Новый любопытный проект: бабайка для роутеров, с GUI и автоматическим подбором стратегии.

https://github.com/DanielLavrushin/b4
https://habr.com/ru/articles/982498/
https://t.me/byebyebigbro

> Работает на Linux - от VPS до роутера на MIPS (OpenWRT, Keenetic, Entware).

> есть поддержка своего b4geoip-файла (обновляется раз в сутки)

> Написан с нуля на Go - хех, это не очередной форк/обертка zapret или других существующих решений.

#ru_vps #byebyeDPI

@limping you could also black said domain, feed it false data and/or use #SSHtunneling instead...
@kkarhan well I have very bad news concerning #SSH :-(
In Russia it can be almost blocked now due to new 16-20 upload block.
Only at several segments till how, but it looks very bad.

@limping maybe adapting the MTU helps?

  • Another option is using meek & webtunnel bridges...
    • @torproject is constantly tweaking stuff in that regard and they do have data [i.e. @ooni] to constantly fight "Great Firewalls"...
The Tor Project | Privacy & Freedom Online

Defend yourself against tracking and surveillance. Circumvent censorship.

@torproject @ooni @kkarhan @limping if you change the MTU it won't work at all, because ISP has strict MTU settings and they are set up on the hardware and one cannot just change it voluntarily,

@iron_bug @torproject @ooni @limping Oh, I forgot that some Russian ISPs do that, and L2TP...

  • I didn't mean fuckibg aroubd with the Router / #CPE but rather one's own system behind an own router (basically double-NATting)

  • I guess #Roskomnadnozr filters for any connection that goes outside #Russia?

@torproject @ooni @kkarhan @limping they filter outgoing and incoming connections from/to abroad. for example, recently I discovered that they cut all the outgoing DNS packets and from the most servers abroad domains with internal domain controller servers were not resolvable, even to public DNS servers like google, etc.
@torproject @ooni @kkarhan @limping I had to manually write down DNS addresses for Fediverse servers in Russia in local DNS settings because they suddenly became not resolvable. I started to check to find out what happened and discovered it was the dirly plays of RKN. the tricky thing was if trying long enough with short UDP requests some packets were passing the filters, but it took like 2 minutes of requests "ddos" and was not acceptable, of course.

@iron_bug @torproject @ooni @limping So I guess you should
git clone https://github.com/greyhat-academy/lists.d.git
then…

Do get yourself equipped with like #Tails and a shitload of #TorBridges.

Forks · greyhat-academy/lists.d

List of useful things. Contribute to greyhat-academy/lists.d development by creating an account on GitHub.

GitHub
@torproject @ooni @kkarhan @limping I'm very picky about software. I build my own Linux distro from sources with my own patches and use only C/C++ software. but I can rewrite many things in C if I really need them. the problem is all that measures are temporary, until they block the next protocol and/or server.

@iron_bug @torproject @ooni @limping yeah.

  • I just have that repo as a useful option when it comes to certain configs.