Closed yanggis closed 7 years ago
这个功能可以做不算麻烦。关键是我需要找点时间来做。最近工作比较忙,等我找空来做一下。
2017年5月20日 23:09,"X.K. YANG" notifications@github.com写道:
现在很多网站都全面转向了https了,最近有没有计划增加内置HTTPS代理支持的功能呢?
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rjwaDW61jgI_s6gBXOntc-Wt_lxkoks5r7wIqgaJpZM4NhUsV .
好,加油啊,redsocks2真是太好用了,真希望它能越做越完美啊。
有可以用于测试的支持https的代理吗?最好长期有效的,我不确定我什么时候有时间测。如果有的话,你单独发给我吧。不想花时间搭HTTPS测试服务器
On Sun, May 21, 2017 at 9:46 PM, X.K. YANG notifications@github.com wrote:
好,加油啊,redsocks2真是太好用了,真希望它能越做越完美啊。
— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-302937739, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rjxjyNaIb14_zBVT2msFrwDylRld4ks5r8EAfgaJpZM4NhUsV .
我都是网上找的https代理,不能保证长期有效呢,如果需要,留个email给我,我发给你,谢谢哈。
可以发几个可用的https代理给我做测试吗? semigodking@gmail.com
On Mon, May 22, 2017 at 8:17 PM, X.K. YANG notifications@github.com wrote:
我都是网上找的https代理,不能保证长期有效呢,如果需要,留个email给我,我发给你,谢谢哈。
— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-303083638, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rj_ZlnOHvQwNQVWARf6n51dFlFl9Bks5r8XzrgaJpZM4NhUsV .
不行
[noname@default libevent2]$ openssl s_client -connect 1.82.216.135:80
-debug
CONNECTED(00000003)
write to 0x83c2cf8 [0x83c4588] (247 bytes => 247 (0xF7))
0000 - 16 03 01 00 f2 01 00 00-ee 03 03 59 38 d4 43 97 ...........Y8.C.
0010 - 0c 4d 07 83 30 7d 6a 3c-02 d4 0c 08 a6 d3 a4 72 .M..0}j<.......r
0020 - 54 56 36 5e d7 ee de 9d-83 b0 f6 00 00 84 c0 30 TV6^...........0
0030 - c0 2c c0 28 c0 24 c0 14-c0 0a 00 a3 00 9f 00 6b .,.(.$.........k
0040 - 00 6a 00 39 00 38 00 88-00 87 c0 32 c0 2e c0 2a .j.9.8.....2...*
0050 - c0 26 c0 0f c0 05 00 9d-00 3d 00 35 00 84 c0 2f .&.......=.5.../
0060 - c0 2b c0 27 c0 23 c0 13-c0 09 00 a2 00 9e 00 67 .+.'.#.........g
0070 - 00 40 00 33 00 32 00 9a-00 99 00 45 00 44 c0 31 .@.3.2.....E.D.1
0080 - c0 2d c0 29 c0 25 c0 0e-c0 04 00 9c 00 3c 00 2f .-.).%.......<./
0090 - 00 96 00 41 c0 12 c0 08-00 16 00 13 c0 0d c0 03 ...A............
00a0 - 00 0a 00 07 c0 11 c0 07-c0 0c c0 02 00 05 00 04 ................
00b0 - 00 ff 01 00 00 41 00 0b-00 04 03 00 01 02 00 0a .....A..........
00c0 - 00 08 00 06 00 19 00 18-00 17 00 23 00 00 00 0d ...........#....
00d0 - 00 20 00 1e 06 01 06 02-06 03 05 01 05 02 05 03 . ..............
00e0 - 04 01 04 02 04 03 03 01-03 02 03 03 02 01 02 02 ................
00f0 - 02 03 00 0f 00 01 01 .......
read from 0x83c2cf8 [0x83c9ae8] (7 bytes => 7 (0x7))
0000 - 3c 48 54 4d 4c 3e 0a <HTML>.
3072173804:error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown
protocol:s23_clnt.c:769:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 247 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
---
On Thu, Jun 8, 2017 at 12:02 PM, X.K. YANG notifications@github.com wrote:
这个应该可以用,支持http/https 1.82.216.135:80
— You are receiving this because you were assigned. Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-306992131, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rjylVKWCJYNU6asn60UygnVKMo5gJks5sB3JFgaJpZM4NhUsV .
http://ip.cn 看看你的公网IP是多少,告诉我一下,我给你开一个https的代理。
不用了,自己用stunnel搞了一个
On Thu, Jun 8, 2017 at 12:47 PM, X.K. YANG notifications@github.com wrote:
http://ip.cn 看看你的公网IP是多少,告诉我一下,我给你开一个https的代理。
— You are receiving this because you were assigned. Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-306997169, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rj-R-YskJdtXOUS80aqkeTqEhcTl7ks5sB3zxgaJpZM4NhUsV .
