So much for trying to cut off access to most of the internet under the guise of requiring ID

  • fxomt@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    69
    ·
    edit-2
    2 days ago

    Awesome, the middle east has tons of censorship so this will help tons of people. There are many blocked websites in my country and my friends’ nations.

    And while many block VPNs directly i highly doubt they’ll block cloudflare or github, so this should be very hard to prevent.

    • NoneOfUrBusiness@fedia.io
      link
      fedilink
      arrow-up
      27
      ·
      2 days ago

      And while many block VPNs directly

      Wow, and I thought Egypt was bad. Thank God for tech-illiterate authoritarians.

      • fxomt@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        21
        ·
        2 days ago

        Heh they block VPNs, Tor and that type of stuff in Saudi. They block wireguard in Jordan, at least according to my friend there lol

        • h3rmit@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          6
          ·
          edit-2
          2 days ago

          I work IT… how exactly are they blocking wireguard?

          Edit: Okay, I did the search, and as I guessed, they do not. Users seem to report UDP blocking and throttling in general, not wireguard (I’m not sure that would be possible). It’s not even particularly confirmed though.

          • CumBroth@discuss.tchncs.de
            link
            fedilink
            arrow-up
            12
            ·
            edit-2
            1 day ago

            They do block Wireguard. They use DPI (Deep Packet Inspection) at the national level (it’s as expensive as it sounds). They filter and monitor all traffic. Once you have something as invasive as DPI in place, Wireguard becomes rather easy to detect, because it doesn’t hide the fact that you’re establishing a tunnel (its purpose is just to obscure the data being tunneled).

            According to the specification, a specific sequence of bytes (Handshake Initiation packet) is sent by the “client” to negotiate a connection, and a Handshake Response is sent back by the “server”. The handshake packets used to negotiate a connection are basically a recognizable signature of the Wireguard protocol, so if you are able to analyze all outgoing and incoming packets (which DPI enables you to do), you can monitor for these signature packets and block the connection attempt.

            There are variants of the Wireguard protocol that can circumvent this method of censorship (Amnezia Wireguard is one example), but they only work as long as they stay under the radar and don’t see mass adoption. Their own “signatures” would also just get blocked in that case.

            Ultimately, bypassing this level of censorship just isn’t something Wireguard was created for. Wireguard assumes you are only concerned with obscuring your traffic, not hiding the fact that you’re using a VPN. There are better tools for this job, like this: https://www.v2fly.org/en_US/

            Edit: Better link with the language set to English