-
就像去年大规模封TLS代理那样,通过大量机器学习找出Xray + Tor的一些特别的流量特征来检测出躲在Xray后面的Tor? 我个人觉得一个可能的缓解办法是用Tor的Obfs4网桥来代替Tor的入口节点,即Xray--Obfs4网桥--Tor中间节点--Tor出口节点, |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 3 replies
-
你的意思是不是这样理解,GFW自己买些VPS,按网上教程搭如Xray协议。它的工作人员自己用,自己分析产生的流量,来找特征? |
Beta Was this translation helpful? Give feedback.
-
没研究过 Tor 协议细节,时序特征明显的话当然能揪出来
|
Beta Was this translation helpful? Give feedback.
-
R主席可以预告一下1.8.4与1.8.5的新feature么 |
Beta Was this translation helpful? Give feedback.
-
Tor obfs4 bridges have a rarely used feature for obfuscating packet lengths:
I believe the obfs4 bridge server needs to be specially set up to allow this, by including a configuration option:
The obfs4 bridge client can specify I don't know if anyone has ever tried this. Another option that probably no one has ever tried is to pass Xray traffic through an obfs4 forward proxy: If anyone has the time to experiment, you could experiment with the possibilities here. |
Beta Was this translation helpful? Give feedback.
没研究过 Tor 协议细节,时序特征明显的话当然能揪出来
mux-controller
是一个强大的流量整形器,它可以几乎完全掩盖内层时序特征