MCI DPI got super aggressive! #2741
Replies: 4 comments 13 replies
-
I'm using Reality right now with my own domain (steal oneself) on MCI and it just working fine. Stealing SNI will be easily detected by just a simple DNS resolve because your SNI won't resolve to your vps IP. |
Beta Was this translation helpful? Give feedback.
-
This is not about xray or any other VPN servers, MCI is targeting all the suspicious servers and throttle/disallow TLS handshake for those IPs, So any TLS handshake will fail . You can see this using WireShark . TLS handshake has 6 steps, with MCI it never completes and you will see TCP re-transmission till the clients stops
has been affected |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Seems like changing everything on your reality proxies such as IP, SNI, shortId, and public key and private key worked for me, and no more detection after 24 hours whatsoever. I'm hopeful this is the case and something about my config was causing it to be detected that fast (like less than an hour). Edit: I didn't use any SNI like "ghbi.ir" that even works on a blocked server. I've bought a domain and used it as my reality SNI and it's also fallback to a website. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
For the last 10 days until now, we in Iran have been experiencing a massive DPI detection on MCI (not any other ISPs, rest are fine) for xray-core based protocol mostly reality.
It looks like it doesn't matter what IP or SNI you're using or how many are using a proxy server, your IP gets blocked within a few hours no matter how much traffic you have, you just get blocked...(at least this is my experience and people around me)
And you only can send data which means The Xray-cores accepts the connection but cannot send back the response while the IP is blocked, I don't know what the solution is and at this point xray-core or any other protocol is useless... and the only solution is to find a non-block IP address every hour after your server got blocked and again you get blocked... this is the loop we are facing and it is getting more aggressive and more accurate over time. (I think it can be because of people used any IP addresses and made them graylisted)
I think we should step forward towards this situation and find a way to mitigate this because protocols like Reality doing nothing currently.
Is there anything we should do in our configuration or changing the keys/shortIds or what because they seemed to be not working?
Beta Was this translation helpful? Give feedback.
All reactions