Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade trojan-go client's TLS fingerprints to some of the most popular ones #464

Open
wants to merge 5 commits into
base: master
Choose a base branch
from

Commits on Oct 6, 2022

  1. Replace cryto/tls with uTLS v1.1.2.

    We hope this change will mitigate [the large-scale blocking of TLS-based censorship circumvention protocols in China](net4people/bbs#129) since October 3, 2022.
    
    Depending on one's configuration, the Clienthello sent by trojan-go client will look like one of the following values now (rather than the [Go's TLS fingerprint](https://tlsfingerprint.io/id/ad63dbc630ad9475) in previous versions):
    
    | `fingerprint`      | `sni` value specified? | TLS Fingerprint ID |
    | ----------- | ----------- |----------- |
    | Chrome (default)       | Yes | [e47eae8f8c4887b6](https://tlsfingerprint.io/id/e47eae8f8c4887b6)|
    | Chrome (default)       | No | [90ac8a1dfa3b207c](https://tlsfingerprint.io/id/90ac8a1dfa3b207c)|
    | iOS       | Yes | [133e933dd1dfea90](https://tlsfingerprint.io/id/133e933dd1dfea90)|
    | iOS       | No | [cff7f10f631feddd](https://tlsfingerprint.io/id/cff7f10f631feddd)|
    | Firefox   | Yes | [7161e10829541aab](https://tlsfingerprint.io/id/7161e10829541aab)|
    | Firefox   | No | [56fa08d84940a06b](https://tlsfingerprint.io/id/56fa08d84940a06b)|
    gfw-report committed Oct 6, 2022
    Configuration menu
    Copy the full SHA
    eeccfd8 View commit details
    Browse the repository at this point in the history

Commits on Oct 12, 2022

  1. Support more popular browser fingerprints with utls v1.1.3.

    `fingerprint` option now supports `Edge`, `Safari`, `360Browser`, and
    `QQBrowser`, in addition to the existing `Chrome`, `Firefox`, and
    `iOS` options.
    
    Thanks to uTLS developers @hwh33 and @gaukas.
    gfw-report committed Oct 12, 2022
    Configuration menu
    Copy the full SHA
    d135694 View commit details
    Browse the repository at this point in the history

Commits on Oct 18, 2022

  1. Upgrade to use Go 1.19 and uTLS v1.1.5.

    We thank uTLS developer @gaukas and @cheungxi for their efforts in [uTLS v1.1.5](https://github.com/refraction-networking/utls/releases/tag/v1.1.5).
    gfw-report committed Oct 18, 2022
    Configuration menu
    Copy the full SHA
    da8952a View commit details
    Browse the repository at this point in the history

Commits on Nov 30, 2022

  1. Upgrade uTLS to v1.2.0.

    We thank uTLS developer @gaukas and @jmwample for their efforts in [uTLS v1.2.0](https://github.com/refraction-networking/utls/releases/tag/v1.2.0).
    gfw-report committed Nov 30, 2022
    Configuration menu
    Copy the full SHA
    ca6cbf6 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    c49cabe View commit details
    Browse the repository at this point in the history