Any tips on how to connect Tor because it’s heavily blocked here ( non of bridges working for me )
and i heard it’s not safe to use VPN for connecting to Tor
Snowflake proxy. Right now 2026/01/27 04:25:35 UTC there are about 5 connected to mine.
Just a follow-up.
During that 24 period above, there were 2002 connections from IR.
Unfortunately about 30% open and close within 30 seconds which means effectively the sessions failed.
There are many more which fail to make a connection.
Timed out waiting for client to open data channel
I have a lot of connections these days from Iran to my obfs4 bridges. They seen to work correctly without issues. For example, for Turkmenistan is always the same, they work for a few days until authorities block my IPs.
Since yesterday (Jan 28), the censorship is back to the “normal” level. Please try Snowflake:
AMP Cache
snowflake 192.0.2.5:80 2B280B23E1107BB62ABFC40DDCC8824814F80A72 fingerprint=2B280B23E1107BB62ABFC40DDCC8824814F80A72 url=https://snowflake-broker.torproject.net/ ampcache=https://cdn.ampproject.org/ front=www.google.com ice=stun:stun.antisip.com:3478,stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
snowflake 192.0.2.6:80 8838024498816A039FCBBAB14E6F40A0843051FA fingerprint=8838024498816A039FCBBAB14E6F40A0843051FA url=https://snowflake-broker.torproject.net/ ampcache=https://cdn.ampproject.org/ front=www.google.com ice=stun:stun.antisip.com:3478,stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
Netlify
snowflake 192.0.2.3:80 2B280B23E1107BB62ABFC40DDCC8824814F80A72 fingerprint=2B280B23E1107BB62ABFC40DDCC8824814F80A72 url=https://voluble-torrone-fc39bf.netlify.app/ fronts=vuejs.org ice=stun:stun.antisip.com:3478,stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
snowflake 192.0.2.4:80 8838024498816A039FCBBAB14E6F40A0843051FA fingerprint=8838024498816A039FCBBAB14E6F40A0843051FA url=https://voluble-torrone-fc39bf.netlify.app/ fronts=vuejs.org ice=stun:stun.antisip.com:3478,stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
SQS
snowflake 192.0.2.5:80 2B280B23E1107BB62ABFC40DDCC8824814F80A72 fingerprint=2B280B23E1107BB62ABFC40DDCC8824814F80A72 sqsqueue=https://sqs.us-east-1.amazonaws.com/893902434899/snowflake-broker sqscreds=eyJhd3MtYWNjZXNzLWtleS1pZCI6IkFLSUE1QUlGNFdKSlhTN1lIRUczIiwiYXdzLXNlY3JldC1rZXkiOiI3U0RNc0pBNHM1RitXZWJ1L3pMOHZrMFFXV0lsa1c2Y1dOZlVsQ0tRIn0= ice=stun:stun.antisip.com:3478,stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
snowflake 192.0.2.6:80 8838024498816A039FCBBAB14E6F40A0843051FA fingerprint=8838024498816A039FCBBAB14E6F40A0843051FA sqsqueue=https://sqs.us-east-1.amazonaws.com/893902434899/snowflake-broker sqscreds=eyJhd3MtYWNjZXNzLWtleS1pZCI6IkFLSUE1QUlGNFdKSlhTN1lIRUczIiwiYXdzLXNlY3JldC1rZXkiOiI3U0RNc0pBNHM1RitXZWJ1L3pMOHZrMFFXV0lsa1c2Y1dOZlVsQ0tRIn0= ice=stun:stun.antisip.com:3478,stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
Non works!
There’s no connection method that works in iran (direct, obfs4, snowflake, webtunnel, meek).
I’m still getting some connections from IR on my Snowflake.
Examining a 24-hour period ending 2026/02/02 13:48:14 UTC, I get about 558 connections. 30% under 1 minute. The rest from 1 minute+ to 2h30+. Traffic by KB is low.
But lots of connections Timed out waiting for client to open data channel
Still working on a way to count those.
Edited later: I meant working on a way to ID the country, not count them. I can obviously count them.
Thank you.
Bear in mind that Internet blockage is not uniform in their methods.
Spoofing SNI apparently helps (at least for me). This app supports it.
Here’s some urls that works in iran.
google.com scholar.google.com shaparak.ir news.google.com varzesh3.com soft98.ir telewebion.com digikala.com mail.google.com support.google.com email.google.com supermario.corp.google.com aharvesal.ir search.google.com tamin.ir actualities.google.com site.google.com sheets.google.com iranmatlab.ir mizanonline.ir divar.ir
Which Tor bridge with SNI spoofing worked for you?
Snowflake? Webtunnel? Meek or ?
The snowflakes you have provided above. Thank you.
(Here’s a link to newly article published by psiphon group explaining ghe severity and methods of blockage)
Phase Two: Active Ghosting Stage Three: In those initial seconds of connection, the firewall blocks your connection and filters the endpoint
This also seems to work with Snowflake. About 30% for 30 seconds. 36% if I raise the bar to 1 minute
Would be nice to know how. I’m guessing pure UDP to UDP traffic.
edited later:
I analyzed the 2hr+ connections and found (in my logs) that they all seem to go through AS: AS749 United States Department of Defense (DoD)
then 198.18.0.0/15 which is SPECIAL-IPV4-BENCHMARK-TESTING-IANA-RESERVED then give their Iran IP.
Does this mean anything to anyone?