已经做的能工作了,但还有不少问题需要仔细解决。其实根本没必要实现这个功能,因为配合stunnel的客户端模式就可以实现ssl proxy了。而且在多核环境下效果更好,因为把加密解密的工作转交给另外一个进程可以并行执行。
Semigod King semigodking@gmail.com于2017年6月8日周四 14:09写道:
不用了,自己用stunnel搞了一个
On Thu, Jun 8, 2017 at 12:47 PM, X.K. YANG notifications@github.com wrote:
http://ip.cn 看看你的公网IP是多少,告诉我一下,我给你开一个https的代理。
— You are receiving this because you were assigned. Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-306997169, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rj-R-YskJdtXOUS80aqkeTqEhcTl7ks5sB3zxgaJpZM4NhUsV .
好的,了解了,谢谢。
已经添加,请试用下吧。
好的,非常感谢。
@semigodking libevent2 需要什么版本?试过 2.0.22/2.1.8 和 git 版本都编译出错:
cc -fPIC -O3 -D_BSD_SOURCE -D_DEFAULT_SOURCE -Wall -std=c99 -D_XOPEN_SOURCE=600 -DENABLE_HTTPS_PROXY -DUSE_CRYPTO_OPENSSL -o redsocks2 parser.o main.o redsocks.o log.o direct.o ipcache.o autoproxy.o encrypt.o shadowsocks.o http-connect.o socks4.o socks5.o http-relay.o base.o base64.o md5.o http-auth.o utils.o redudp.o socks5-udp.o shadowsocks-udp.o tcpdns.o gen/version.o https-connect.o -levent -levent -lssl -lcrypto
utils.o: In function `red_connect_relay_ssl':
utils.c:(.text+0x544): undefined reference to `bufferevent_openssl_filter_new'
https-connect.o: In function `httpsc_event_cb':
https-connect.c:(.text+0x4ac): undefined reference to `bufferevent_openssl_get_allow_dirty_shutdown'
https-connect.c:(.text+0x504): undefined reference to `bufferevent_openssl_get_allow_dirty_shutdown'
https-connect.c:(.text+0x604): undefined reference to `bufferevent_get_openssl_error'
https-connect.c:(.text+0x6d0): undefined reference to `bufferevent_get_openssl_error'
collect2: error: ld returned 1 exit status
make: *** [Makefile:113: redsocks2] Error 1
我编译时用的是2.1.8。需要你的libevent有编译openssl的支持进去。去检查一下event-config.h,看看里有没有定义 EVENT__HAVE_OPENSSL
On Fri, Jun 9, 2017 at 9:22 PM, rampageX notifications@github.com wrote:
@semigodking https://github.com/semigodking libevent2 需要什么版本?试过 2.0.22/2.1.8 和 git 版本都编译出错:
cc -fPIC -O3 -D_BSD_SOURCE -D_DEFAULT_SOURCE -Wall -std=c99 -D_XOPEN_SOURCE=600 -DENABLE_HTTPS_PROXY -DUSE_CRYPTO_OPENSSL -o redsocks2 parser.o main.o redsocks.o log.o direct.o ipcache.o autoproxy.o encrypt.o shadowsocks.o http-connect.o socks4.o socks5.o http-relay.o base.o base64.o md5.o http-auth.o utils.o redudp.o socks5-udp.o shadowsocks-udp.o tcpdns.o gen/version.o https-connect.o -levent -levent -lssl -lcrypto utils.o: In function
red_connect_relay_ssl': utils.c:(.text+0x544): undefined reference to
bufferevent_openssl_filter_new' https-connect.o: In functionhttpsc_event_cb': https-connect.c:(.text+0x4ac): undefined reference to
bufferevent_openssl_get_allow_dirty_shutdown' https-connect.c:(.text+0x504): undefined reference tobufferevent_openssl_get_allow_dirty_shutdown' https-connect.c:(.text+0x604): undefined reference to
bufferevent_get_openssl_error' https-connect.c:(.text+0x6d0): undefined reference to `bufferevent_get_openssl_error' collect2: error: ld returned 1 exit status make: *** [Makefile:113: redsocks2] Error 1— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-307387001, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rj24FnVn1NEGTvabFHef9bWktO2w1ks5sCUcVgaJpZM4NhUsV .
