-
Notifications
You must be signed in to change notification settings - Fork 95
Description
We have discussed the Chinese company Geedge Networks (积至). Last year, there was the news that Geedge had provided equipment for VPN blocking in Myanmar. One of the founders of the company is 方滨兴 (Fang Binxing), the famous "father of the Great Firewall". Another Geedge principal, 郑超 (Zheng Chao), is a coauthor of censorship-related research papers we have discussed: #275, #282, #444.
Today, there are many news articles and reports about a leak of Geedge Networks internal documents, including from Jira (bug tracker), Confluence (wiki), and GitLab (source code). They say that several news organizations and technologists have worked together for a year to analyze the documents. This is the primary reporting from the people who worked directly with the documents, as best as I have been able to determine:
- The Globe and Mail: Leaked files show a Chinese company is exporting the Great Firewall's censorship technology (archive)
- Der Standard: Wie China seine Totalüberwachung des Internets ins Ausland exportiert (archive)
- Follow the Money: China exports censorship tech to authoritarian regimes – aided by EU firms (archive)
- InterSecLab: The Internet Coup (archive) PDF 76 pages (archive)
- Amnesty International: Shadows of Control: Censorship and mass surveillance in Pakistan (archive) PDF 102 pages (archive)
- Justice for Myanmar: Silk Road of Surveillance (archive) PDF 47 pages (archive)
As far as I can tell, the actual contents of the leak have not been made public. Even so, there is a lot of information across these public articles and reports. They include, at least, evidence of exports to other contries including Myanmar, Pakistan, Ethiopia, Kazakhstan, and at least one other unidentified country; operation in the Chinese provinces of Xinjiang, Jiangsu and Fujian; technical information about Geedge's products; and collaboration with MESA, a research lab at the Chinese Academy of Sciences.
Activity
[-]Leak of Geedge Networks internal documents (100,000+ from Jira, Confluence, source code)[/-][+]Leak of Geedge Networks internal documents (100,000+ from Jira, Confluence, GitLab)[/+]wkrp commentedon Sep 11, 2025
Here are notes and highlights from the three news articles.
The Globe and Mail: Leaked files show a Chinese company is exporting the Great Firewall's censorship technology
The leak of internal documents shows that Geedge works directly with governments and ISPs to install products for censorship and surveillance. They offer capabilities including tracking users' locations and network access history, and blocking services and circumvention systems.
Geedge is involved in at least five other countries: Kazakhstan, Ethiopia, Myanmar (#369), Pakistan, and an unidentified one known only by the codename A24. Kazakhstan was an early customer after being founded in 2018.
Myanmar is treated specially in the Justice for Myanmar Silk Road of Surveillance report. Pakistan is treated specially in the Amnesty International Shadows of Control report.
About Pakistan, this Globe and Mail article says that Geedge installed their new systems, including the Tiangou Secure Gateway (TSG), on existing equipment left behind by Sandvine. (Sandvine is now called AppLogic.)
The article cites the same hiring advertisement that was posted in #369 (comment) that mentions a further four countries: Malaysia, Bahrain, Algeria, and India:
Besides foreign contries, the documents show Geedge involvement in the Chinese provinces of Xinjiang, Jiangsu, and Fujian. This could be a sign of a more distributed, regional, firewall system, as has been discussed in relation to Henan in threads such as #416 and "A Wall Behind a Wall".
Geedge is closely aligned with MESA, a research lab at the University of the Chinese Academy of Sciences. We have previously mentioned MESA at #471 (comment), in a reading group post about MESA's "SAPP" network analysis platform. Geedge's chief technology officer 郑超 (Zheng Chao) was a co-founder of MESA in January 2012.
The company does individualized research on circumvention systems and VPNs in order to block them.
Der Standard: Wie China seine Totalüberwachung des Internets ins Ausland exportiert
Machine translation into English: How China is exporting its total surveillance of the internet abroad
This article lists additional capabilities of Geedge's technology, beyond tracking users and blocking access: injection of malware into HTTP sessions, and directly launching DDoS traffic volume attacks.
It has the same information about Geedge software being deployed on repurposed Sandvine hardware in Pakistan. Evidently, Geedge places a priority on decoupling software from hardware.
