Check your network was influenced by ServerName based censorship deployed at KT on 2019-02-11
Since 2019-02-11, KT started to censor the HTTPS traffic with ServerName header (host:) which is usually used in identifying ServerName in VirtualHosts
Since 2019-02-12, Korea Communications Commission openly admitted that they will censor the HTTPS traffic. Official Tweet from KCC
This software is for detecting any censoring system by sending a HTTPS request to google.com with modified servername in ServerHello Request or host header
According to the inspection of perillamint, KT is sending TCP RST when it's serverName is in the blocked site list.
This script first downloads the blocked url list from firebase firestore database.
(will fallback to offline.ts if there is no internet connection, since KCC is bullshit enough to block GitHub)
And then the script sends a request to google server with downloaded fake serverNames to trigger blocking system.
if you are not influenced by this censorship, you should get invalid cert error from google server since it is not in the certificate alt-name list:
but if you are influenced, your request will be dropped.
First, install some dependencies by npm install
,
Then, start the script via command npm start
install pkg
from npm via npm install pkg
and run npm run-script build-release
Go to Releases to download precompiled binary. (Windows, macOS, Linux for x64 Systems only)
- Typescript, JavaScript that scales!
- request, Easy to use http request library
- Node.JS, A JavaScript Runtine built on V8 Engine
- Firebase, A liberator of backend-developers
- Alex4386 - A pseudo-Programmer
- park012241 - the REAL Programmer
WTFPL