刚看了一下,如果是跟2.0编译的话,要把libevent_openssl.so这个加进去link. 所以,需要编译下Makefile LIBS := -levent -levent_openssl
On Fri, Jun 9, 2017 at 9:59 PM, Semigod King semigodking@gmail.com wrote:
我编译时用的是2.1.8。需要你的libevent有编译openssl的支持进去。去检查一下event-config.h,看看里有没有定义EV ENT__HAVE_OPENSSL
On Fri, Jun 9, 2017 at 9:22 PM, rampageX notifications@github.com wrote:
@semigodking https://github.com/semigodking libevent2 需要什么版本?试过 2.0.22/2.1.8 和 git 版本都编译出错:
cc -fPIC -O3 -D_BSD_SOURCE -D_DEFAULT_SOURCE -Wall -std=c99 -D_XOPEN_SOURCE=600 -DENABLE_HTTPS_PROXY -DUSE_CRYPTO_OPENSSL -o redsocks2 parser.o main.o redsocks.o log.o direct.o ipcache.o autoproxy.o encrypt.o shadowsocks.o http-connect.o socks4.o socks5.o http-relay.o base.o base64.o md5.o http-auth.o utils.o redudp.o socks5-udp.o shadowsocks-udp.o tcpdns.o gen/version.o https-connect.o -levent -levent -lssl -lcrypto utils.o: In function
red_connect_relay_ssl': utils.c:(.text+0x544): undefined reference to
bufferevent_openssl_filter_new' https-connect.o: In functionhttpsc_event_cb': https-connect.c:(.text+0x4ac): undefined reference to
bufferevent_openssl_get_allow_dirty_shutdown' https-connect.c:(.text+0x504): undefined reference tobufferevent_openssl_get_allow_dirty_shutdown' https-connect.c:(.text+0x604): undefined reference to
bufferevent_get_openssl_error' https-connect.c:(.text+0x6d0): undefined reference to `bufferevent_get_openssl_error' collect2: error: ld returned 1 exit status make: *** [Makefile:113: redsocks2] Error 1— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-307387001, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rj24FnVn1NEGTvabFHef9bWktO2w1ks5sCUcVgaJpZM4NhUsV .
@semigodking 加了 -levent_openssl
OK 了。
支持用户名密码认证么?如何忽略证书?我用 gost 建的 https 服务器貌似不行(用 gost 客户端可以):
1497025972.358783 debug https-connect.c:72 log_ssl_error(...) [192.168.2.8:58464->162.125.34.129:443]: SSL Error: SSL routines SSL3_GET_RECORD: wrong version number: Success
1497025972.358901 debug https-connect.c:147 httpsc_event_cb(...) [192.168.2.8:58464->162.125.34.129:443]: relay, what: READING|0|0|ERROR|0|0|0x0: Success
1497025972.358984 debug redsocks.c:410 redsocks_drop_client(...) [192.168.2.8:58464->162.125.34.129:443]: dropping client @ state: 0
1497025972.362282 debug redsocks.c:820 redsocks_accept_client(...) [192.168.2.8:58467->162.125.34.129:443]: accepted
1497025972.362734 debug redsocks.c:511 redsocks_event_error(...) [192.168.2.8:58467->162.125.34.129:443]: client, what: READING|0|EOF|0|0|0|0x0: Success
1497025973.509059 debug redsocks.c:820 redsocks_accept_client(...) [192.168.2.8:58468->216.58.221.243:443]: accepted
1497025975.358699 debug autoproxy.c:605 auto_event_error(...) [192.168.2.8:58467->162.125.34.129:443]: relay, errno(0), State: 10000, what: 0|WRITING|0|0|TIMEOUT|0|0x0: Success
1497025975.358805 debug autoproxy.c:202 on_connection_blocked(...) [192.168.2.8:58467->162.125.34.129:443]: IP Blocked
1497025975.358883 debug autoproxy.c:501 auto_retry(...) [192.168.2.8:58467->162.125.34.129:443]: ADD IP to cache: 162.125.34.129
1497025975.358955 debug autoproxy.c:475 auto_drop_relay(...) [192.168.2.8:58467->162.125.34.129:443]: dropping relay only
1497025975.495220 debug https-connect.c:72 log_ssl_error(...) [192.168.2.8:58467->162.125.34.129:443]: SSL Error: SSL routines SSL3_GET_RECORD: wrong version number: Success
1497025975.495336 debug https-connect.c:147 httpsc_event_cb(...) [192.168.2.8:58467->162.125.34.129:443]: relay, what: READING|0|0|ERROR|0|0|0x0: Success
