-
-
Notifications
You must be signed in to change notification settings - Fork 2.9k
The uTLS fingerprint parroting does not work #135
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I didn't find the difference in using uTLS. Parameters such as max version and alpn will cause fingerprint modification. |
Do you mean that you checked yourself through Wireshark? Is that important. I want to understand if the problem is only on my side or yours too.
In my real config (not in the example above) I don't use min_version, max_version, or alpn. Only server_name. I rechecked on two servers (without min/max in config), one supports TLS 1.3, the other only supports TLS 1.2. The result is in the screenshot below. By default sing-box and Chrome use TLS 1.2 as the minimum version allowed. Why then does sing-box allow TLS 1.0 (in the screenshot)? I didn't use min_version. Also, I only see 9 extensions in the Client Hello packet, and it should be ~16-17, like in the Chrome fingerprint. |
Try 8a53846 |
Fixed ( : ౦ ‸ ౦ : ) Also noticed a couple of things:
Maybe you should add this information to the documentation as a warning in case someone runs into this problem in the future. |
Please send issue to upstream, they are based on very old crypto/tls and almost unmaintained. |
Probably found what the problem is. I made a fork where I applied Sync upstream crypto/tls #120 pull request and my fix. I also made a separate branch where I additionally updated "crypto/tls" to the latest version (2022.09.30); I will test both versions for now. P.S. Upstream has been slow to accept the new changes. Consider creating a temporary fork 'SagerNet/utls' until upstream updates... |
Welcome
Description of the problem
Tested on latest dev-next commit. All tests are TLS 1.2, capture in Wireshark. The screenshot shows the TLS Client Hello packets.
sing-box uses uTLS version 1.1.2, which is the latest at the moment, it has the "Chrome 102" fingerprint, which matches the third window.
The "gfw-report" community recently released a fork of trojan-go with "crypto/tls" replaced by uTLS 1.1.2. I personally have not tested this version, but I think the authors of the fork checked the functionality before the release.
I don't know which side has the problem (utls or sing-box) but according to the screenshot we can say that the uTLS function in sing-box doesn't work at all.
Version of sing-box
Server and client configuration file
Server and client log file
// no error
The text was updated successfully, but these errors were encountered: