We love seeing developers push the boundaries of what’s possible with Fastly’s platform, and Aroma is a perfect example.
https://github.com/Sakura-sx/Aroma?tab=readme-ov-file#tldr-explanation
The project uses Fastly VCL to access TCP socket data (tcpi_min_rtt and tcpi_rtt) to detect TCP proxies via RTT fingerprinting.
It’s a brilliant proof of concept that sparked a lively discussion on Hacker News about the cat-and-mouse game of proxy detection, speed-of-light limitations, and creative countermeasures. https://news.ycombinator.com/item?id=46386878
Check out the full project and write up on GitHub: https://github.com/Sakura-sx/Aroma