====== proxy ====== * PPTPD [[http://fuliba.net/bandwagon-host.html|马睿推荐的]] * [[VPS]] * ssh proxy: ssh -D localhost:3333 user@server.com # 登录之后,设定浏览器的socks代理端口为 localhost:3333,就能单独浏览器翻墙了 # 但是ssh翻墙会被GFW识别出并封端口 ===== GFW ===== * [[https://docs.google.com/document/d/1mmMiMYbviMxJ-DhTyIGdK7OOg581LSD1CZV4XY1OMG8/edit|翻墙路由器的原理与实现]] 需翻越墙 * **fqrouter ** android. * 封 IP, BGP 协议? * DNS 劫持 * TCP RST阻断 * 封端口 ===== 可能有用 ===== * [[https://news.ycombinator.com/item?id=10547264|IP traffic over ICMP tunneling]], [[https://github.com/DhavalKapil/icmptunnel|github repo]] ===== Tools ===== * sockscap64 * [[https://github.com/netchx/netch|netch]] * [[https://netfiltersdk.com/help/nfsdk2/|net filter sdk]] * [[https://bbs.pediy.com/thread-268515.htm|Windows驱动编程之NetFilter SDK]], [[https://bbs.pediy.com/thread-268468.htm|Windows驱动编程之WFP/TDI]] ==== 加密 ==== * AEAD: Authenticated Encryption with Associated Data, 同时具备保密性,完整性和可认证性的加密形式, 常见的 AEAD 算法如下: * AES-128-GCM * AES-192-GCM * AES-256-GCM * ChaCha20-IETF-Poly1305 * XChaCha20-IETF-Poly1305 * 对于精简指令集的ARM平台,由于没有AES-NI指令集,ChaCha20-Poly1305在同等配置的手机中表现是AES的4倍 * ARM v8之后加入了AES指令,所以在ARM v8平台上的设备,AES方式反而比chacha20-Poly1305方式更快,性能更好