
在这个版本中,我们将trojan-go客户端的使用的uTLS从v1.1.2升级到了v1.1.3。
新的版本的fingerprint支持新添加的Edge,Safari,360Browser和QQBrowser选项;还更新了原本已经支持的Chrome, Firefox,和iOS选项的TLS指纹。
sni设置为服务器的域名。因为如果不配置SNI,客户端发送的Clienthello的指纹还是很特殊。fingerprint。因为默认值(Chrome)已经是最流行的指纹了。您是否在用这里提供的客户端的同时还通过其他客户端(比如手机上的软件)连接了相同的服务器?如果是的话,那就不能排除端口被封锁的是其他客户端的指纹或行为导致的。
如果您可以肯定在一段时间内只用了我们提供的客户端,我们欢迎您汇报您的使用情况(被封锁或是没被封锁对我们来说同样重要)。
{
"run_type": "client",
"local_addr": "127.0.0.1",
"local_port": 1080,
"remote_addr": "your-domain-name.com",
"remote_port": 443,
"password": [
"your_awesome_password"
],
"ssl": {
"sni": "your-domain-name.com",
"fingerprint": "Chrome"
}
}
我们感谢uTLS的开发者@gaukas 和 @hwh33。
In this release, we upgrade trojan-go client's uTLS library from v1.1.2 to v1.1.3.
In particular, the new version
fingerprint options: Edge, Safari, 360Browser, and QQBrowser;fingerprint options: Chome, Firefox, and iOS.sni value to your domain name in configuration file, because, your TLS Clienthello can still look very unique without the SNI extension.fingerprint value, because the default fingerprint (Chrome) is already the most popular one.Did you use any other trojan clients (eg. on your phone) to connect to the same server? If so, it cannot be determine whether the blocking is caused by this trojan-go client or other client's fingerprint and behaviors anymore.
If you are sure that you exclusively used client in this release, please consider to report the status of your server (reporting not being blocked is as important as reporting blocking).
{
"run_type": "client",
"local_addr": "127.0.0.1",
"local_port": 1080,
"remote_addr": "your-domain-name.com",
"remote_port": 443,
"password": [
"your_awesome_password"
],
"ssl": {
"sni": "your-domain-name.com",
"fingerprint": "Chrome"
}
}
We thanks uTLS developers @gaukas and @hwh33 for their time and efforts.