Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

是否最好使用443端口,还是没有区别? #101

Open
adolphor opened this issue Nov 9, 2023 · 4 comments
Open

是否最好使用443端口,还是没有区别? #101

adolphor opened this issue Nov 9, 2023 · 4 comments

Comments

@adolphor
Copy link

adolphor commented Nov 9, 2023

因为一般来说HTTPS都是443端口,如果我们伪装为受信网站,但是不使用443端口的话,会不会导致伪装失败?

@leftsidestory
Copy link

shadow-tls不是伪装网站。是通过正常的TLS建立连接。所以tls本身肯定是443端口的。

@adolphor
Copy link
Author

adolphor commented Nov 10, 2023

tls 握手过程是指定的域名和443端口,这个我理解,我说的是握手结束后真实流量传输过程中,TCP包中会有目标服务器的端口暴露出去吗?因为TLS的握手过程是443,真实流量传输的端口如果是7788这种,是否也可以检测出来异常?

流程是这样的?
image

还是这样的?
image

@leftsidestory
Copy link

我覺得這個講的挺清楚的:https://github.com/ihciah/shadow-tls/blob/master/docs/protocol-v3-zh.md

@adolphor
Copy link
Author

这些文章我都看过了的,但并没有解决我的疑惑,在和受信网站进行tls握手和证书验证过程中,使用的肯定是443端口,这个毫无疑问,但是如果我们自己的服务器没有使用和受信网站一样的443端口,那就很容易鉴别出来是异常流量。

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants