QUOTE(zellleonhart @ Aug 7 2024, 12:07 AM)
if I use my own private DoH server, can TM detect and ban it too? or just the public DoH servers?
Also, could be an ignorant question - can ISP actually block port outgoing traffic for port 443 since we need to browse normal websites in https? or DoH uses incoming traffic?
Using the method I described, all endpoint will be dead, including root server. It is the same method China used.Also, could be an ignorant question - can ISP actually block port outgoing traffic for port 443 since we need to browse normal websites in https? or DoH uses incoming traffic?
443 is harder to whack but since all open resolver has port 53, 443 and 853 on the same IP, they just need to whack 53 and 853. 443 will be whacked indirectly because the whole IP is in the DNS blocklist.
Of course you can bypass this by putting a CDN in front of your favorite DoH. Since CDN do not have 53 and 853 open, and they are on shared IP, it is not possible to block them. Using CDN also means you have a unique domain name and they cannot whack you solely based on SNI filtering.
If you use HTTP3 (QUIC), the SNI is "encrypted" with a key sent together in the Hello packet too. The censor will then have to do the extra work of extracting the key to decrypt the SNI. At least to my knowledge China and India all drop QUIC packet as a workaround.
The only trouble is you need a working resolver to bootstrap your domain-fronted DoH. You can ride on the ISP resolver for this one.
This post has been edited by kwss: Aug 7 2024, 12:36 AM
Aug 7 2024, 12:32 AM

Quote



0.0193sec
0.88
6 queries
GZIP Disabled