-
Notifications
You must be signed in to change notification settings - Fork 3.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fingerprinting Captured Client Hello #1782
Comments
"tlsSettings": {
"fingerprint": "randomized"
} |
can you elaborate more? |
None, can't customize to specify fingerprint in configuration.
"fingerprint": "randomized" generate a new fingerprint for you each time.
Mar 13, 2023 08:41:49 arashammm ***@***.***>:
… "tlsSettings": {
"fingerprint": "randomized"
}
can you elaborate more?
how can I use randomized to implement my custome fingerprint?
I couldn't find that anywhere
—
Reply to this email directly, view it on GitHub[#1782 (comment)], or unsubscribe[https://github.com/notifications/unsubscribe-auth/AKGBAYCHPWZZAVMGQ5K4KUDW3ZUMZANCNFSM6AAAAAAVYLGGFI].
You are receiving this because you commented.[Tracking image][https://github.com/notifications/beacon/AKGBAYAAQNE2LJZ4Q6MLBQLW3ZUMZA5CNFSM6AAAAAAVYLGGFKWGG33NNVSW45C7OR4XAZNMJFZXG5LFINXW23LFNZ2KUY3PNVWWK3TUL5UWJTSXK53WU.gif]
|
Thanks for the clarification. Btw, with randomized we can get a randomized client hello with random bytes from firefox, chrome, and ios? |
If I didn't misremember: |
|
so I am just wondering, which one will be less recognizable patten between 'random','randomized' and a paticular fingerprint? If my setup is only having the traffic among my softrouter and mobile phone to VPS(M to 1), does that mean random will be more safer since it looks like more real? |
这是个很好的想法,建议在 uTLS 也发一下 |
Thanks for the suggestion RPRX. See here. I think this model of fingerprinting should be the standard. Because right now fingerprints like chrome 106 auto shuffle are so obvious and will be blocked within days if not hours. |
Obviously randomized option is more unique and less recognizable in that manner. And this brings me back to my main question earlier. how exactly randomized fingerprint works?? like what cipher suites it will choose from randomly? |
I'm still wondering which one is the best at keeping the server IP undetected from GFW: random, randomized or a static one (chrome, firefox, etc.). any explanations/suggestions would be appreciated. |
ok found this:
简单来说,当你所在的地区连常规浏览器的指纹都封锁时,可以试一下 Originally posted by @RPRX in #1752 (comment) Translation: In short, when you are in an area where even regular browser fingerprinting is blocked, you can try |
Hello again to the beloved xray community.
Xray is a very promising project amongst new circumventing tools for bypassing firewalls.
I wanted to request an enhancement to this project for the savy who want to use their own captured client hello fingerprint in tls proxies such as XTLS.
It would be great if we had the ability to capture a regular client hello packet from our browser to camouflage website and implement that inside xray core (client-side).
I know that utls has this option in itself and with little tweaking inside the xray code this method is possible.
This way we get a vary wide range of unique fngerprints for each set up which makes it very hard to be flagged.
Right now, the default fingerprints in xray/utls are flagged and recognized very easily after a day or so.
And at the end, if anyone could help me to where to look in xray codes to confgiure that option I would appreciate it.
The text was updated successfully, but these errors were encountered: