-
hello there. I think a complete understanding of mechanism is necessary for configuring secure proxies using this technique... |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 7 replies
-
Beta Was this translation helpful? Give feedback.
-
Can you tell me what is the role of the domain in the Reality? During the TLS handshake, is the domain certificate received by the Reality-server and transferred to the Xray-client for the purpose of simulation? |
Beta Was this translation helpful? Give feedback.
-
I ran a
Behind this camouflage handshake, the server then communicates with the real destination:
|
Beta Was this translation helpful? Give feedback.
-
After the initial handshake between the Xray Client and Xray Server, the Xray Server initiates a handshake with the camouflage site, using a specific server name or SNI. This SNI is likely a domain that is trusted or unsuspected by any intervening firewalls or censoring entities. Once the handshake with the camouflage site is complete, the Xray Server uses the information obtained from this handshake, including the SNI, to establish a connection with the real destination (dest). This process makes the connection to the real destination appear as if it's a standard connection to the camouflage site, adding an extra layer of obfuscation and security. |
Beta Was this translation helpful? Give feedback.
在文章出来前,你可以看代码,服务端代码 只是小改了
crypto/tls
库,客户端代码 就更简单了