1497025975.495419 debug redsocks.c:410 redsocks_drop_client(...) [192.168.2.8:58467->162.125.34.129:443]: dropping client @ state: 0
1497025976.508713 debug autoproxy.c:605 auto_event_error(...) [192.168.2.8:58468->216.58.221.243:443]: relay, errno(0), State: 10000, what: 0|WRITING|0|0|TIMEOUT|0|0x0: Success
1497025976.508818 debug autoproxy.c:202 on_connection_blocked(...) [192.168.2.8:58468->216.58.221.243:443]: IP Blocked
1497025976.508899 debug autoproxy.c:501 auto_retry(...) [192.168.2.8:58468->216.58.221.243:443]: ADD IP to cache: 216.58.221.243
1497025976.508972 debug autoproxy.c:475 auto_drop_relay(...) [192.168.2.8:58468->216.58.221.243:443]: dropping relay only
1497025976.583317 debug https-connect.c:72 log_ssl_error(...) [192.168.2.8:58468->216.58.221.243:443]: SSL Error: SSL routines SSL3_GET_RECORD: wrong version number: Success
openssl s_client -connect test.com:465 输出:
CONNECTED(00000003)
depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return:1
depth=0 CN = test.com
verify return:1
---
Certificate chain
0 s:/CN=test.com
i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
1 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
i:/O=Digital Signature Trust Co./CN=DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/CN=test.com
issuer=/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
---
No client certificate CA names sent
Peer signing digest: SHA384
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 3096 bytes and written 434 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: 9D05298F639152C3607596F9EB1DE3C2725E247A73070CA3E065EB5D9F53D73D
Session-ID-ctx:
Master-Key: BC0706E0A6A9491EFAEE65B73114A17DA3B37178834D86DBACA540A1C5B962905FE192FF61141B53E77D7BEFA6943782
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket:
0000 - 83 cb fa 71 01 d8 3f a0-60 91 60 60 79 33 46 06 ...q..?.`.``y3F.
0010 - d2 fa 3a 07 85 c2 6b c8-9e bf 78 ac 73 9f 84 a0 ..:...k...x.s...
0020 - a3 3b 16 cd bb 9b 3c ae-9d c4 4e 30 2e e2 a0 7c .;....<...N0...|
0030 - 4a a3 29 42 0e ff b0 86-7a 13 8c e0 dd 6f 4b 67 J.)B....z....oKg
0040 - d3 79 24 96 8b e3 aa 63-b7 ce 7b ce 1c 7e a6 4e .y$....c..{..~.N
0050 - 9c b8 ac 6d ac e6 ad cc-4e e0 15 9e fb ca 75 e0 ...m....N.....u.
0060 - 83 77 60 75 ae 9f ff 34-0e 04 9a 54 87 df 55 6d .w`u...4...T..Um
0070 - 0d 97 7d 47 7b cb 8c 4f- ..}G{..O
Start Time: 1497026144
Timeout : 300 (sec)
Verify return code: 0 (ok)
---
closed
我回头用你这个服务器试下。原本就是忽略证书的。
rampageX notifications@github.com于2017年6月10日周六 00:42写道:
支持用户名密码认证么?如何忽略证书?我用 gost 建的 https 服务器貌似不行(用 gost 客户端可以):
1497025972.358783 debug https-connect.c:72 log_ssl_error(...) [192.168.2.8:58464->162.125.34.129:443]: SSL Error: SSL routines SSL3_GET_RECORD: wrong version number: Success 1497025972.358901 debug https-connect.c:147 httpsc_event_cb(...) [192.168.2.8:58464->162.125.34.129:443]: relay, what: READING|0|0|ERROR|0|0|0x0: Success 1497025972.358984 debug redsocks.c:410 redsocks_drop_client(...) [192.168.2.8:58464->162.125.34.129:443]: dropping client @ state: 0 1497025972.362282 debug redsocks.c:820 redsocks_accept_client(...) [192.168.2.8:58467->162.125.34.129:443]: accepted 1497025972.362734 debug redsocks.c:511 redsocks_event_error(...) [192.168.2.8:58467->162.125.34.129:443]: client, what: READING|0|EOF|0|0|0|0x0: Success 1497025973.509059 debug redsocks.c:820 redsocks_accept_client(...) [192.168.2.8:58468->216.58.221.243:443]: accepted 1497025975.358699 debug autoproxy.c:605 auto_event_error(...) [192.168.2.8:58467->162.125.34.129:443]: relay, errno(0), State: 10000, what: 0|WRITING|0|0|TIMEOUT|0|0x0: Success 1497025975.358805 debug autoproxy.c:202 on_connection_blocked(...) [192.168.2.8:58467->162.125.34.129:443]: IP Blocked 1497025975.358883 debug autoproxy.c:501 auto_retry(...) [192.168.2.8:58467->162.125.34.129:443]: ADD IP to cache: 162.125.34.129 1497025975.358955 debug autoproxy.c:475 auto_drop_relay(...) [192.168.2.8:58467->162.125.34.129:443]: dropping relay only 1497025975.495220 debug https-connect.c:72 log_ssl_error(...) [192.168.2.8:58467->162.125.34.129:443]: SSL Error: SSL routines SSL3_GET_RECORD: wrong version number: Success 1497025975.495336 debug https-connect.c:147 httpsc_event_cb(...) [192.168.2.8:58467->162.125.34.129:443]: relay, what: READING|0|0|ERROR|0|0|0x0: Success 1497025975.495419 debug redsocks.c:410 redsocks_drop_client(...) [192.168.2.8:58467->162.125.34.129:443]: dropping client @ state: 0 1497025976.508713 debug autoproxy.c:605 auto_event_error(...) [192.168.2.8:58468->216.58.221.243:443]: relay, errno(0), State: 10000, what: 0|WRITING|0|0|TIMEOUT|0|0x0: Success 1497025976.508818 debug autoproxy.c:202 on_connection_blocked(...) [192.168.2.8:58468->216.58.221.243:443]: IP Blocked 1497025976.508899 debug autoproxy.c:501 auto_retry(...) [192.168.2.8:58468->216.58.221.243:443]: ADD IP to cache: 216.58.221.243 1497025976.508972 debug autoproxy.c:475 auto_drop_relay(...) [192.168.2.8:58468->216.58.221.243:443]: dropping relay only 1497025976.583317 debug https-connect.c:72 log_ssl_error(...) [192.168.2.8:58468->216.58.221.243:443]: SSL Error: SSL routines SSL3_GET_RECORD: wrong version number: Success
openssl s_client -connect test.com:465 输出:
CONNECTED(00000003) depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3 verify return:1 depth=0 CN = test.com verify return:1
Certificate chain 0 s:/CN=test.com i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3 1 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3 i:/O=Digital Signature Trust Co./CN=DST Root CA X3
Server certificate -----BEGIN CERTIFICATE----- MIIFHTCCBAWgAwIBAgISAyzRHq8XowCMd9I3DmJR6wnIMA0GCSqGSIb3DQEBCwUA MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQD ExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMzAeFw0xNzA0MTgxNTAzMDBaFw0x NzA3MTcxNTAzMDBaMBwxGjAYBgNVBAMTEXF1YWtlbWFjaGluZXguY29tMIIBIjAN BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtS8ikWtslBkhZEMHPSgzCZxPKXOo u3AVS7hIcBnGo16SA8Ay57LMFhcNf/J6HU55pYs8wxtj7cZfvxW/85gjQzipEauZ GCM5iEy53NBsOMoXqJoHSNPm+gwdwEAyxNqS2G6BStWaZi2lg2lbf+hA6Xtg7GwF 2aXqTYxR2bGxg+cJIPrMqiP+Kmhjck/XvF6cfeqFnmSvzUGdQNWhQAOqH9CBqYEr LuVHCTIK8Ok0mfuQgL1U5p//DkvkNb8nMhRzFhCKdE5sEbJ/fRn6bPIBC52O8i1g WNeDTN3vGC6ntZK+KTt4EF2p0FnJmbNL1aZ93qbA6dBDrKV/HLo63oigIQIDAQAB o4ICKTCCAiUwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr BgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTNSv1gg7qSfDV7vxu1dIh8 oZQ3WDAfBgNVHSMEGDAWgBSoSmpjBH3duubRObemRWXv86jsoTBwBggrBgEFBQcB AQRkMGIwLwYIKwYBBQUHMAGGI2h0dHA6Ly9vY3NwLmludC14My5sZXRzZW5jcnlw dC5vcmcvMC8GCCsGAQUFBzAChiNodHRwOi8vY2VydC5pbnQteDMubGV0c2VuY3J5 cHQub3JnLzAzBgNVHREELDAqghFxdWFrZW1hY2hpbmV4LmNvbYIVd3d3LnF1YWtl bWFjaGluZXguY29tMIH+BgNVHSAEgfYwgfMwCAYGZ4EMAQIBMIHmBgsrBgEEAYLf EwEBATCB1jAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5sZXRzZW5jcnlwdC5vcmcw gasGCCsGAQUFBwICMIGeDIGbVGhpcyBDZXJ0aWZpY2F0ZSBtYXkgb25seSBiZSBy