For filtering in literal sense, i.e. address based packet null routing, all you can find is general carrier routers with their routing tables being dynamically manipulated by BGP commands sent by the GFW. You can't know where the commands come from.
For "filtering" described in this research, it's active connection disruption with spoofed tcp reset packets. The GFW mirrors traffic via some routers for detection and sends spoofed traffic for disruption. It doesn't have an IP address per se. This tool can find out from which router the GFW mirrors traffic, but not the GFW itself.
Here is a previous illustration on the topology of GFW networks: https://media.torproject.org/image/community-images/topology...
The Chinese government seems intelligent enough to understand that China will be better if they can use the resources provided by the rest of the world. They are not Syria.
- "In the long term" doesn't make for a more favorable environment to the tech savvy users supposed to push that change.
- I'm not sure you quite understand how ballsy they are. If they've cut Facebook, Twitter, YouTube and find time to screw in a real sneaky fashion with Google, I think it's safe to say they'd block Github without even thinking twice.
My own government is seeking to restrict Internet openness. Sucks. Highlight it at every opportunity, I say.
Xi is not getting off to a good start.
China actually blocks the services for many reasons other than just censorship. It's also a very effective method of protectionism. China now has its own thriving social networks - QQ, Weixin, and successful e-commerce and search sites. This may not have occurred if China did not use censorship as an excuse to block US based sites.
If you use a proper VPN, e.g. PPTP, you'll have much better luck. All of my traffic is routed through an ec2 instance, which unfortunately means I can't access stackoverflow or some other sites since they've blocked ec2.
The lag is hardly noticeable. Actually I think encrypted traffic is faster since it can't be scanned.
SSH tunneling to a proxy server worked flawlessly for me when I was living in China back in 2006. I guess the GFW has gotten a bit more sophisticated since then.
They've recently launched a major upgrade that is also taking down most of the major VPNs popular with expats, and warning expats that unauthorized VPNs are illegal and encouraging the use of "local" providers.
It's a little ridiculous. Expats would be severely hampered without access to man of the sites that are blocked.
As for SSH tunneling: no issue so far. A few years back, my tunnels used to be reset on a regular basis but not recently.
site:github.com great firewall of china