-
Hello guys! Just want to know some theory.
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
This is possible because Xray-core uses a feature called "sniffing". "Sniffing" is a feature that allows Xray-core to examine or "sniff" the data passing through it, and extract useful information such as the true destination of the data. Specifically, Xray-core can sniff out the domain names from the traffic data. For HTTPS traffic, Xray-core can look into the Server Name Indication (SNI) field which is part of the TLS handshake, and this field contains the hostname of the server that the client is trying to connect to. For HTTP traffic, Xray-core can look into the HTTP headers to determine the true destination of the traffic. Specifically, it can look at the "Host" header field, which specifies the domain name of the server that the client is trying to connect to. This sniffing feature allows Xray-core to route the traffic correctly, even if all incoming connections appear to be destined for 172.16.0.2. |
Beta Was this translation helpful? Give feedback.
This is possible because Xray-core uses a feature called "sniffing".
"Sniffing" is a feature that allows Xray-core to examine or "sniff" the data passing through it, and extract useful information such as the true destination of the data. Specifically, Xray-core can sniff out the domain names from the traffic data.
For HTTPS traffic, Xray-core can look into the Server Name Indication (SNI) field which is part of the TLS handshake, and this field contains the hostname of the server that the client is trying to connect to.
For HTTP traffic, Xray-core can look into the HTTP headers to determine the true destination of the traffic. Specifically, it can look at the "Host" header field, which s…