ZWxpZWQgdXBvbiBieSBSZWx5aW5nIFBhcnRpZXMgYW5kIG9ubHkgaW4gYWNjb3Jk YW5jZSB3aXRoIHRoZSBDZXJ0aWZpY2F0ZSBQb2xpY3kgZm91bmQgYXQgaHR0cHM6 Ly9sZXRzZW5jcnlwdC5vcmcvcmVwb3NpdG9yeS8wDQYJKoZIhvcNAQELBQADggEB AFjxR5tQBTOZR4ZQWcG0W7bXspZ7HFhw6r0Ajxh/P7LVcAQkUpyd9sPT4JUGoWyc dvf/SlKxLMuEdCy8VmCwXDao5S723iLcUu+x88TjFsaGpfyYfsyEmUISv+w+6BqM H3pXVoNj2bwEHtnFR/QPVdjPsBhTcbG5mc+/fcIx1VrLTXCG6c5+DhZ8u/xmIueP sY3L4vG4kZV73qkgzsTW3467A7f8pcAlbG8rVTA1WpiRjj1bzlETxciPw2p+ynEe IqK7EAwBrE+SSQhJNZRGpopBfQMrGO1E7DVmgH3CtSzLkMq4QbXkdpV+P/mTjcFa uOducEnZ7DOW7m+b+H1LmgE= -----END CERTIFICATE----- subject=/CN=test.com issuer=/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
No client certificate CA names sent Peer signing digest: SHA384 Server Temp Key: ECDH, P-256, 256 bits
SSL handshake has read 3096 bytes and written 434 bytes
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 9D05298F639152C3607596F9EB1DE3C2725E247A73070CA3E065EB5D9F53D73D Session-ID-ctx: Master-Key: BC0706E0A6A9491EFAEE65B73114A17DA3B37178834D86DBACA540A1C5B962905FE192FF61141B53E77D7BEFA6943782 Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None TLS session ticket: 0000 - 83 cb fa 71 01 d8 3f a0-60 91 60 60 79 33 46 06 ...q..?.
.``y3F. 0010 - d2 fa 3a 07 85 c2 6b c8-9e bf 78 ac 73 9f 84 a0 ..:...k...x.s... 0020 - a3 3b 16 cd bb 9b 3c ae-9d c4 4e 30 2e e2 a0 7c .;....<...N0...| 0030 - 4a a3 29 42 0e ff b0 86-7a 13 8c e0 dd 6f 4b 67 J.)B....z....oKg 0040 - d3 79 24 96 8b e3 aa 63-b7 ce 7b ce 1c 7e a6 4e .y$....c..{..~.N 0050 - 9c b8 ac 6d ac e6 ad cc-4e e0 15 9e fb ca 75 e0 ...m....N.....u. 0060 - 83 77 60 75 ae 9f ff 34-0e 04 9a 54 87 df 55 6d .w
u...4...T..Um 0070 - 0d 97 7d 47 7b cb 8c 4f- ..}G{..OStart Time: 1497026144 Timeout : 300 (sec) Verify return code: 0 (ok)
closed
— You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-307439476, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rjxwF9IJ2g6cevVf3kigrBi6wepymks5sCXYBgaJpZM4NhUsV .
我又改了一下,放松了SSL版本的限制。现在我用你的服务器测试的结果是这样。 1497062964.307960 err utils.c:472 make_socket_transparent(...) setsockopt(..., SOL_IP, IP_TRANSPARENT): Operation not permitted 1497062964.307971 warning redsocks.c:981 redsocks_init_instance(...) Continue without TPROXY support 1497062964.308036 notice main.c:253 main(...) redsocks started with: epoll 1497062969.730844 debug redsocks.c:820 redsocks_accept_client(...)
1497062969.781297 debug https-connect.c:147 httpsc_event_cb(...) 10.10.10.1:46004->216.58.219.36:80: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success 1497062969.781309 debug redsocks.c:310 process_shutdown_onwrite(...) 10.10.10.1:46004->216.58.219.36:80: WCB relay, fs: 0, ts: 0, fin: 167, fout: 0, tin: 0 1497062969.801742 notice http-connect.c:136 httpc_read_cb(...) 10.10.10.1:46004->216.58.219.36:80: HTTP/1.1 400 Bad Request 1497062969.801748 debug redsocks.c:410 redsocks_drop_client(...) 10.10.10.1:46004->216.58.219.36:80: dropping client @ state: 1
估计是因为我没有设置用户名和密码的关系 。你自己输入用户名密码看吧。
On Sat, Jun 10, 2017 at 9:09 AM, Semigod King semigodking@gmail.com wrote:
我回头用你这个服务器试下。原本就是忽略证书的。
rampageX notifications@github.com于2017年6月10日周六 00:42写道:
支持用户名密码认证么?如何忽略证书?我用 gost 建的 https 服务器貌似不行(用 gost 客户端可以):
1497025972.358783 debug https-connect.c:72 log_ssl_error(...) [192.168.2.8:58464->162.125.34.129:443]: SSL Error: SSL routines SSL3_GET_RECORD: wrong version number: Success 1497025972.358901 debug https-connect.c:147 httpsc_event_cb(...) [192.168.2.8:58464->162.125.34.129:443]: relay, what: READING|0|0|ERROR|0|0|0x0: Success 1497025972.358984 debug redsocks.c:410 redsocks_drop_client(...) [192.168.2.8:58464->162.125.34.129:443]: dropping client @ state: 0 1497025972.362282 debug redsocks.c:820 redsocks_accept_client(...) [192.168.2.8:58467->162.125.34.129:443]: accepted 1497025972.362734 debug redsocks.c:511 redsocks_event_error(...) [192.168.2.8:58467->162.125.34.129:443]: client, what: READING|0|EOF|0|0|0|0x0: Success 1497025973.509059 debug redsocks.c:820 redsocks_accept_client(...) [192.168.2.8:58468->216.58.221.243:443]: accepted 1497025975.358699 debug autoproxy.c:605 auto_event_error(...) [192.168.2.8:58467->162.125.34.129:443]: relay, errno(0), State: 10000, what: 0|WRITING|0|0|TIMEOUT|0|0x0: Success 1497025975.358805 debug autoproxy.c:202 on_connection_blocked(...) [192.168.2.8:58467->162.125.34.129:443]: IP Blocked 1497025975.358883 debug autoproxy.c:501 auto_retry(...) [192.168.2.8:58467->162.125.34.129:443]: ADD IP to cache: 162.125.34.129 1497025975.358955 debug autoproxy.c:475 auto_drop_relay(...) [192.168.2.8:58467->162.125.34.129:443]: dropping relay only 1497025975.495220 debug https-connect.c:72 log_ssl_error(...) [192.168.2.8:58467->162.125.34.129:443]: SSL Error: SSL routines SSL3_GET_RECORD: wrong version number: Success 1497025975.495336 debug https-connect.c:147 httpsc_event_cb(...) [192.168.2.8:58467->162.125.34.129:443]: relay, what: READING|0|0|ERROR|0|0|0x0: Success 1497025975.495419 debug redsocks.c:410 redsocks_drop_client(...) [192.168.2.8:58467->162.125.34.129:443]: dropping client @ state: 0 1497025976.508713 debug autoproxy.c:605 auto_event_error(...) [192.168.2.8:58468->216.58.221.243:443]: relay, errno(0), State: 10000, what: 0|WRITING|0|0|TIMEOUT|0|0x0: Success 1497025976.508818 debug autoproxy.c:202 on_connection_blocked(...) [192.168.2.8:58468->216.58.221.243:443]: IP Blocked 1497025976.508899 debug autoproxy.c:501 auto_retry(...) [192.168.2.8:58468->216.58.221.243:443]: ADD IP to cache: 216.58.221.243 1497025976.508972 debug autoproxy.c:475 auto_drop_relay(...) [192.168.2.8:58468->216.58.221.243:443]: dropping relay only 1497025976.583317 debug https-connect.c:72 log_ssl_error(...) [192.168.2.8:58468->216.58.221.243:443]: SSL Error: SSL routines SSL3_GET_RECORD: wrong version number: Success
openssl s_client -connect test.com:465 输出:
CONNECTED(00000003) depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3 verify return:1 depth=0 CN = test.com verify return:1
Certificate chain 0 s:/CN=test.com i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3 1 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3 i:/O=Digital Signature Trust Co./CN=DST Root CA X3
Server certificate -----BEGIN CERTIFICATE----- MIIFHTCCBAWgAwIBAgISAyzRHq8XowCMd9I3DmJR6wnIMA0GCSqGSIb3DQEBCwUA MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQD ExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMzAeFw0xNzA0MTgxNTAzMDBaFw0x NzA3MTcxNTAzMDBaMBwxGjAYBgNVBAMTEXF1YWtlbWFjaGluZXguY29tMIIBIjAN BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtS8ikWtslBkhZEMHPSgzCZxPKXOo u3AVS7hIcBnGo16SA8Ay57LMFhcNf/J6HU55pYs8wxtj7cZfvxW/85gjQzipEauZ GCM5iEy53NBsOMoXqJoHSNPm+gwdwEAyxNqS2G6BStWaZi2lg2lbf+hA6Xtg7GwF 2aXqTYxR2bGxg+cJIPrMqiP+Kmhjck/XvF6cfeqFnmSvzUGdQNWhQAOqH9CBqYEr LuVHCTIK8Ok0mfuQgL1U5p//DkvkNb8nMhRzFhCKdE5sEbJ/fRn6bPIBC52O8i1g WNeDTN3vGC6ntZK+KTt4EF2p0FnJmbNL1aZ93qbA6dBDrKV/HLo63oigIQIDAQAB