Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Info: bebasid tidak dapat jalan di provider Te****sel #463

Closed
icaksh opened this issue Apr 11, 2022 · 4 comments
Closed

Info: bebasid tidak dapat jalan di provider Te****sel #463

icaksh opened this issue Apr 11, 2022 · 4 comments
Assignees
Labels
help wanted Extra attention is needed/Diperlukan ekstra perhatian need information Need information for the issues/Butuh informasi untuk issue-nya.

Comments

@icaksh
Copy link
Collaborator

icaksh commented Apr 11, 2022

Berdasarkan analisis yang telah dilakukan, dapat disimpulkan bahwa untuk beberapa website tertentu dinyatakan tidak dapat diakses dengan menggunakan bebasid dan bebasit

Te****sel telah menggunakan fitur BIG-IP yang memungkinkan untuk dropping paket yang masuk dengan hasil identifikasi dengan menggunakan wireshark
unknown

Dan untuk DoH tidak diblokir oleh provider
image

Tunnelling dengan bebasit, request berhasil tetapi ketika mendapatkan response langsung RESET
image

Perlu diketahui mekanisme penembusan DPI hanya mengubah packet request, untuk packet response tidak difool, sehingga akan di drop oleh ISP

Jalan penembusan blokiran ini hanyalah menggunakan Cloudflare WARP atau VPN Pribadi

Sekian Informasinya

@icaksh icaksh added the wontfix Cannot be done/tidak bisa dikerjakan label Apr 11, 2022
@icaksh icaksh self-assigned this Apr 11, 2022
@icaksh icaksh added the good first issue Good for newcomers/Baik untuk pendatang baru label Apr 11, 2022
@icaksh icaksh pinned this issue Apr 11, 2022
@icaksh icaksh closed this as completed Apr 11, 2022
@ryukora
Copy link
Member

ryukora commented Apr 12, 2022

Ini mungkin bisa ngaruh ke dns bebasid, sebab didalam pengaturan dns nya ada beberapa ditambahkan DNS Google & Cloudflare.

@gvoze32 gvoze32 reopened this Apr 16, 2022
@ryukora ryukora added help wanted Extra attention is needed/Diperlukan ekstra perhatian need information Need information for the issues/Butuh informasi untuk issue-nya. and removed good first issue Good for newcomers/Baik untuk pendatang baru labels Apr 21, 2022
@ryukora ryukora removed the need information Need information for the issues/Butuh informasi untuk issue-nya. label May 15, 2022
@ryukora
Copy link
Member

ryukora commented Jun 20, 2022

Pake powertunnel bisa gak?

@AronEquip
Copy link
Contributor

AronEquip commented Jul 3, 2022

Bisa pake https://github.com/bol-van/zapret

$ cat /opt/zapret/config 
# this file is included from init scripts
# change values here

# can help in case /tmp has not enough space
TMPDIR=/opt/zapret/tmp

# override firewall type : iptables,nftables,ipfw
FWTYPE=nftables

# options for ipsets
# maximum number of elements in sets. also used for nft sets
SET_MAXELEM=522288
# too low hashsize can cause memory allocation errors on low RAM systems , even if RAM is enough
# too large hashsize will waste lots of RAM
IPSET_OPT="hashsize 262144 maxelem $SET_MAXELEM"
# dynamically generate additional ip. $1 = ipset/nfset/table name
#IPSET_HOOK="/etc/zapret.ipset.hook"

# options for ip2net. "-4" or "-6" auto added by ipset create script
IP2NET_OPT4="--prefix-length=22-30 --v4-threshold=3/4"
IP2NET_OPT6="--prefix-length=56-64 --v6-threshold=5"

# number of parallel threads for domain list resolves
MDIG_THREADS=30

# ipset/*.sh can compress large lists
GZIP_LISTS=1
# command to reload ip/host lists after update
# comment or leave empty for auto backend selection : ipset or ipfw if present
# on BSD systems with PF no auto reloading happens. you must provide your own command
# set to "-" to disable reload
#LISTS_RELOAD="pfctl -f /etc/pf.conf"

# CHOOSE OPERATION MODE
# MODE : nfqws,tpws,tpws-socks,filter,custom
# nfqws : nfqws for dpi desync
# tpws : tpws transparent mode
# tpws-socks : tpws socks mode
# filter : no daemon, just create ipset or download hostlist
# custom : custom mode. should modify custom init script and add your own code
MODE=tpws
# apply fooling to http
MODE_HTTP=1
# for nfqws only. support http keep alives. enable only if DPI checks for http request in any outgoing packet
MODE_HTTP_KEEPALIVE=0
# apply fooling to https
MODE_HTTPS=1
# none,ipset,hostlist
MODE_FILTER=none