A French company, Thales Group, provides license enforcement to Geedge. Geedge used at least one server in Germany for the purpose of software downloads. (Perhaps to avoid interference by the GFW, if the download server had been hosted in China.)
Follow the Money: China exports censorship tech to authoritarian regimes – aided by EU firms
This article gives an outline of various Geedge products, which may be sold to customers in a bundle or selectively. Cyber Narrator is a kind of high-level dashboard that nontechnical users can interact with directly. Tiangou Secure Gateway (TSG) is the actual network surveillance and blocking device. TSG Galaxy is a data storage and analysis pipeline. Network Zodiac is a manager and monitor for the other systems.
There may be may more installations of Geedge equipment such as TSG than even the countries mentioned in this leak, because Geedge's public marketing web site says "40+ global service providers":
A Geedge support ticket from February 2023 has to do with blocking social media in Ethiopia. This correlates with known blocking (#210) in Ethiopia at the time.
At least one Jira support ticket shows evidence of plaintext capture of email:
6 remaining items
wkrp commentedon Sep 15, 2025
wangmeiqi/obfs4_verify
This looks like a couple of rudimentary active probers for obfs4. They take a bridge IP:port and the bridge's out-of-band "cert" information (which is assumed to be known) and try handshaking with the server to see if it responds the way an obfs4 bridge would.
obfs4验证文档.docx is a document that explains the purpose of the project, walks through the steps of the obfs4 handshake, and comments on the Go code.
The file testverify.go is a Go version of the prober. It consists mainly of code copied from transports/obfs4/obfs4.go and transports/obfs4/handshake_ntor.go in the original obfs4proxy source code, along with a small main function to attempt a handshake with a hardcoded bridge.
testverify.py and verify_obfs4.py look like 2 different revisions of a Python version of the prober. It may be a translation of the Go into Python, because I don't recognize the implementation. testverify.py has the same 2 bridge addresses as testverify.go. verify_obfs4.py has a different one:
Whether these are real obfs4 bridges, I don't know.
The repository has 7 commits, all on 2024-06-28 by
meiqi wang <wangmeiqi@iie.ac.cn>. It looks like a test project that was not updated or maintained. It has hardcoded bridge IP addresses and credentials and reports output just by printing to stdout. The code looks amateurish. It doesn't look like an operational piece of software.Perhaps notably, this repository does not use any of the public key distinguishability attacks that were known in 2024, nor show any awareness of them.
fortuna commentedon Sep 15, 2025
This is data from our Intra app showing how successful the app is in recovering from SNI-based blocking.
Intra triggers a retry on TLS connections with TLS record fragmentation if it fails to get a response before a timeout, and we measure whether the retry fails or succeeds ("traffic we can recover").
Success rate in Myanmar significantly dropped after May 2024, aligning it with the rate from China. This is aligned with the timeline provided in the report.
(Note that it drops further for both countries in August 2025)
wkrp commentedon Sep 15, 2025
Interesting. Thank you for checking that.
I don't see a reference to Intra in geedge_jira.tar.zst, but there is one issue that references Outline, issues/OSS-378.json. The issue title is 【M22项目】VPN特征提取-宋龙坤 ([Project M22] VPN feature extraction - Song Longkun).
2024-09-27 宋龙坤 (Song Longkun):
2024-10-31 宋龙坤 (Song Longkun):
wkrp commentedon Sep 15, 2025
wangmeiqi/obfs4_meek_snowflake
This repository looks like a fingerprinter for meek, obfs4, and Snowflake, based on the methods of Deep Fingerprinting (ACM CCS 2018).
README.md is just an autogenerated GitLab README. The file readme has usage instructions:
The models/*_bk.h5 are included in the repository, but the data/*_mix.npz files are not. The models/*_bk.h5 files are in Hierarchical Data Format, according to file(1). The file 模型情况.txt (model circumstances) gives the training/testing breakdown of each model:
It's interesting that they include traffic from other transports as part of the negative samples during testing (e.g. obfs4 and Snowflake as negative examples for meek). I don't know what 文涛 (Wentao), 崇儒 (Chongru), and 新捕 (Xinbu) are. (EDIT: 新捕 = newly captured.)
ClosedWorld_DF_NoDef.py is an edited version of the file of the same name in the deep-fingerprinting/df repository.
test_meek.py, test_obfs4.py, and test_snow.py are all basically the same file, just with a different transport name in each one. These files appear to originate in ClosedWorld_DF_NoDef.py. It looks like these programs apply a model (.h5 file) to test data (.npz file) and report statistics such as precision and recall. They are Python 2 programs, not Python 3.
Like wangmeiqi/obfs4_verify, all the commits in this repository are by
meiqi wang <wangmeiqi@iie.ac.cn>and all occur on 2024-06-28. It looks like student project code, not something operational.fortuna commentedon Sep 15, 2025
@wkrp thanks for checking. Do you know what the "two valid domain names" is about?
As for Intra, I'd guess the drop is just more strict censorship, not really targeting of Intra.
UjuiUjuMandan commentedon Sep 15, 2025
The first ones look like ordinary Chinese given name, and the last one is literally newly captured.
wkrp commentedon Sep 15, 2025
My best guess at what OSS-378 is about is that it has to do with the "mobile device lab" and "static and dynamic analysis" of VPN apps. Like, they search the binary for URLs and IP addresses, then they run the program multiple times to see what DNS queries and network connections it makes.
OSS-378 contains a link to a Confluence document,
https://docs.geedge.net/display/TSGEN/M22-VPN+List, which is present in geedge_docs.tar.zst (along with many other pages that have "M22" in the title). "M22-VPN List" seems to contain a giant table of ≈280 VPNs, including Outline, Orbot, Mullvad, and others.Outline is number 132 on the list, and its priority is high.
wangx404 commentedon Sep 15, 2025
All of them are Chinese given names.
JonSnowWhite commentedon Sep 15, 2025
We (@FelixLange1998 and I) would love to look at the ssl/tls files but both the torrent and direct download seem to be quite slow. Did anyone manage to download the whole set of files?
PoneyClairDeLune commentedon Sep 15, 2025
While the censorship infrastructure having the ability to conduct MITM with malicious CAs isn't entirely surprising, a lack of certificate chain hash pinning within graphical clients of encrypted proxies like Xray is quite worrying though, especially when the devices running the encrypted proxy clients on may have been planted malicious CAs that few people bothers to check. The graphical clients and shareable link standards can benefit quite well from supporting hash pinning in my opinion.
UjuiUjuMandan commentedon Sep 15, 2025
So, MESA is abbreviation for Massive Effective Stream Analysis, but the Chinese name is totally unrelated to this but Processing Architecture Group (处理架构组).
I doubt this is imitating the Mesa Laboratory in 1960s, Colorado.
RPRX commentedon Sep 15, 2025
我也想过这件事,不过对 Xray-core 来说似乎不太实用,原因有三:
还有就是现在很多直连机场都在使用 REALITY 了,越来越多的 TLS-like 连接正在变得无法被 MITM XTLS/Xray-core#5066 (comment)
此外中转机场的 SS 有被解密后 MITM 内层 TLS 的风险,这个安全漏洞就挺严重的,我可以在这里发一个贴子详细说明
RPRX commentedon Sep 16, 2025
可能 pin root 证书好一点,我不确定 Xray 现有的 PinnedPeerCertificateChainSha256 PinnedPeerCertificatePublicKeySha256 是否支持
不过套 CDN 总归是建议用 VLESS Encryption 的,那就无所谓,
我觉得是时候把单纯的 TLS / QUIC 也列为“不够安全”了PoneyClairDeLune commentedon Sep 16, 2025
@RPRX That's exactly what I'm thinking, pinning only the possible root certificates. Cloudflare has LE, GTS, Sectigo and SSL.com, CloudFront uses Amazon's internal service, Fastly uses Certainly... So on and so forth. REALITY isn't exactly applicable when it's needed to pair with standard web infrastructure, so root certificate pinning would be quite preferable for clients to have, especially for the shareable links.
Regarding VLESS encryption... I'd advocate for it to be used whenever third-party infrastructure is needed, but if TLS could be decrypted by the censors in the first place, then we'll have the dilemma that Shadowsocks et al have. Web infrastructure providers like CDNs can care less though.
RPRX commentedon Sep 16, 2025
@PoneyClairDeLune 不过 pin 这件事其实很难推动,我认为更根本的解决方案是不应继续将 TLS / QUIC 视为可靠的加密方式