Skip to content
Discussion options

You must be logged in to vote

Oh, I see. You mean uTLS. mTLS is a different beast.

The problem is following: uTLS mimic entire ClientHello message of the TLS handshake from Chrome, which means it will have ALPN extension enabling HTTP/2 (because Chrome uses HTTP/2 if available). Server is unaware about this and will try to speak HTTP/2. But https:// dialer of dumbproxy is purely HTTP/1.1 protocol, so it will send a request which is invalid for negotiated ALPN value and it is unaware about ALPN overriden by forged ClientHello.

Easiest way to solve ithis is just to use HTTP/2 dialer to talk to upstream proxy: -proxy h2://user:[email protected]:port?utls-fp=HelloChrome_Auto.

Other options are:

  • Disable HTTP/2 on the remote…

Replies: 3 comments 2 replies

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
2 replies
@Snawoot
Comment options

Answer selected by Snawoot
@Snawoot
Comment options

Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants