-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SplitHTTP server: add ok padding #3614
SplitHTTP server: add ok padding #3614
Conversation
Something about anti-censorship. Note to users, if you ever feel the GFW, try something like this: "splithttpSettings": { "responseOkPadding": "1-100" } The clientside part has been implemented in XTLS@8320732 The setting defaults to "no padding". Using the setting with any value that is not `0` will break compatibility with Xray client 1.8.16. At the moment I think it's not worth it to break compatibility, and until this feature is targeted, I think most clients will have updated beyond 1.8.16.
I think the ED part is a joke, but there is some truth to this. Response body and HTTP headers are in one packet, and so adding random HTTP response headers is actually a more backwards-compatible way of adding padding. Anyway, this works as well, there is technically no guarantee that response headers and response body are in the same packet, and later it can be "secure out of the box" without relying on correct forwarding of headers by CDN (just personal requirements) |
这一特性应当默认启用,默认值 100-1000,可以 break v1.8.16 |
ok, it seems streisand is actually on 1.8.17 so it's acceptable. |
|
我觉得还是得给 header 加 padding,虽然有不同的 host 和 path,但在同一个配置中 GET 和 POST 请求头的大小是固定的,感觉可能是没有粘着数据,此外无关配置的 POST 的回复头大小也是固定的,况且我们也不能保证 GET 回复头一定粘着数据 我想的是加一个名为 对了,发 |
如果是为了等 response 流才能组合出 conn,那么是没有必要的,用 channel 等 response 流就行,我就写过很多特殊的 wrapper |
I think this is ok, but I feel that if initial GET and POST are sent over the same physical connection, concurrently, the request size of GET and the response size of POST should not be very visible. It becomes a problem with http/1.1, but http/1.1 has many problems. Perhaps it can be done in such a way that websocket/httpupgrade can have the same options and share the code. Early data is good but there is also no guarantee that it is sufficiently large, random, and that the response contains enough data already.
|
Actually, I will think about it some more, I don't think there is an urgent need... |
我们把 这里要解决的是 VLESS 层触及不到的 GET & POST header 大小问题,即使是 concurrently,同配置它们的大小也是固定的,而且 POST 的 response 根本没有附加数据,还与配置无关,属于固定长度特征,这不得不加 padding 了 改成加一个 padding 选项指定 header 名和长度,两端共用,默认值为 近期服务端检测到客户端没发 然后未来的版本服务端再加一个选项,检查客户端是否用指定的 header 发了指定长度范围内的 padding WS 和 HU 特征本来就明显,先不管;应用数据长度是否足够随机也是 VLESS 层要用 Vision Seed 解决的问题,这里不管 |
这样干甚至兼容 v1.8.16,
|
沒有 ok padding 的 SplitHTTP 似乎已經受到牆擊,有時會被阻斷;使用帶 ok padding 的每日構建版好很多。 |
这倒挺难的,因为 SpiltHTTP 还没多少人用,不会被墙写针对, |
一開始就測試過 ok padding, 使用當時的默認值 0-100,會遇到類似的干擾,當將 padding 增加到大約 100-200 時就穩下來了。 可能確實不是牆專門針對 SplitHTTP 的,因為還不普及。但是否也有可能是觸發了牆已有的某種機制? |
至少应该没有撞上 TLS in TLS 长度特征,那个 response 太长了,而且其实 GET 的 response 占比极低,几乎全是 POST 的 response |
不过如果只看 Server Hello 的话倒不长,内层是 TLSv1.2 的话时序特征就更明显了 |
This comment was marked as off-topic.
This comment was marked as off-topic.
what do you think about client peeking vmess can break if the random stream starts with ascii. the probability is really low. until somebody notices,
now this is independent of the padding headers, and the connection does not break if the cdn did not forward the padding headers. i'm not worried about cloudflare (we will find a header name), but otherwise, N CDN have to be tested. |
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
这样的话 reader 要多加一层,不优雅,如果担心 cdn 不转发 header,放 cookie 和 set-cookie 里吧,一定会被转发, 算了,为了防止被 CDN 针对,换成 PHP 那个吧,先不开放自定义 cookie 名 |
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
@RPRX Of course it's true that almost all CDN don't have a problem with this. The header name doesn't really matter in my tests. However, I had a specific, useful setup where absolutely no headers are forwarded ( The connection wrapping is of course silly, but I hope the overhead can be as small as this one. And eventually that wrapper can be removed as well. |
This reverts commit 4b7947c.
1. "ooook" handling on client is removed entirely, since there is no released version of xray-server that actually writes variable-length "ok" This partially reverts commit 4b7947c (XTLS#3614) 2. X-Padding header is added to every request and response (in fact, all of them have length characteristics if the transported protocol has length characteristics already. it can be reduced once VLESS adds its own padding, but I thought it's best to stay independent of VLESS and also handle other inner layers) 3. The client reads two bytes, and if those are != "ok", forwards them to VLESS/Trojan. I think this is the simplest way to deal with this. If headers are used for communication, then browser dialer has to be adjusted as well (may be done in later PR)
1. "ooook" handling on client is removed entirely, since there is no released version of xray-server that actually writes variable-length "ok" This partially reverts commit 4b7947c (XTLS#3614) 2. X-Padding header is added to every request and response (in fact, all of them have length characteristics if the transported protocol has length characteristics already. it can be reduced once VLESS adds its own padding, but I thought it's best to stay independent of VLESS and also handle other inner layers) 3. The client reads two bytes, and if those are != "ok", forwards them to VLESS/Trojan. I think this is the simplest way to deal with this. If headers are used for communication, then browser dialer has to be adjusted as well (may be done in later PR)
Something about anti-censorship. This is the new default, and the new server is no longer compatible with xray clients older than 1.8.17:
if you need to stay compatible with 1.8.16, use this:
Only the server needs this setting.
The clientside part has been implemented in 8320732