Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Double Middlebox and Chrome's TLS fingerprint blocking in Iran #118

Open
xhdix opened this issue Jun 16, 2022 · 0 comments
Open

Double Middlebox and Chrome's TLS fingerprint blocking in Iran #118

xhdix opened this issue Jun 16, 2022 · 0 comments
Labels

Comments

@xhdix
Copy link
Contributor

xhdix commented Jun 16, 2022

In recent weeks, there have been many reports of VPNs being blocked in Iran. But that is not all. In recent days, the Islamic Republic has blocked Chrome TLS fingerprint towards all Amazon (AWS) IPs (except China) in most networks.

image
image

image

To do better investigate, I gave TraceVis a Client Hello packet for example.com in Chrome, and also changed the destination IP to an Amazon IP:

python ./tracevis.py -p --annot1 "example.com CH chrome" --paris -i "13.226.135.75"

(And I confirmed the question to do TCP Handshake before sending the packet.)

I also ran one with the Firefox packet, then combined the two results:

image

image

Here pink is for the Chrome packet and turquoise is for Firefox. And as shown in the graph, all subsequent requests are null routed after 10.202.6.90. (you can see the interactive graph with HTML file)

Next, I did two more tests.

DNS test (example.com = pink, twitter.com = turquoise) :

python ./tracevis.py --dns -i "13.226.135.75" -m 30 --paris

image

image

As well as a Chrome packet with twitter.com in SNI:

python ./tracevis.py -p --annot1 "twitter.com chrome" -i "13.226.135.75"

image

image

And as shown in the graph, all subsequent requests are null routed before 10.202.6.90.

As a result, it can be concluded that two different middleboxes are in the path.

To me, it looks like: Even Censors Have a Backup: Examining China’s Double HTTPS Censorship System (PDF, Video)
But in Iran

And in some points, it's same as: #39

All tests results (json) and graphs (HTML) and config files (conf) to examine and re-run are attached:

tracevis_data_fpblocking.zip

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants