標題: GFW of China able to "learn, discover and block" encrypted VPN traffic [打印本頁] 作者: homeinns 時間: 2014-3-18 11:26 標題: GFW of China able to "learn, discover and block" encrypted VPN traffic
VPN blocking is technology used to block the encrypted protocol tunneling communications methods used by Virtual Private Network (VPN) systems.
It can be used as a tool for either computer security or Internet censorship, by preventing the use of VPNs to bypass network firewall systems.
Starting late 2012, the Great Firewall of China became able to "learn, discover and block" the encrypted communications methods used by a number of different VPN systems.
China Unicom, one of the biggest telecoms providers in the country, is now blocking connections where a VPN is detected, according to one company with a number of users in China.[1]
The government of Iran has also been reported to be using VPN blocking technology.[2]
因此我很懷疑, 駐扎在中國電信 ISP 的網絡警察的超級過濾電腦,監控每一粒 IP 的 Port 1723 的 Data Flow. (低流量就可以通過),但一些不正常持續的 Data Flow (例如 偷偷冒死的偷看那些香港反動的 NOW Live News), 就 Drop 這粒 IP 的 Port 1723 的 Connection (Block 死,至少罰停賽 10多分鐘, 令到你十分無癮)
這些干擾是非常 賤格,但又不能夠全封殺 Port 1723 (因爲有很多 Mobile Worker 在 Home-Office 與辦公室的聯係工具),但這些 Office Commerical Application, 在家庭寬帶上,Data 流量跟我看 那香港極爲反動的 NOW Live TV 是絕對沒有得 fight 的。
最近我國内辦公室的 Port 5060 的免費中港 VoIP 電話又是受到同樣的干擾,只可以講 5~10 分鐘 Data Flow 到達網絡警察訂定的流量上限,就 Cut-綫。 (他媽的, TIC, This is China)
但我用一個很簡單,很原始的辦法就破解了這個 VoIP Port 5060 的流量限制封鎖。
我把 VoIP Traffic 套進一條 24x365 的中港 Site-to-Site VPN Tunnel.
那就是説,通過這條 Site-to-Site 的中港 VPN Tunnel, 我的國内 VoIP 電話 ATA 雖然身在曹營,但它其實虛擬地已經返回香港這個文明和自由的世界。(跟資訊鐵幕完全是兩碼子的地方)