Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Add TLS Client Authentication#1151

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
jose-C2OaWi wants to merge117 commits intoSagerNet:dev-next
base:dev-next
Choose a base branch
Loading
fromjose-C2OaWi:origin/tls-client-auth

Conversation

jose-C2OaWi
Copy link

Add a feature forIssue 1054

Credits:
@ginuerzh for the implementation ofgost

@hiddify-com

This comment was marked as spam.

@jose-C2OaWi

This comment was marked as abuse.

@hiddify-com

This comment was marked as spam.

@Mahdi-zarei
Copy link
Contributor

mTLS is an established protocol and the SSL error you mention is expected. The peers communicating using mTLS need to use certificates which are signed by a self-issued root certificate, meaning such networks are not available for public access and usual one way TLS connections are not allowed. So it is meaningless to implement a fallback since it completely invalidates the mTLS processes.

@hiddify-com

This comment was marked as spam.

@jose-C2OaWi

This comment was marked as abuse.

fix typo in tls.zh.mdSigned-off-by: jose-C2OaWi <111356383+jose-C2OaWi@users.noreply.github.com>
@Mahdi-zarei
Copy link
Contributor

Mahdi-zarei commentedNov 27, 2023
edited
Loading

the fallback option to a simple website can avoid active detection. while dropping connection is itself a fingerprint for GFW to put this website in the gray/black list

This is absurd, regarding the diagram you have sent, the server asks for certificate from client (which tells the client that the protocol being used is mTLS and not TLS) whereas in normal TLS no such operation is performed. By simply accepting the GFW's invalid certificate and serving a webpage you are practically violating the protocol you are advertising to conform to and this is a much severer footprint than correctly rejecting the GFW's invalid certificate.

jose-C2OaWi and charliez0 reacted with thumbs up emoji

Signed-off-by: jose-C2OaWi <111356383+jose-C2OaWi@users.noreply.github.com>
@nekohasekainekohasekaiforce-pushed thedev-next branch 4 times, most recently fromb759111 to733c14dCompareNovember 29, 2023 07:41
@nekohasekainekohasekaiforce-pushed thedev-next branch 11 times, most recently from3611dcd to36c095fCompareJune 21, 2025 11:43
@nekohasekainekohasekaiforce-pushed thedev-next branch 12 times, most recently from4492a53 to989034bCompareJuly 3, 2025 14:20
@nekohasekainekohasekaiforce-pushed thedev-next branch 7 times, most recently from8ec5593 tob3c1110CompareJuly 12, 2025 06:48
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment
Reviewers
No reviews
Assignees
No one assigned
Labels
None yet
Projects
None yet
Milestone
No milestone
Development

Successfully merging this pull request may close these issues.

5 participants
@jose-C2OaWi@hiddify-com@Mahdi-zarei@nekohasekai@kwfcfc

[8]ページ先頭

©2009-2025 Movatter.jp