# CHOOSE NFQWS DAEMON OPTIONS for DPI desync mode. run "nfq/nfqws --help" for option list
DESYNC_MARK=0x40000000
NFQWS_OPT_DESYNC="--dpi-desync=fake --dpi-desync-ttl=0 --dpi-desync-ttl6=0 --dpi-desync-fooling=badsum"
#NFQWS_OPT_DESYNC_HTTP="--dpi-desync=split --dpi-desync-ttl=0 --dpi-desync-fooling=badsum"
#NFQWS_OPT_DESYNC_HTTPS="--wssize=1:6 --dpi-desync=split --dpi-desync-ttl=0 --dpi-desync-fooling=badsum"
#NFQWS_OPT_DESYNC_HTTP6="--dpi-desync=split --dpi-desync-ttl=5 --dpi-desync-fooling=none"
#NFQWS_OPT_DESYNC_HTTPS6="--wssize=1:6 --dpi-desync=split --dpi-desync-ttl=5 --dpi-desync-fooling=none"

# CHOOSE TPWS DAEMON OPTIONS. run "tpws/tpws --help" for option list
TPWS_OPT="--split-pos=1 --hostcase"

# openwrt only : donttouch,none,software,hardware
FLOWOFFLOAD=none

# openwrt: specify networks to be treated as LAN. default is "lan"
#OPENWRT_LAN="lan lan2 lan3"

# for routers based on desktop linux and macos. has no effect in openwrt.
# CHOOSE LAN and optinally WAN NETWORK INTERFACES
# or leave them commented if its not router
# it's possible to specify multiple interfaces like this : IFACE_LAN="eth0 eth1 eth2"
#IFACE_LAN=
#IFACE_WAN=

# should start/stop command of init scripts apply firewall rules ?
# not applicable to openwrt with firewall3+iptables
INIT_APPLY_FW=1
# firewall apply hooks
#INIT_FW_PRE_UP_HOOK="/etc/firewall.zapret.hook.pre_up"
#INIT_FW_POST_UP_HOOK="/etc/firewall.zapret.hook.post_up"
#INIT_FW_PRE_DOWN_HOOK="/etc/firewall.zapret.hook.pre_down"
#INIT_FW_POST_DOWN_HOOK="/etc/firewall.zapret.hook.post_down"

# do not work with ipv4
DISABLE_IPV4=0
# do not work with ipv6
DISABLE_IPV6=0

# select which init script will be used to get ip or host list
# possible values : get_user.sh get_antizapret.sh get_combined.sh get_reestr.sh get_hostlist.sh
# comment if not required
#GETLIST=
rac@racapc:~
$ curl -vs https://reddit.com
*   Trying 151.101.1.140:443...
* Connected to reddit.com (151.101.1.140) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*  CAfile: /etc/ssl/certs/ca-certificates.crt
*  CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: C=US; ST=CALIFORNIA; L=SAN FRANCISCO; O=Reddit Inc.; CN=*.reddit.com
*  start date: Jul  3 00:00:00 2022 GMT
*  expire date: Dec 30 23:59:59 2022 GMT
*  subjectAltName: host "reddit.com" matched cert's "reddit.com"
*  issuer: C=US; O=DigiCert Inc; CN=DigiCert TLS RSA SHA256 2020 CA1
*  SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* Using Stream ID: 1 (easy handle 0x5635055c9270)
> GET / HTTP/2
> Host: reddit.com
> user-agent: curl/7.74.0
> accept: */*
> 
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* Connection state changed (MAX_CONCURRENT_STREAMS == 100)!
< HTTP/2 301 
< retry-after: 0
< location: https://www.reddit.com/
< accept-ranges: bytes
< date: Sun, 03 Jul 2022 17:25:55 GMT
< via: 1.1 varnish
< strict-transport-security: max-age=31536000; includeSubdomains; preload
< x-content-type-options: nosniff
< x-frame-options: SAMEORIGIN
< x-xss-protection: 1; mode=block
< cache-control: private, max-age=3600
< server: snooserv
< report-to: {"group": "w3-reporting-nel", "max_age": 14400, "include_subdomains": true,  "endpoints": [{ "url": "https://w3-reporting-nel.reddit.com/reports" }]}, {"group": "w3-reporting", "max_age": 14400, "include_subdomains": true, "endpoints": [{ "url": "https://w3-reporting.reddit.com/reports" }]}
< nel: {"report_to": "w3-reporting-nel", "max_age": 14400, "include_subdomains": false, "success_fraction": 0.1, "failure_fraction": 0.1}
< content-length: 0
< 
* Connection #0 to host reddit.com left intact
rac@racapc:~
$ 

@ryukora ryukora added need information Need information for the issues/Butuh informasi untuk issue-nya. help wanted Extra attention is needed/Diperlukan ekstra perhatian and removed help wanted Extra attention is needed/Diperlukan ekstra perhatian wontfix Cannot be done/tidak bisa dikerjakan labels Aug 23, 2022
@mangkoran
Copy link
Contributor

mangkoran commented Dec 10, 2022

@RacBallonMC Maaf bertanya, boleh tahu bagaimana cara install dan setup zapret?

@icaksh icaksh closed this as completed Dec 12, 2022
@ryukora ryukora unpinned this issue Dec 18, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed/Diperlukan ekstra perhatian need information Need information for the issues/Butuh informasi untuk issue-nya.
Projects
None yet
Development

No branches or pull requests

5 participants