قبلاً با HTTPS باز می شد الان اصلاً بدون هیتلر شکن باز نمیشه!
هیتلر شکن
فکر میکنم منظورت “فیلتر برکر” بود لول
Also, نمدونم
They’re not really using dpi, they’re using MITM to intercept/block your https connection.
This is a pretty resource heavy thing to do, so it’s not used extensively.
For people looking for anti filters, the best thing you can do is a buy a cheap Iranian vps and a cheap non Iranian vps and use stunnel to create a tunnel between the Iranian and non Iranian vps and use ssh or shadowsocks to initiate the connection.
Iran doesn’t do as much deep filtering on server Internet so your anti filters will not go down
“ERR_TIMED_OUT”
Must be DPI.
من الان با ایرانسل وصل شدم بدون فیلترشکن میاد
Why not just buy a cheap non Iranian VPS and “ssh -D” to that?
برای من تا پریروز با https قابل دسترس بود و از دیروز اینجوری شده. شما هم؟
DPI یعنی چی؟ حدوداً میدونم ها ولی فکر نکنم در این مورد صدق کنه. مگر فیلتر کردن https به DPI نیاز داره؟ خب کلاً IP رو فیلتر کنن حله دیگه.
کلاً عجیبه. تا تابستون پارسال که اصلاً فیلتر نبود. بعد http فیلتر شد ولی با https میشد وصل شد. الان هم که دیگه کلاً نمیشه وصل شد.
HTTPS and DPI? In HTTPS the content of the http connection is encrypted. So the “Inspection” is out of the window.
Because Iran messes with house connections ↔ Foreign IPs.
They do not mess with server connections.
What I said is for perfect quality anti filter
DPI yani “Deep Packet Inspection”
یه روش فیلتر کردن است که نه فقط آدرس های آن سایت را بلاک میکنند، بلکه وقتی از آن سایت تماس بگیری، سیستمشان معاشرات با آن سایت را قطع میکنه
In other words, it doesn’t just block the packets based on the address of the sender and recipient, but they actually scan the contents of the information being sent to see what type of communication it is. If they detect that it’s a certain type of traffic, they block it regardless of the exact server you’re connecting to. ISP’s in the US use this to filter/throttle bittorrent.
The only way around this is to enable encryption. HTTPS is encrypted, but they know what site you’re connecting to. The first thing to try is using a custom DNS to make sure that they didn’t just block the URL, and if you still can’t connect (likely the server IP’s are also being filtered), then you really have no choice but to use an encrypted proxy. Although I’m assuming you wanted to avoid the hassle of using a VPN, so try changing your DNS at least.
The inspection happens during the initial negotiation between client and the HTTPS server.
The Ethiopian Telecommunication Corporation, which happens to be the sole telecommunication service provider in Ethiopia, has deployed or begun testing Deep Packet Inspection (DPI) of all Internet traffic. We have previously analyzed the same kind of censorship in China, Iran, and Kazakhstan.
An analysis of data collected by a volunteer shows that they are doing some sort of TLS fingerprinting. The TLS server hello, which is sent by the Tor bridge after the TLS client hello, never reaches the client. We don’t know exactly what they are fingerprinting on, but our guess is that it is either the client hello or the server hello.
Although strict encryption prevents the DPI platform from looking into the packet, there are still plenty of clues for the DPI platform to look at: the source and destination of the traffic, the packet size, and the pattern of packets. For example, a stream of small packets every 20 milliseconds in both directions is almost always a VoIP call.
http://telecoms.com/39718/encryption-will-it-be-the-death-of-dpi/
And very expensive. did you know you have to pay around 4 thou-tomans for every gigabyte traffic (upload and download both count)
They already have DNS poisoning. For example facebook.com resolves to 10.10.34.34
there are still plenty of clues for the DPI platform to look at: the source and destination of the traffic, the packet size, and the pattern of packets
I don’t know but in my book looking at the header of a packet doesn’t really sound “deep”.
That is not the case.
What host are you talking about?