Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Sat, Mar 28, 2015

Twitter: GreatFireChina 各位如果有百度JS被劫持的PCAP抓包,欢迎发送给我们分析。 percyalpha[at] retweet
Twitter: GreatFireChina RT @githubstatus: We are continuing to defend GitHub against a very large DDoS attack. retweet

Fri, Mar 27, 2015

CNNIC censored Google and Mozilla’s posts about CNNIC CA

This week, Google found unauthorized digital certificates for several Google domains, the root CA of which is CNNIC. Google and Mozilla both publicly disclosed this security incident and published blog posts(Google, Mozilla). However, Chinese translations of Google’s and Mozilla's blog posts were censored on the Chinese Internet.

  • William Long is a prominent Chinese blogger on IT and tech. He translated Google’s security post without adding any personal opinions. The Chinese blogpost ranked #1 when searching CNNIC MITM in Chinese on Google and Baidu. He tweeted that he received a phone call from propaganda department demanding the post to be removed immediately. The post was deleted. Google cache is still available.

Twitter: GreatFireChina RT @githubstatus: The DDoS attack is still ongoing, but connectivity is back to normal as we contin... See more at retweet
Twitter: GreatFireChina RT @github: We've deployed our volumetric attack defenses against an extremely large amount of traffic. Performance is stabilizing. retweet
Twitter: GreatFireChina @mac_zhou @yegle 能否给我们发一个抓包? retweet
Twitter: GreatFireChina RT @bitinn: 9/ i expect @GreatFireChina to provide detailed coverage on this matter, as they are the target of this attack. Thx @github for… retweet
Twitter: GreatFireChina 百度统计js被劫持用来DDOS Github retweet
Twitter: GreatFireChina RT @Shippo7: 百度网盘的页面有脚本正在ddos github,录了一段视频 retweet
Twitter: GreatFireChina RT @chenshaoju: @chloerei @bermaniastudios @githubstatus @github China's national firewall hijacks JavaScript to DDoS GitHub
Twitter: GreatFireChina RT @githubstatus: The DDoS attack is amplifying again. We are working to mitigate with all hands on deck. retweet
Twitter: GreatFireChina RT @mac_zhou: 对@yegle 发现的百度JS被植入greatfire的现象进行了抓包跟踪,正常百度服务器返回给我日本VPS的TTL为51, RESP返回HTTP 200 OK的报文的TTL是 47,可以确定的是有中间设备对VPS发了伪造报文。 http://t.c… retweet
Twitter: GreatFireChina RT @chenshaoju: @wenyunchao @mac_zhou @cxqn @yegle @Arctosia 劫持和被劫持的时候,HTTP返回的头部信息里的Server字段是完全不一样的。被劫持的时候是Apache,正常的时候是JSP3/2.0.6。 http://… retweet
Twitter: GreatFireChina RT @bitinn: 如果你没能测出这次基于百度CDN劫持的Github DDoS,别担心,这有个视频演示。 retweet
Twitter: GreatFireChina RT @githubstatus: We've been under continuous DDoS attack for 24+ hours. The attack is evolving, and we're all hands on deck mitigating. retweet
Twitter: GreatFireChina CNNIC censored Google and Mozilla’s posts about CNNIC CA retweet

Thu, Mar 26, 2015

Wed, Mar 25, 2015

Evidence shows CNNIC and CAC behind MITM attacks

Since 2013, we have repeatedly called on major software vendors to revoke CNNIC-issued certificates. Most notably, we raised this issue when we reported on the Cyberspace Administration of China’s (CAC) man-in-the-middle (MITM) attacks on Google, Microsoft’s Outlook, Apple, Yahoo and Github. Mainstream media have reported about these security vulnerabilities before and on March 24, Ars Technica reported on Google’s announcement that they have definitive evidence that CNNIC (China Internet Network Information Center) was behind a new MITM attack on Google.

From our October, 2014 blog post:

Thu, Mar 19, 2015

We are under attack

We are under attack and we need help.

Likely in response to a recent story in the Wall Street Journal (WSJ), we’ve experienced our first ever distributed denial of service (DDoS) attack. This tactic is used to bring down web pages by flooding them with lots of requests - at the time of writing they number 2.6 billion requests per hour. Websites are not equipped to handle that kind of volume so they usually “break” and go offline.

This kind of attack is aggressive and is an exhibition of censorship by brute force. Attackers resort to tactics like this when they are left with no other options.

We are not equipped to handle a DDoS attack of this magnitude and we need help. Some background:

  • The attack started on March 17 and we are receiving up to 2.6 billion requests per hour which is about 2500 times more than normal levels.

Thu, Mar 12, 2015

Collateral Freedom and the not-so-Great Firewall

Recognizing that the authorities have been hesitant to crackdown on our method of circumvention, we have accelerated our expansion of the development of collateral freedom, in three key areas.

Mon, Jan 26, 2015

An Open Letter to Lu Wei and the Cyberspace Administration of China

January 26, 2015

Beijing, China


Mr. Lu Wei

Director of the Cyberspace Administration of the People’s Republic of China 中央网络安全和信息化领导小组办公室主任

Director of the State Internet Information Office 国家互联网信息办公室主任

Deputy Director of the Central Propaganda Department of the Chinese Communist Party 中共中央宣传部副部长

Cyberspace Administration of China,

Floor 1, Building 1,

Software Park, Chinese Academy of Sciences,

4 South 4th Street, Zhongguancun,

Beijing, China, 100190


Dear Mr. Lu,

On January 22, 2015, the Cyberspace Administration of China (CAC), which is under your direct control, wrote a response to a story we published about an MITM attack on Microsoft. In the post, your colleague, Jiang Jun, labelled our accusations as "groundless" and  "unsupported speculation, a pure slanderous act by overseas anti-China forces".

We at take great offense to these comments and we will refute them in this letter.