-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Technical Analysis of the IRGFW: Understanding The Iranian Great Firewall #441
Comments
Hi irgfw, What a fascinating report! It offers us an updated view of the censorship situation in Iran. Below are some comments and/or questions: On page 9:
it sounds like a typical blocking based on the TLS fingerprint (see: #54 and https://censorbib.nymity.ch/#Frolov2019a) of the DoH client (YogaDNS). Could you still reproduce it now? On page 25:
We remembered this incident, but we are still not sure what the content of the probe is? Do you have more details about the payload of the probe and the intentions of the censor? On page 30:
This is very interesting. Is the DNS client the yogaDNS you mentioned? What else clients were blocked? On page 36:
Our understanding and observations were that while ESNI has been blocked (see: #43), ECH has not been blocked by the GFW in China (see: #393, #292, and #280). On page 38:
We've heard reports about reduced censorship in Iran, including the unblocking of WhatsApp. Based on your experience, understanding, and expertise, what reasons might the Iranian government have for making such changes? Finally, great job on this detailed and informative report! We are looking forward to seeing more and more reports from you! |
@gfw-report Hi, Thanks.
Yes, it can be reproduced now on major Iranian ISPs. the default ClientHello of the YogaDNS is fingerprinted and blocked.
We did not include more details about Active-Probes in the report because of depreciation of and abandoning of it in the IRGFW system. But: Most of them were malformed HTTP requests. Note: As stated in the report, from Jan 2024 there are no signs of Active-probes at all. That part in the report was just included to show how the IRGFW is evolving and changing over time.
YogaDNS, AdguardDNS, DNSCrypt, Unbound, NextDNS, Technitium, Xray-core (as DNS client), singbox-core (as DNS client) and hysteria2 (as DNS client).
The links are about Cloudflare enabling ECH. but as of December 2024, ECH is unstable in major Chinese provinces as Iran once was following this policy in the past; but now, they are separated. But if you do have more insights about ECH in China, contact me via email.
While the unblocking of platforms like WhatsApp and Google Play may appear as steps toward liberalization, they are likely strategic maneuvers by the Iranian regime to maintain its oppressive control over the populace. These actions should be scrutinized within the broader context of the regime's history of using internet censorship as a tool of repression. An interesting note: After unblocking WhatsApp IP addresses, some of the Instagram/Meta IPs were unblocked too. But because the SNI of Instagram is blocked, if you use Fragmentation on |
Understanding The Iranian Great Firewall
Report 1 - December 2024
The first technical report on IRGFW, titled Technical Analysis of IRGFW: Understanding Iran’s Great Firewall, is now available. This report comprehensively examines the infrastructure and operations of Iran’s Great Firewall.
Key topics covered in this report include the status of DNS, UDP, and QUIC, the state of IPs, active probes, DPI systems, and an overview of various protocols.
This report serves as a thorough and precise resource for those interested in analyzing internet filtering methods in Iran. By sharing and distributing this report, you can raise awareness and foster a deeper understanding of internet censorship in Iran.
Access the full report below for detailed analysis.
The text was updated successfully, but these errors were encountered: