
在这个版本中,我们将trojan-go客户端的使用的uTLS从v1.1.5升级到了v1.2.0。
sni设置为服务器的域名。因为如果不配置SNI,客户端发送的Clienthello的指纹还是很特殊。fingerprint。因为默认值(Chrome)已经是最流行的指纹了。您是否在用这里提供的客户端的同时还通过其他客户端(比如手机上的软件)连接了相同的服务器?如果是的话,那就不能排除端口被封锁的是其他客户端的指纹或行为导致的。
我们现在缺少用户的使用情况汇报,如果您可以肯定在一段时间内只用了我们提供的客户端,我们非常欢迎您汇报您的使用情况(被封锁或是没被封锁对我们来说同样重要)。
{
"run_type": "client",
"local_addr": "127.0.0.1",
"local_port": 1080,
"remote_addr": "your-domain-name.com",
"remote_port": 443,
"password": [
"your_awesome_password"
],
"ssl": {
"sni": "your-domain-name.com",
"fingerprint": "Chrome"
}
}
我们感谢uTLS的开发者@gaukas 和 @jmwample。
In this release, we upgrade trojan-go client's uTLS library from v1.1.5 to v1.2.0.
sni value to your domain name in configuration file, because, your TLS Clienthello can still look very unique without the SNI extension.fingerprint value, because the default fingerprint (Chrome) is already the most popular one.Did you use any other trojan clients (eg. on your phone) to connect to the same server? If so, it cannot be determine whether the blocking is caused by this trojan-go client or other client's fingerprint and behaviors anymore.
We really want more users to report the status of their servers. If you are sure that you have been exclusively using the trojan-go clients we provided, please consider to report the status of your server (reporting not being blocked is as important as reporting blocking).
{
"run_type": "client",
"local_addr": "127.0.0.1",
"local_port": 1080,
"remote_addr": "your-domain-name.com",
"remote_port": 443,
"password": [
"your_awesome_password"
],
"ssl": {
"sni": "your-domain-name.com",
"fingerprint": "Chrome"
}
}
We thanks uTLS developers @gaukas and @jmwample for their time and efforts.