From b3a8187cc969f5832e071ef6355a0da52183cfa4 Mon Sep 17 00:00:00 2001 From: yuhan6665 <1588741+yuhan6665@users.noreply.github.com> Date: Sun, 9 Jul 2023 21:36:38 -0400 Subject: [PATCH] Add more details for fragmentation --- docs/config/outbounds/freedom.md | 2 +- docs/en/config/outbounds/freedom.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/config/outbounds/freedom.md b/docs/config/outbounds/freedom.md index 6199b85f3..fbaaa3b89 100644 --- a/docs/config/outbounds/freedom.md +++ b/docs/config/outbounds/freedom.md @@ -52,7 +52,7 @@ userLevel 的值, 对应 [policy](../policy.md#policyobject) 中 `level` 的值 一些键值对配置项,用于控制发出的 TCP 分片,在某些情况下可以欺骗审查系统,比如绕过 SNI 黑名单。 -`"packets"`:支持两种分片方式 "1-3" 是 TCP 的流切片,"tlshello" 是 TLS 握手包切片 +`"packets"`:支持两种分片方式 "1-3" 是 TCP 的流切片,应用于客户端第 1 至第 3 次写数据。"tlshello" 是 TLS 握手包切片。 `"length"`:分片包长 diff --git a/docs/en/config/outbounds/freedom.md b/docs/en/config/outbounds/freedom.md index f4f2d5e75..b67318da0 100644 --- a/docs/en/config/outbounds/freedom.md +++ b/docs/en/config/outbounds/freedom.md @@ -50,7 +50,7 @@ The value of `userLevel` corresponds to the value of `level` in the [policy](../ A key-value map used to control TCP fragmentation,under some circumstances it can cheat the censor syetem, like bypass a SNI blacklist. -`"packets"`:support two different methods. "1-3" is for segmentation at TCP layer, "tlshello" is for TLS client hello packet fragmentation +`"packets"`:support two different methods. "1-3" is for segmentation at TCP layer, applying to the beginning 1 to 3 data writes by the client. "tlshello" is for TLS client hello packet fragmentation. `"length"`: length to make the cut