yuhan6665
15bb23e4ec
XTLS Vision rejects Mux except for XUDP ( #1567 )
...
* Xtls vision reject vless-tcp-tls+Mux
* Address review comment
2023-01-28 05:39:36 +00:00
yuhan6665
fb212905bd
XTLS Vision checks outer TLS version ( #1554 )
2023-01-27 03:43:58 +00:00
MP
77d2f9edd7
Revise the Code per XTLS#1515 ( #1536 )
...
* Use buf.FromBytes(make([]byte, 0, buf.Size)) to create `first`
Fixes https://github.com/XTLS/Xray-core/issues/1515
* Update server.go
* Update inbound.go
Co-authored-by: RPRX <63339210+RPRX@users.noreply.github.com>
2023-01-16 22:18:58 -05:00
RPRX
8c0d3c0257
XTLS Vision supports acceptProxyProtocol (test needed)
...
Fixes https://github.com/XTLS/Xray-core/issues/1339
2023-01-07 11:01:53 +00:00
RPRX
6f61021f7a
XTLS Vision processes struct TLS Conn's input and rawInput
...
Fixes https://github.com/XTLS/Xray-core/issues/1444
2023-01-06 05:37:16 +00:00
yuhan6665
c4fbdf1b78
Run core/format.go
2022-12-25 19:47:53 -05:00
yuhan6665
f35ded79ad
Vision only reject TCP command for VLESS-TCP-TLS
...
UDP and MUX command currently has no flow value.
Also the character is the same with or without XTLS
2022-12-12 21:20:01 -05:00
yuhan6665
2e30093ffd
Enforce specific none flow for xtls vision
...
In the past, when user open xtls vision on the server side, plain vless+tls can connect.
Pure tls is known to have certain tls in tls characters.
Now server need to specify "xtls-rprx-vision,none" for it be able usable on the same port.
2022-12-04 23:15:36 -05:00
yuhan6665
d87758d46f
Parse big server hello properly
2022-11-27 18:28:38 -05:00
yuhan6665
04278a8940
Refactor some variable names
2022-11-13 12:18:23 -05:00
yuhan6665
48f7cc2132
Reshape multi buffer to fix the padding when buffer is full
2022-11-13 12:18:23 -05:00
yuhan6665
8ef609ff46
Enable UTLS fingerprint for XTLS Vision
2022-11-06 21:50:19 -05:00
yuhan6665
fffd908db2
Fix direct and splice flow
2022-11-06 21:50:19 -05:00
yuhan6665
5e695327b1
Add XTLS RPRX's Vision ( #1235 )
...
* Add XTLS RPRX's Vision
* Add helpful warning when security is wrong
* Add XTLS padding (draft)
* Fix number of packet to filter
* Xtls padding version 1.0 and unpadding logic
2022-10-29 00:51:59 -04:00
yuhan6665
84537e98c4
Update xtls and go to 1.19
2022-09-15 22:06:59 -04:00
yuhan6665
e93da4bd02
Fix some tests and format code ( #830 )
...
* Increase some tls test timeout
* Fix TestUserValidator
* Change all tests to VMessAEAD
Old VMess MD5 tests will be rejected and fail in 2022
* Chore: auto format code
2021-12-14 19:28:47 -05:00
yuhan6665
e286cdcaa8
Style: format code by gofumpt ( #761 )
2021-10-20 00:57:14 +08:00
Arthur Morgan
24b637cd5e
Fix: CounterConnection with ReadV/WriteV ( #720 )
...
Co-authored-by: JimhHan <50871214+JimhHan@users.noreply.github.com>
2021-09-20 20:11:21 +08:00
RPRX
100edc370b
Stop at '?' when reading HTTP PATH before shunting
2021-03-12 11:50:59 +00:00
RPRX
8ffc430351
Fix VLESS & Trojan fallbacks xver
2021-01-23 21:06:15 +00:00
Bohan Yang
5bc1bf30ae
Fix fallbacks xver when original address is not TCP address ( #182 )
...
Co-authored-by: RPRX <63339210+rprx@users.noreply.github.com>
2021-01-22 03:26:57 +00:00
Arthur Morgan
5aa053a65f
Convert domain names to lowercase before matching ( #195 )
...
Co-authored-by: RPRX <63339210+rprx@users.noreply.github.com>
2021-01-21 23:37:55 +00:00
RPRX
88f6537540
Make necessary maps in non-empty names before copy
2021-01-15 11:36:31 +00:00
RPRX
f0efc0cfde
As substring to match in VLESS fallbacks SNI shunt
2021-01-15 09:43:39 +00:00
RPRX
f13ac3cb55
Fix VLESS fallbacks SNI shunt
2021-01-14 21:55:52 +00:00
eMeab
d85162ea44
Add SNI shunt support for VLESS ( #141 )
2021-01-13 15:13:51 +00:00
RPRX
f8faf3c8b8
Removal: confonly
2020-12-11 13:05:29 +08:00
RPRX
16544c18ab
v1.1.0
2020-12-04 09:36:16 +08:00
RPRX
c7f7c08ead
v1.0.0
2020-11-25 19:01:53 +08:00