Documentation
¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type FETAnalyzer ¶
type FETAnalyzer struct{}
FETAnalyzer stands for "Fully Encrypted Traffic" analyzer. It implements an algorithm to detect fully encrypted proxy protocols such as Shadowsocks, mentioned in the following paper: https://gfw.report/publications/usenixsecurity23/data/paper/paper.pdf
func (*FETAnalyzer) Limit ¶
func (a *FETAnalyzer) Limit() int
func (*FETAnalyzer) Name ¶
func (a *FETAnalyzer) Name() string
type HTTPAnalyzer ¶
type HTTPAnalyzer struct{}
func (*HTTPAnalyzer) Limit ¶
func (a *HTTPAnalyzer) Limit() int
func (*HTTPAnalyzer) Name ¶
func (a *HTTPAnalyzer) Name() string
type SSHAnalyzer ¶
type SSHAnalyzer struct{}
func (*SSHAnalyzer) Limit ¶
func (a *SSHAnalyzer) Limit() int
func (*SSHAnalyzer) Name ¶
func (a *SSHAnalyzer) Name() string
type TLSAnalyzer ¶
type TLSAnalyzer struct{}
func (*TLSAnalyzer) Limit ¶
func (a *TLSAnalyzer) Limit() int
func (*TLSAnalyzer) Name ¶
func (a *TLSAnalyzer) Name() string
type TrojanAnalyzer ¶ added in v0.0.2
type TrojanAnalyzer struct{}
TrojanAnalyzer uses a very simple packet length based check to determine if a TLS connection is actually the Trojan proxy protocol. The algorithm is from the following project, with small modifications: https://github.com/XTLS/Trojan-killer Warning: Experimental only. This method is known to have significant false positives and false negatives.
func (*TrojanAnalyzer) Limit ¶ added in v0.0.2
func (a *TrojanAnalyzer) Limit() int
func (*TrojanAnalyzer) Name ¶ added in v0.0.2
func (a *TrojanAnalyzer) Name() string
Click to show internal directories.
Click to hide internal directories.