw-server-vps-old server directly from the ISP-Filternet. In addition I have tried another ISP-Filternet with different public ip and the result were the same. Furthermore I made another VPS server to work as another udp2raw-server-vps-old server but with different public IP offered from VPS provider since I was suspecting that the VPS provider has blacklisted my_ISP-Filternet_ public ip to connect to my udp2raw-server-vps-old public ip address but even the new instance of the udp2raw-server did not worked. I am almost certain that the blockage is from the ISP-Filternet side. I got into conclusion that the censor-FW has managed to interrupt and block udp2raw. following you could read the logs for the udp mode (on the router when WAN is connected to the ISP-Filternet), By the way I have tried your recommendation and done following on the server side, And I get following logs on the server side, (repeats again and again every five seconds) created new conn,state: server_handshake1,my_id is 59b35775 I would like to hear about any suggestion that could solve this issue. |
Recently my ISP has filtered all the udp2raw modes,
From today on I tried following configurations and all of them have failed.
It seems the censorship FW has managed to detect and block all the transport methods when the client is going to establish a connection to the server.
Kindly let me know if there is any fix for the issues.
I have tried following configurations and all have failed,
Faketcp,
-s
-l 0.0.0.0:5337
-r 127.0.0.1:5336
-k ********
--raw-mode faketcp
-a
--cipher-mode xor
ICMP
-s
-l 0.0.0.0:4337
-r 127.0.0.1:4336
-k ********
--raw-mode udp
-a
--cipher-mode xor
UDP
-s
-l 0.0.0.0:3337
-r 127.0.0.1:3336
-k *************
--raw-mode icmp
-a
--cipher-mode xor
For each of the modes (ICMP,UDP,FakeTCP) there is a wireguard docker container with corresponding exposed port to
handle the connection between any client and the server based on their preferred connection method (Three WG docker containers).
Having that said all the modes used to work well until few hours ago, once I have restart the server the clients tried to reconnect.
For the UDP,FakeTCP modes and all of them have failed to complete the second handshake and none made a client_ready.
For the ICMP mode made the client_ready connection was establisehd but after few seconds it gets dropped with the following error/warning
state back to client_idle from client_ready bc of server-->client direction timeout
As a result the wireguard interface is unable to instantiate with the server remoted docker container and the VPN fails to work.
I have tried following configurations with different modes and all of them failed.
Changing the MTU of the Wireguard interface to 1332,1280,1200,1342 ----> All of them failed
Changing the --seq-mode for both client and server side of the udp2raw to value 2 (--seq-mode 2) for all modes (FakeTCP,UDP,ICMP) ---> all of them have failed
trying --fix-gro on both server/client sides for all the modes ---> didn't work
I am wondering if there is any configuration that I could try in order to make this tunnel to work properly.
There are some suggestions that the AI of the GFW could detect the connection pattern and block it, therefore it might need some
modifications with the packets such as padding I am wondering if any could recommend any solution to this blockage issue?
The text was updated successfully, but these errors were encountered: