-
Notifications
You must be signed in to change notification settings - Fork 186
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
question about Server side #39
Comments
maybe i should ask this differently. for example, openvpn use its own protocol, and i use openvpn to connect to server and censorship founding out I use openvpn and block packets. what's happend now? geneva attack censorship and find new way? after find way change pocket in the way that openvpn work again? or it need other way of connection that I don't understand? 😑 |
Hi @Nima-abdoli - Geneva is designed to run beneath normal, non-evasion protocols, like HTTP or HTTPS. It works by modifying the underlying packets as they leave to confuse the censor - this means that it doesn't work with VPNs, Telegram, or proxies at all. If we can reliably trigger censorship, then we can use Geneva to try to discover a way to defeat that censorship - can you give me more information about the OpenVPN censorship you're experiencing (and what network you're on?) Feel free to email me if you don't want to share those details publicly. In the meantime, if you want another way through censorship, we're recommending people use Psiphon at this time - they've actually integrated several Geneva strategies, and as far as we know, they are still accessible and functional in Iran. |
Hi @Kkevsterrr I don't know if you know about the news of Iran or not and in past week, I watch two or three interviews about Geneva in YouTube and get a lot of info about new way that they censor internet. before i find Geneva i notice they don't block Ip's and start looking for new protocols to pass censorship and i have found Geneva. now with your Additional explanation and Geneva documents i have better understanding how Geneva work and its great tool for researching about censorship, and implanting founded Strategy in new protocols take time, or maybe i misunderstood something again. about your information you want, last time in 2019(1398 Persian Calander) they cutoff internet completely it was blockage for 24hr, and even internal network, website and services don't work correctly. but this time it's have pattern, from 4pm until 12am censor elevate and i think they reduce bandwidth too. from day one OpenVPN don't work at all no connection. wireguard not work or maybe i don't config server side correctly didn't test it before censorship elevated. shadowsocks works perfectly in morning when censor not elevated(outside 4pm 12am time period). in 2nd and 3rd of October censorship elevated and even shadowsocks not working until yesterday 4th October everything work even OpenVPN, today is 5th of October and it's not in the elevated time period shadowsock work, OpenVPN not working wireguard not sure about it. and i forgot to say this with this time pattern ssh not working to it connect to server but after maybe couple of seconds connection broke. there is different pattern between cellphone internet and house (adsl and other kind). in house before October 2nd shadowsocks work in 24hr and only cell have that time period pattern and now both have it |
forgot to mention public vpn like proton vpn work my own shadowsock server and have time period and adguard vpn i test it yesterday only but someone says it's work even in the time period p.s. this is not my area of expertise i only know concepts |
hi
I don't understand one thing, in the Geneva documents it said, "Geneva runs strictly on one side of the connection (either the client or server side)". my question is, if I run Geneva on my server to make connection just use vpn's or proxy for connecting to the server????
I have OpenVPN, Wireguard and shadowsocks on the server and only shadowsocks work from Iran and many use my server right now i want to ask this before do anything.
The text was updated successfully, but these errors were encountered: