-
Notifications
You must be signed in to change notification settings - Fork 9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Some extra ways of active probing #2539
Comments
Thanks for your report, a fix to these issues have been authored but yet to be released. The attacks described in this issue will be neutralized in the next release. |
@xiaokangwang I guess there is some misunderstanding of the second attack. The second attack is even easier: now the attacker does not have to perform the attack within 30 seconds because he can trigger the drain behavior at any time. As soon as the behavior seed is determined, It seems like a dilemma: a large |
BaseDrainSize and RandDrainMax is the characteristic of that individual server's port. And any typical TCP server will always read a certain amount of data before closing the connection. Can you describe how to determine whether a TCP server is a VMess server based on BaseDrainSize and RandDrainMax ? |
There are a few heuristics, but none are 'precise' enough. I think it is fine as declared in the announcement. Such uniform random behavior is actually rare but there is no protocol that is completely unidentifiable. So my apologies and thank you for your earnest work. |
Thanks for your contribution. The distribution of drain can always be adjusted later. You don't need to say sorry, and you deserve my homage. |
This issue have been resolved and the original report is declassified. Decrypted report appended below:
|
There are a couple of possible ways of active probing, even with #2523 patched. Most of them are probabilistic and not easy to exploit, and I am only posting two obvious attack vectors here. V2Ray's VMess implementation seems to be pretty broken by now.
The text was updated successfully, but these errors were encountered: