You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Previousely, 6 byte header is used, after encounter invalid value and reduce the possibility of bug, I thought error correction/detection code could be used, below is a naive implemenation by redundancy. below is sender code.
Different from common practices, a tunnel approach with ecdh handshake is used, instead of 1-1 mapping, N local <=> M tunnel <=> N remote is used.
Also, the header above has no pattern, the value is neither fixed nor among small set.
Context: there are 80 tabs open, and global mode is used, aka, the browser, aka chrome is actively working, and the tampering does not happen frequently, at least as of current time.
It currently works pretty well, the delay is quite low, and I can search google, even though all ports in my vps is technically banned, even 22/80/443/64000+, with iptable whitelist deployed. But as long the probability of successful tcp handshake is not zero, it still works.
Still, the chance of bug is not completely removed. The intention this issue is just to share ideas, in case those who want to DIY can distill usefaul infos.
Update the tampering can happen a lot at some time if the traffic goes high (on 50+ browser tabs or watching video) (only in recent days) , and the rate of success tcp dial approach zero for a short period after all tunnel being force closed due to error/RST/timeout, but switch to another port works, and later switch back works too. Also, mutiple one connection though multiple tunnel is not done, which might help here, so is use multiple port and/or ip server. Though currently It already works quite well for month.
Below is excerpt from log.
Previousely, 6 byte header is used, after encounter invalid value and reduce the possibility of bug, I thought error correction/detection code could be used, below is a naive implemenation by redundancy. below is sender code.
Different from common practices, a tunnel approach with ecdh handshake is used, instead of 1-1 mapping, N local <=> M tunnel <=> N remote is used.
Also, the header above has no pattern, the value is neither fixed nor among small set.
Context: there are 80 tabs open, and global mode is used, aka, the browser, aka chrome is actively working, and the tampering does not happen frequently, at least as of current time.
It currently works pretty well, the delay is quite low, and I can search google, even though all ports in my vps is technically banned, even 22/80/443/64000+, with iptable whitelist deployed. But as long the probability of successful tcp handshake is not zero, it still works.
Still, the chance of bug is not completely removed. The intention this issue is just to share ideas, in case those who want to DIY can distill usefaul infos.
Update the tampering can happen a lot at some time if the traffic goes high (on 50+ browser tabs or watching video) (only in recent days) , and the rate of success tcp dial approach zero for a short period after all tunnel being force closed due to error/RST/timeout, but switch to another port works, and later switch back works too. Also, mutiple one connection though multiple tunnel is not done, which might help here, so is use multiple port and/or ip server. Though currently It already works quite well for month.
Also posted at e1732a364fed/v2ray_simple
The text was updated successfully, but these errors were encountered: