FINDING · DEPLOYMENT

Starting October 3, 2022, more than 100 users reported simultaneous blocking of TLS-based circumvention servers running Trojan, Xray, V2Ray TLS+WebSocket, VLESS, and gRPC. Blocking was port-specific initially (mainly port 443, but also non-443 ports), then escalated to full IP blocking when users switched ports. Domain names were not added to DNS or SNI blocklists. naiveproxy was notably not affected. The blocking was dynamic in at least some cases (browsers could still reach the port, but circumvention tools could not), strongly indicating protocol-level identification rather than blind port blocking.

From 2022-blocking-tls-circumventionLarge scale blocking of TLS-based censorship circumvention tools in China · full post · 2022 · gfw.report

Implications

Tags

censors
cn
techniques
fully-encrypted-detectdpitls-fingerprintport-blocking
defenses
trojanvmessvless

Extracted by claude-sonnet-4-6 — review before relying.