Blocking tools updated in China TLS encryption no longer
Software

Blocking tools updated in China – TLS encryption no longer helps

Chinese censors have updated resource blocking tools, making it much more difficult for tools to bypass them based on TLS encryption. said Great Firewall Report (GFW) community. According to him, after October 3, more than 100 users reported the termination of at least one of the existing tools.

    Image source: F8_f16 / pixabay.com

Image source: F8_f16 / pixabay.com

In particular, the effectiveness of the Trojan TLS protocol, similar VPN tools like Xray, V2Ray TLS+Websocket, VLESS and gRPC has been greatly reduced. According to GFW, the system blocks certain ports used by services to bypass restrictions. However, if a user tries to change the port to a free one, the system will block the entire IP address. It is noteworthy that the Chinese censorship did not blacklist the addresses of these tools in DNS and SNI, and blocking, apparently, occurs automatically in dynamic mode – it is possible that their TLS signature is taken into account. At the same time, naiveproxy, another means of bypassing restrictions, continues to work.

This week, GFW also reported that China has banned the domain google.com and all of its subdomains. At the same time, google.cn will be redirected to google.com.hk and the latter will be blocked again in mainland China. And Google, in turn, was forced to shut down the online translator in China due to censorship. The tightening of lockdown measures is said to be related to political events in the country, The Register writes: The 20th Congress of the CCP opens next week, so official Beijing decided to act proactively.

RELATED TOPICS

About the author

Robbie Elmers

Robbie Elmers is a staff writer for Tech News Space, covering software, applications and services.

Add Comment

Click here to post a comment