Replies: 1 comment
-
先解密 TLS 流量,Xray 发现它不是合法流量,再扔给 ws。所以 ws 已经有一层 TLS 加密了 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
这个疑问针对examples里面的这个示例
https://github.com/XTLS/Xray-examples/tree/main/ReverseProxy/VLESS-TCP-XTLS-WS
对于内网穿透流量,通过fallback转发到ws端口上,那转发以后的流量不就没经过加密了吗?并且下面ws也没配置tls呀,这样不就不安全了?
如果fallback也会进行加密,那感觉也不对吧?如果我fallbak一个mysql服务,那加密一个我直接用mysql client连接不就不可用了?
Beta Was this translation helpful? Give feedback.
All reactions