-
Notifications
You must be signed in to change notification settings - Fork 377
REALITY protocol: Add ChaCha20 mode #4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
感谢 PR,我想了一下,现有的 |
|
I tend not to make changes for old Update: Client side update is there ready for PR https://github.com/H1JK/Xray-core/tree/reality-chacha20poly1305 |
e7939ee to
900f695
Compare
|
可以去给 Xray-core PR 啦 |
我代理闲置的情况下(没有客户端连接的时候)出现了这样的日志(一个印度ip),请教这是怎么回事?是我被攻击了么? 那一长串数字对,我不知道是否敏感,用XXXX代替了。 背景:我是偷自己,自己的域名上也有一个服务在跑。XTLS/Xray-core#2456 |
|
出于以下三个原因,现决定 revert 掉这个支持:
|
…ion id auth XTLS#3813 (comment) XTLS/REALITY#4 (comment) Reverts XTLS@65b467e (cherry picked from commit 09d84c4)
This PR introduces a new mode of REALITY protocol, authentication part. And this is the server-side update of the new mode.
Details: Client will use CHACHA20-POLY1305 as AEAD cipher for session ID encryption when a non-AES-GCM cipher is listed at the first in the Client Hello cipher suites. This would fix constant-time and efficiency problem for Go AES implementation on unsupported platforms.
The existed
aesgcmPreferredfunction is used. Client implementation may need use linkname to export this internal function. This needs further discussion.Note that this may not break the old version protocol compatibility, because all preset parrots in uTLS are AES-GCM preferred (at present). See also refraction-networking/utls#190.