-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Config parse error when using Extensible Identity Header and 2022-blake3-chacha20-poly1305
algorithm
#1525
Comments
This comment was marked as off-topic.
This comment was marked as off-topic.
EIH is only supported by the AES ciphers. https://shadowsocks.org/doc/sip023.html |
Sorry... this just multiplies the number of questions that I have. Why does Please don't take this the wrong way, obviously I'm not an expert, but the SIP you linked to does not say that EIH is only supported by the AES ciphers. It says this:
And in the "Shadowsocks 2022 implementations" SIP it says the following:
So by my understanding, |
Well yes, in this project, only AES ciphers are supported: shadowsocks-rust/crates/shadowsocks/src/config.rs Lines 390 to 400 in 222adb3
|
The EIH specification only mentioned how to implement it with those AES ciphers, how are those other implementations make the chacha20-* method works with EIH? |
I cannot find any documents about how to implement EIH with |
I tried searching, but the iOS app is closed-source. I only know that however it encoded the data, |
shadowsocks-rust/crates/shadowsocks/src/relay/tcprelay/aead_2022.rs Lines 279 to 281 in 222adb3
As we just saw, You can enable trace log by shadowsocks-rust/crates/shadowsocks/src/relay/tcprelay/aead_2022.rs Lines 329 to 333 in 222adb3
If |
You are correct, I'm not seeing these messages with I guess this is truly a feature request, if it is even possible to implement. If this cannot be implemented, I would suggest instead making stricter config checks on the server side, so that |
EIH is designed for the AES ciphers. EIH configurations with |
Here is an example config which should work with
sslocal
. It's using a the new encryption algorithm with EIH. According to the README, I should concatenate the server token and user token with:
Instead of starting, the program panics when parsing the config:
However, when switching the algorithm to
2022-blake3-aes-256-gcm
, everything gets parsed OK and the program starts.My sslocal version is 1.18.4.
The text was updated successfully, but these errors were encountered: