cty123
a343d68944
fix(proxy): removed the udp payload length check when encryption is disabled
1 year ago
hax0r31337
f67167bb3b
refactor(deps): replace github.com/golang/protobuf with google.golang.org/protobuf
1 year ago
cty123
b68a43f4fc
fix: correct the logic of converting SocksAddr into net.Destination.
1 year ago
cty123
8eb3cfe144
fix: Patch potential nil pointer deference in proxy::http::client::fillRequestHeader().
1 year ago
RPRX
f0f3b417f7
Refactor: Fragmentation
...
5f5ae37571
9122d0f056
1 year ago
RPRX
6d4194415d
Clean unnecessary code in Trojan
1 year ago
Eken Chan
6d8fe7315f
XRV should work without rawConn
1 year ago
RPRX
ee21763928
Run "go fmt ./..."
1 year ago
RPRX
667279af57
Add "nonIPQuery" to DNS outbound ("drop" by default)
...
And fixed a memory leak
And regenerated *.pb.go
1 year ago
rrouzbeh
9122d0f056
Add TLS Hello Fragmentation for freedom outbound ( #2131 )
...
* Replace TCP Segmentation with TLS Hello Fragmentation
* Update infra/conf/freedom.go
* Refine proxy/freedom/freedom.go
---------
Co-authored-by: RPRX <63339210+RPRX@users.noreply.github.com>
1 year ago
yuhan6665
9112cfd39c
Clean legacy vmess ( #2199 )
...
* Remove legacy Vmess
* validators
* protos
1 year ago
yuhan6665
d11d72be6c
Update proto file and fix protoc version parsing
...
The new protoc cli return version v23.1,
so we parse the file version v4.23.1 without "4."
1 year ago
yuhan6665
c9f517108c
Remove mtproto
2 years ago
sambali9
5f5ae37571
Added tcp fragmentation for freedom outbound ( #2021 )
...
* Added tcp fragmentation for freedom outbound
* Added TCP_NODELAY to outbound sockopt
* Changed fragment parameters to accept ranges and changed strategy to use length
* Changed packetNumber to packets, supporting range.
* Refactored the freedom fragment logic
* Refine Write()
---------
Co-authored-by: RPRX <63339210+RPRX@users.noreply.github.com>
2 years ago
jcdong98
e7324700ed
Fix memory leak caused by Wireguard outbound
2 years ago
Zeyu Chen
bfd5da2f00
fix: dns empty response
2 years ago
世界
18e5b0963f
Update dependencies
2 years ago
RPRX
242f3b0e0b
XTLS protocol: Apply Vision's padding to XUDP Mux & Minor fixes
...
It's recommended to enable XUDP Mux when using XTLS Vision
Thank @yuhan6665 for testing
2 years ago
RPRX
4f601530fa
Allow multiple XUDP in Mux when using XTLS Vision (client side)
2 years ago
RPRX
b33b0bc89d
Allow multiple XUDP in Mux when using XTLS Vision (server side)
2 years ago
yuhan6665
05d24d6827
Amend XUDP related logs
...
- Useful for debug XUDP improvements
- Move XUDP log in core log
- Freedom connection log show local port
2 years ago
RPRX
be23d5d3b7
XUDP protocol: Add Global ID & UoT Migration
...
The first UoT protocol that supports UoT Migration
Thank @yuhan6665 for testing
2 years ago
世界
172f353bd7
Update dependencies
2 years ago
世界
55efac7236
Reformat code
2 years ago
世界
f57ec13880
Update UoT protocol
2 years ago
RPRX
c04c333afc
They become a part of you
2 years ago
yuhan6665
9e5bc07bf2
Legends never die ( #1725 )
2 years ago
RPRX
4c8ee0af50
Set reserved to zero after Read()
...
Thank @IRN-Kawakaze for testing
2 years ago
yuhan6665
25ea69fc3a
Fix Vision inserting multiple uuid headers
...
This happen for stream inbound like http
2 years ago
yuhan6665
a4790133d2
Fix padding extends out of bound again
2 years ago
RPRX
ccba465590
Add reserved to WireGuard config
...
Fixes https://github.com/XTLS/Xray-core/issues/1730
2 years ago
yuhan6665
7b54255cc1
Fix padding extends out of bound
2 years ago
yuhan6665
2d898480be
Vision padding upgrade ( #1646 )
...
* Vision server allow multiple blocks of padding
* Fix Vision client to support multiple possible padding blocks
* Vision padding upgrade
- Now we have two types of padding: long (pad to 900-1400) and traditional (0-256)
- Long padding is applied to tls handshakes and first (empty) packet
- Traditional padding is applied to all beginning (7) packets of the connection (counted two-way)
- Since receiver changed its way to unpad buffer in fd6973b3c6
, we can freely extend padding packet length easily in the future
- Simplify code
* Adjust receiver withinPaddingBuffers
Now default withinPaddingBuffers = true to give it a chance to do unpadding
* Fix magic numbers for Vision
Thanks @H1JK
Thanks @RPRX for guidance
2 years ago
RPRX
c38179a67f
Upgrade github.com/xtls/reality to f34b4d174342
...
Fixes https://github.com/XTLS/Xray-core/issues/1712
2 years ago
Hellojack
267d93f7bd
Improve ReshapeMultiBuffer ( #1636 )
...
* Improve ReshapeMultiBuffer
* Improve again
* Always resize
2 years ago
RPRX
4d2e2b24d3
THE NEXT FUTURE becomes THE REALITY NOW
...
Thank @yuhan6665 for testing
2 years ago
yuhan6665
c3faa8b7ac
Insert padding with empty content to camouflage VLESS header ( #1610 )
...
This only affects the Vision client for protocols expecting server to send data first.
The change is compatible with existing version of Vision server.
2 years ago
RPRX
74416570d4
Format VLESS inbound.go and outbound.go
2 years ago
RPRX
b70912799b
Generate *.pb.go files with protoc v3.21.12
...
https://github.com/protocolbuffers/protobuf/releases/tag/v21.12
go install google.golang.org/protobuf/cmd/protoc-gen-go@v1.28
go install google.golang.org/grpc/cmd/protoc-gen-go-grpc@v1.2
go run ./infra/vprotogen
2 years ago
yuhan6665
15bb23e4ec
XTLS Vision rejects Mux except for XUDP ( #1567 )
...
* Xtls vision reject vless-tcp-tls+Mux
* Address review comment
2 years ago
yuhan6665
fb212905bd
XTLS Vision checks outer TLS version ( #1554 )
2 years ago
MP
77d2f9edd7
Revise the Code per XTLS#1515 ( #1536 )
...
* Use buf.FromBytes(make([]byte, 0, buf.Size)) to create `first`
Fixes https://github.com/XTLS/Xray-core/issues/1515
* Update server.go
* Update inbound.go
Co-authored-by: RPRX <63339210+RPRX@users.noreply.github.com>
2 years ago
RPRX
8c0d3c0257
XTLS Vision supports acceptProxyProtocol (test needed)
...
Fixes https://github.com/XTLS/Xray-core/issues/1339
2 years ago
RPRX
6f61021f7a
XTLS Vision processes struct TLS Conn's input and rawInput
...
Fixes https://github.com/XTLS/Xray-core/issues/1444
2 years ago
yuhan6665
c4fbdf1b78
Run core/format.go
2 years ago
PMExtra
c9b6fc0104
Add custom header support for HTTP proxy
2 years ago
pocketW
a55cf1d0bf
fix: email inconsistent
2 years ago
yuhan6665
f35ded79ad
Vision only reject TCP command for VLESS-TCP-TLS
...
UDP and MUX command currently has no flow value.
Also the character is the same with or without XTLS
2 years ago
yuhan6665
bc4de6a026
Fix VLESS client doesn't handle traffic if not send data first
...
Certain ssh, mySQL and reverse proxy need server data first in a connection
2 years ago
yuhan6665
2e30093ffd
Enforce specific none flow for xtls vision
...
In the past, when user open xtls vision on the server side, plain vless+tls can connect.
Pure tls is known to have certain tls in tls characters.
Now server need to specify "xtls-rprx-vision,none" for it be able usable on the same port.
2 years ago