Overview
Thebypass command starts a lightweight HTTP proxy server with built-in DPI (Deep Packet Inspection) bypass capabilities. It’s designed for quick deployment without requiring configuration files.
This mode:
- Runs a local HTTP proxy with SNI and HTTP Host fragmentation
- Supports ISP-specific presets for Turkey’s major providers
- Uses DNS-over-HTTPS to bypass DNS blocking
- Automatically detects and fragments TLS ClientHello and HTTP requests
Usage
Options
Proxy server listen address and port.Examples:
127.0.0.1:8844- localhost only0.0.0.0:8844- listen on all interfaces[::]:8844- IPv6 all interfaces
ISP-specific bypass configuration preset.Available Presets:
aggressive- Maximum fragmentation, works for most cases- TLS split: at SNI midpoint
- HTTP split: at position 1
- Fragment delay: 10ms
- Max segment size: 5 bytes
turk-telekom- Optimized for Türk Telekom- TLS split: at position 2
- HTTP split: at position 2
- Max segment size: 20 bytes
vodafone- Optimized for Vodafone Turkey- TLS split: at position 3
- HTTP split: at position 3
- Fragment delay: 100μs
- Max segment size: 30 bytes
superonline- Optimized for Superonline- TLS split: at position 1
- HTTP split: at position 1
- Max segment size: 15 bytes
Enable verbose logging output. Shows detailed connection information including:
- Each connection’s protocol detection
- Hostname extraction from SNI/Host headers
- Fragment application status
- DNS resolution details
debug.Path to configuration file (global option).Note: The
bypass command ignores this option as it uses preset configurations.Logging level (global option). Overridden by
--verbose flag.Levels: trace, debug, info, warn, errorOutput logs in JSON format (global option).
Control socket path (global option, not used in bypass mode).
Examples
Start with default settings
Start on custom port with Türk Telekom preset
Run with verbose logging
Listen on all interfaces (for LAN access)
How It Works
-
Protocol Detection: Analyzes outgoing traffic to detect:
- TLS ClientHello messages (HTTPS)
- HTTP requests
- Unknown protocols (passed through unchanged)
-
Smart Fragmentation:
- TLS: Splits ClientHello at SNI (Server Name Indication) field
- HTTP: Splits requests at Host header
- Fragments are sent with configurable delays
- DNS-over-HTTPS: All DNS queries use DoH to bypass DNS-based blocking
-
Statistics: On shutdown (Ctrl+C), displays:
- Total and active connections
- TLS vs HTTP connection counts
- Bypass application count
- Data transferred
- Error count
When to Use Each Preset
aggressive
Best for: Most blocking scenarios, maximum evasionTrade-off: May be slower due to heavy fragmentation
turk-telekom
Best for: Türk Telekom connectionsTrade-off: Balanced performance
vodafone
Best for: Vodafone Turkey connectionsTrade-off: Faster with moderate fragmentation
superonline
Best for: Superonline connectionsTrade-off: Aggressive fragmentation, smaller segments
Configuration Details
The bypass command uses the following fixed configuration:- Buffer Size: 64KB
- Connect Timeout: 30 seconds
- DNS Provider: Cloudflare DoH (1.1.1.1)
- TCP Options: TCP_NODELAY enabled for both client and server connections
Browser Configuration
- Firefox
- Chrome
- System (Linux)
- Settings → Network Settings → Settings
- Select “Manual proxy configuration”
- HTTP Proxy:
127.0.0.1, Port:8844 - Check “Also use this proxy for HTTPS”
Troubleshooting
Connection refused error
Connection refused error
Ensure TurkeyDPI is running and listening on the correct address:
Still blocked with aggressive preset
Still blocked with aggressive preset
Try different presets or check if your ISP uses different blocking methods.
Slow connection
Slow connection
Use a less aggressive preset like
vodafone or adjust your ISP-specific preset.DNS resolution fails
DNS resolution fails
DoH is built-in. If failing, check firewall rules for outbound HTTPS (443) to 1.1.1.1.
See Also
- run command - Full daemon mode with advanced features
- Configuration Guide - Advanced configuration options