-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
- #3402
Comments
The timeout mechanism of VMESS is designed to prevent replay attacks. As a stateless protocol, this is its only way to prevent replay attacks, which is different from the maxTimeDiff of reality. |
This can be considered(should we?) |
为了覆盖更多应用场景,VLESS 即将有自带加密和 maxTimeDiff(后者上周就写好了),无需修改 VMess |
VLESS 的加密基本上就是 REALITY 的 session id,0-RTT,服务端私钥不泄露就无法解密,不像其它协议拿到客户端密码就能解密 |
这个加密不是给你们过墙用的哈,过墙去用 REALITY 或 TLS,别用这个 这个加密就是你不想让 CDN 看到内容时,或者不让转发 TLS 但允许非 TLS 时, 可以手写识别,不是全随机数,可选 XTLS,内层 TLS 直接转发以最大化性能(若你的需求只是至少有个加密,就无需二次加密) |
|
To zero X:VLESS 加密相较于其它协议的优点上面说过了,主要是在密码学上更安全,以及可选 XTLS 以最大化性能 |
至于加密后的特征,就没有想过要掩盖, |
Is there forward secrecy? |
没有严格意义上的前向保密 但是强于其它协议 |
@APT-ZERO I think this debate is completely unproductive. If you believe there is a value in doing so, you should test it and fork xray, deploy it and see about performance. Since there are only server-side changes, it should be very easy to deploy. It shortcuts a lot of discussions like this, and it doesn't put you in a position where you ask somebody else to spend time and prove your theories. |
真的有必要设计成公私钥吗 |
@Fangliding 目前设计目标是 0-RTT, 客户端是不可信的,配置很容易泄露,如果能拿来解密, |
频道消息的 都是 0-RTT,肯定搞一个更安全的,没必要提供不够安全的选项, |
I saw XTLS mentioned above along with XTLS encryption (nailed that! XD). Since XTLS Visiom only applies to non-multiplexed TCP connections, does this mean that XTLS Switch is coming soon? |
in fact, it seems that OP already raised the same exact proposal, and got the same exact answer: #3008 |
No description provided.
The text was updated successfully, but these errors were encountered: