Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

现在 V2Ray 的 WS+TLS 能和真的 WS over TLS 区分吗? #781

Closed
517030910405 opened this issue Jul 20, 2020 · 5 comments
Closed

现在 V2Ray 的 WS+TLS 能和真的 WS over TLS 区分吗? #781

517030910405 opened this issue Jul 20, 2020 · 5 comments

Comments

@517030910405
Copy link

517030910405 commented Jul 20, 2020

现在 V2Ray 的 WS+TLS 能和真的 WS over TLS 区分吗?
经过 Caddy/Nginx 之后,应该看不出 WS 了,那通过 TCP 包的大小/时间,有可能被区分吗?此外有其它不安全的地方吗?
谢谢!

@517030910405
Copy link
Author

主要是考虑给伪装的网站备案,不知道稳不稳

@genufish
Copy link

看出ws会怎么样?

@517030910405
Copy link
Author

看出ws会怎么样?

看出 Websocket 不要紧,怕的是看出不正常。如果真的除了暴力破解私钥外不可区分,才敢去备案。

@genufish
Copy link

好像看tls指纹的话,就知道有人用v2ray在连这个服务器呐。

@517030910405
Copy link
Author

好像看tls指纹的话,就知道有人用v2ray在连这个服务器呐。

原来 Client Hello 的问题还没有解决吗?
所以 这个issue 里面说的并不是完美解决了 Client Hello ?

@kslr kslr closed this as completed Aug 9, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants