Xray-core icon indicating copy to clipboard operation
Xray-core copied to clipboard

[Operation] Bypass TLS over TLS detection

Open cross-hello opened this issue 1 year ago • 5 comments

Turn on client Enable Multiplexer setting.(based on description think the setting could provide multiple handshake inside one TCP connect, thus change the detectable size of package. So it may could pass C&C detection)

Before setting you can't use China mobile internet connect to your server, After you can.

cross-hello avatar Oct 06 '22 07:10 cross-hello

I suspect it doesn't work.

SekiBetu avatar Oct 06 '22 08:10 SekiBetu

@SekiBetu OK, sometimes success, sometimes fail. May be need a more effective method to padding handshake package. (sorry for not familiar with golang at the time, so can't help )

cross-hello avatar Oct 06 '22 13:10 cross-hello

This time the problem may relate with package length. Make Internet experiment on China mobile internet: The first one with MUX option close: Screenshot_2022_1006_231311 The second one with MUX option open: Screenshot_2022_1006_231621 Here are the code:

import time
TIME=300
succ=0
task=0
fail=0

def g():
    global succ, task,fail
    try:
        html=rs.get("http://google.com")
        succ+=1
        print("success :", succ)
    except:
        fail+=1
        print("fail :", fail)
    task-=1

#for a in range(0,10000):
for a in range(0,TIME):
    while task==10:
        time.sleep(0.01)
    #qd.start_new_thread(g,())
    #print("start create new stread")
    task+=1
    qd.start_new_thread(g,())

print("\n\n open mux:")
#print("\n\n No mux:")
print(" success rate:", succ/(succ+fail))
print("fail rate:", fail/(succ+fail))

cross-hello avatar Oct 06 '22 15:10 cross-hello

我在实验版本中增加了最简单的 tls 握手长度混淆 https://github.com/XTLS/Xray-core/pull/1235 大家可以试试 https://github.com/XTLS/Xray-core/actions/runs/3212748729

yuhan6665 avatar Oct 09 '22 04:10 yuhan6665

https://github.com/refraction-networking/utls#roller

josephw1122 avatar Oct 14 '22 01:10 josephw1122