-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MTProtoProxy Not Working in Iran #25
Comments
I'm facing the same problem. It's not working on mobile network at all. |
Iran blocks MTproto proxy on fly. |
I thought to myself that maybe I should change the title and pin this issue in order to allow people to discuss this issue in only one thread. |
Is there any way to hide packet connections? |
How did they block? I thought because of random padding they are not able to block. |
Anything new? |
I did some work on how Iran blocks Fake TLS and I found some interesting things. I don't think anything is possible from server side to defeat this, because client hello is important. Maybe just maybe updating the Client Hello fingerprint regularly in clients helps users to bypass the whitelister. Also, another good (but more complex) approach is to randomly use a fingerprint. Also there is no need to say that using a real TLS connection will fix most of these problems. Update: It looks like that fake tls is working fine on windows and android. I started a netcat listener on port 443; Telegram iOS didn't transmit any packet but windows and android were fine. I checked windows version fake tls fingerprint using wireshark and it is this |
Maybe a possible way is that host mtproxy in iran server and tunneling the income traffics of proxy server to another server in other nations like germany via openvpn or other solutions. |
there is no way to use ? |
mtproto connect from ADSL but not from the 4G network
The text was updated successfully, but these errors were encountered: