You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@ihciah
Hi there,
I hope you are having a good day.
We're currently working on a brand new protocol named Restls which can be used as an extension to Shadowsocks. It shares a similar goal with ShadowTLS to circumvent GFW whitelisting but tries to fix ShadowTLS' fundamental flaw of not being able to provide server authentication.
If that sounds good, you might want to take a look at the draft: Restls: A Perfect Impersonation of TLS Handshake
You can find a proof-of-concept implementation in the same repo.
----------------------
你们好,
希望你们一切顺利。
我们正在设计一个新的协议,名为Restls,它可以作为Shadowsocks的插件使用。它的目标与ShadowTLS类似——绕过GFW的白名单机制,但它试图解决ShadowTLS在协议设计中未能实现的服务端认证,从而避免被准确封杀。
如果你觉得这听起来还行,你或许想看一看这个协议的设计稿: Restls: 对TLS握手的完美伪装
这个仓库同样包含了一个实现以及其使用方式。
The text was updated successfully, but these errors were encountered:
@ihciah
Hi there,
I hope you are having a good day.
We're currently working on a brand new protocol named Restls which can be used as an extension to Shadowsocks. It shares a similar goal with ShadowTLS to circumvent GFW whitelisting but tries to fix ShadowTLS' fundamental flaw of not being able to provide server authentication.
If that sounds good, you might want to take a look at the draft:
Restls: A Perfect Impersonation of TLS Handshake
You can find a proof-of-concept implementation in the same repo.
----------------------
你们好,
希望你们一切顺利。
我们正在设计一个新的协议,名为Restls,它可以作为Shadowsocks的插件使用。它的目标与ShadowTLS类似——绕过GFW的白名单机制,但它试图解决ShadowTLS在协议设计中未能实现的服务端认证,从而避免被准确封杀。
如果你觉得这听起来还行,你或许想看一看这个协议的设计稿:
Restls: 对TLS握手的完美伪装
这个仓库同样包含了一个实现以及其使用方式。
The text was updated successfully, but these errors were encountered: