Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Avoid TLS fingerprint #1660

Closed
emc2314 opened this issue Apr 24, 2019 · 5 comments
Closed

[Feature Request] Avoid TLS fingerprint #1660

emc2314 opened this issue Apr 24, 2019 · 5 comments

Comments

@emc2314
Copy link

emc2314 commented Apr 24, 2019

The authors of The use of TLS in Censorship Circumvention (NDSS 2019) develop a library called uTLS, which is a fork of the Go standard TLS library. It can mimic the fingerprint of popular TLS client (e.g. Chrome), thus reducing the possibility to be detected.

@Xyncgas
Copy link

Xyncgas commented Apr 27, 2019

upvote !

@emc2314 emc2314 changed the title Avoid TLS fingerprint [Feature Request] Avoid TLS fingerprint Apr 29, 2019
@emc2314
Copy link
Author

emc2314 commented May 8, 2019

Note: Already integrated in commit c072d38, but not enabled yet.
Sorry for disturbing, but may I ask what is experiment 8357? @DarienRaymond

@emc2314
Copy link
Author

emc2314 commented Oct 24, 2019

"tlsSettings"中加入"serverName": "experiment:8357"即可开启 utls, 不知道为啥文档里没有
提到. 可能是不够稳定或者不太愿意公开. 总之本 issue 关闭.

@emc2314 emc2314 closed this as completed Oct 24, 2019
@emc2314
Copy link
Author

emc2314 commented Oct 24, 2019

仔细看了下, 功能的确还不完善... 只用了 utls 却没有更改指纹. 而且只有 tcp 支持, ws 并没有相关代码.

@emc2314
Copy link
Author

emc2314 commented Oct 24, 2019

要支持 ws 需要修改 gorilla/websocket 上游代码, 好难(

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants