mirror of
https://github.com/ValdikSS/GoodbyeDPI.git
synced 2024-11-21 17:45:24 +01:00
New modes: -8 and -9
-8 is -7 with added --wrong-seq, it sends two subsequent fake packets, one with incorrect sequence, and another one with incorrect checksum. -9 is -8 with QUIC block.
This commit is contained in:
parent
f1aece75ae
commit
f7362094d3
@ -81,6 +81,10 @@ Modern modesets (more stable, more compatible, faster):
|
|||||||
-5 -f 2 -e 2 --auto-ttl --reverse-frag --max-payload (this is the default)
|
-5 -f 2 -e 2 --auto-ttl --reverse-frag --max-payload (this is the default)
|
||||||
-6 -f 2 -e 2 --wrong-seq --reverse-frag --max-payload
|
-6 -f 2 -e 2 --wrong-seq --reverse-frag --max-payload
|
||||||
-7 -f 2 -e 2 --wrong-chksum --reverse-frag --max-payload
|
-7 -f 2 -e 2 --wrong-chksum --reverse-frag --max-payload
|
||||||
|
-8 -f 2 -e 2 --wrong-seq --wrong-chksum --reverse-frag --max-payload
|
||||||
|
-9 -f 2 -e 2 --wrong-seq --wrong-chksum --reverse-frag --max-payload -q
|
||||||
|
|
||||||
|
Note: combination of --wrong-seq and --wrong-chksum generates two different fake packets.
|
||||||
```
|
```
|
||||||
|
|
||||||
To check if your ISP's DPI could be circumvented, first make sure that your provider does not poison DNS answers by enabling "Secure DNS (DNS over HTTPS)" option in your browser.
|
To check if your ISP's DPI could be circumvented, first make sure that your provider does not poison DNS answers by enabling "Secure DNS (DNS over HTTPS)" option in your browser.
|
||||||
|
@ -648,7 +648,7 @@ int main(int argc, char *argv[]) {
|
|||||||
max_payload_size = 1200;
|
max_payload_size = 1200;
|
||||||
}
|
}
|
||||||
|
|
||||||
while ((opt = getopt_long(argc, argv, "1234567pqrsaf:e:mwk:n", long_options, NULL)) != -1) {
|
while ((opt = getopt_long(argc, argv, "123456789pqrsaf:e:mwk:n", long_options, NULL)) != -1) {
|
||||||
switch (opt) {
|
switch (opt) {
|
||||||
case '1':
|
case '1':
|
||||||
do_passivedpi = do_host = do_host_removespace \
|
do_passivedpi = do_host = do_host_removespace \
|
||||||
@ -689,6 +689,12 @@ int main(int argc, char *argv[]) {
|
|||||||
do_wrong_seq = 1;
|
do_wrong_seq = 1;
|
||||||
max_payload_size = 1200;
|
max_payload_size = 1200;
|
||||||
break;
|
break;
|
||||||
|
case '9': // +7+8
|
||||||
|
do_block_quic = 1;
|
||||||
|
// fall through
|
||||||
|
case '8': // +7
|
||||||
|
do_wrong_seq = 1;
|
||||||
|
// fall through
|
||||||
case '7':
|
case '7':
|
||||||
do_fragment_http = do_fragment_https = 1;
|
do_fragment_http = do_fragment_https = 1;
|
||||||
do_reverse_frag = do_native_frag = 1;
|
do_reverse_frag = do_native_frag = 1;
|
||||||
@ -961,6 +967,9 @@ int main(int argc, char *argv[]) {
|
|||||||
" -5 -f 2 -e 2 --auto-ttl --reverse-frag --max-payload (this is the default)\n"
|
" -5 -f 2 -e 2 --auto-ttl --reverse-frag --max-payload (this is the default)\n"
|
||||||
" -6 -f 2 -e 2 --wrong-seq --reverse-frag --max-payload\n"
|
" -6 -f 2 -e 2 --wrong-seq --reverse-frag --max-payload\n"
|
||||||
" -7 -f 2 -e 2 --wrong-chksum --reverse-frag --max-payload\n"
|
" -7 -f 2 -e 2 --wrong-chksum --reverse-frag --max-payload\n"
|
||||||
|
" -8 -f 2 -e 2 --wrong-seq --wrong-chksum --reverse-frag --max-payload\n"
|
||||||
|
" -9 -f 2 -e 2 --wrong-seq --wrong-chksum --reverse-frag --max-payload -q\n\n"
|
||||||
|
"Note: combination of --wrong-seq and --wrong-chksum generates two different fake packets.\n"
|
||||||
);
|
);
|
||||||
exit(EXIT_FAILURE);
|
exit(EXIT_FAILURE);
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user