o4ICKTCCAiUwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr BgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTNSv1gg7qSfDV7vxu1dIh8 oZQ3WDAfBgNVHSMEGDAWgBSoSmpjBH3duubRObemRWXv86jsoTBwBggrBgEFBQcB AQRkMGIwLwYIKwYBBQUHMAGGI2h0dHA6Ly9vY3NwLmludC14My5sZXRzZW5jcnlw dC5vcmcvMC8GCCsGAQUFBzAChiNodHRwOi8vY2VydC5pbnQteDMubGV0c2VuY3J5 cHQub3JnLzAzBgNVHREELDAqghFxdWFrZW1hY2hpbmV4LmNvbYIVd3d3LnF1YWtl bWFjaGluZXguY29tMIH+BgNVHSAEgfYwgfMwCAYGZ4EMAQIBMIHmBgsrBgEEAYLf EwEBATCB1jAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5sZXRzZW5jcnlwdC5vcmcw gasGCCsGAQUFBwICMIGeDIGbVGhpcyBDZXJ0aWZpY2F0ZSBtYXkgb25seSBiZSBy ZWxpZWQgdXBvbiBieSBSZWx5aW5nIFBhcnRpZXMgYW5kIG9ubHkgaW4gYWNjb3Jk YW5jZSB3aXRoIHRoZSBDZXJ0aWZpY2F0ZSBQb2xpY3kgZm91bmQgYXQgaHR0cHM6 Ly9sZXRzZW5jcnlwdC5vcmcvcmVwb3NpdG9yeS8wDQYJKoZIhvcNAQELBQADggEB AFjxR5tQBTOZR4ZQWcG0W7bXspZ7HFhw6r0Ajxh/P7LVcAQkUpyd9sPT4JUGoWyc dvf/SlKxLMuEdCy8VmCwXDao5S723iLcUu+x88TjFsaGpfyYfsyEmUISv+w+6BqM H3pXVoNj2bwEHtnFR/QPVdjPsBhTcbG5mc+/fcIx1VrLTXCG6c5+DhZ8u/xmIueP sY3L4vG4kZV73qkgzsTW3467A7f8pcAlbG8rVTA1WpiRjj1bzlETxciPw2p+ynEe IqK7EAwBrE+SSQhJNZRGpopBfQMrGO1E7DVmgH3CtSzLkMq4QbXkdpV+P/mTjcFa uOducEnZ7DOW7m+b+H1LmgE= -----END CERTIFICATE----- subject=/CN=test.com issuer=/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
No client certificate CA names sent Peer signing digest: SHA384 Server Temp Key: ECDH, P-256, 256 bits
SSL handshake has read 3096 bytes and written 434 bytes
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 9D05298F639152C3607596F9EB1DE3C2725E247A73070CA3E065EB5D9F53D73D Session-ID-ctx: Master-Key: BC0706E0A6A9491EFAEE65B73114A17DA3B37178834D86DBACA540A1C5B962905FE192FF61141B53E77D7BEFA6943782 Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None TLS session ticket: 0000 - 83 cb fa 71 01 d8 3f a0-60 91 60 60 79 33 46 06 ...q..?.
.``y3F. 0010 - d2 fa 3a 07 85 c2 6b c8-9e bf 78 ac 73 9f 84 a0 ..:...k...x.s... 0020 - a3 3b 16 cd bb 9b 3c ae-9d c4 4e 30 2e e2 a0 7c .;....<...N0...| 0030 - 4a a3 29 42 0e ff b0 86-7a 13 8c e0 dd 6f 4b 67 J.)B....z....oKg 0040 - d3 79 24 96 8b e3 aa 63-b7 ce 7b ce 1c 7e a6 4e .y$....c..{..~.N 0050 - 9c b8 ac 6d ac e6 ad cc-4e e0 15 9e fb ca 75 e0 ...m....N.....u. 0060 - 83 77 60 75 ae 9f ff 34-0e 04 9a 54 87 df 55 6d .w
u...4...T..Um 0070 - 0d 97 7d 47 7b cb 8c 4f- ..}G{..OStart Time: 1497026144 Timeout : 300 (sec) Verify return code: 0 (ok)
closed
— You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-307439476, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rjxwF9IJ2g6cevVf3kigrBi6wepymks5sCXYBgaJpZM4NhUsV .
一连接程序就出错退出:
1497073375.521161 debug autoproxy.c:475 auto_drop_relay(...) [192.168.2.8:51852->148.251.84.40:80]: dropping relay only
1497073375.615298 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51853->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success
1497073375.615416 debug redsocks.c:310 process_shutdown_on_write_(...) [192.168.2.8:51853->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 0, fout: 0, tin: 0
1497073375.633026 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51854->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success
1497073375.633146 debug redsocks.c:310 process_shutdown_on_write_(...) [192.168.2.8:51854->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 0, fout: 0, tin: 0
1497073375.633955 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51851->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success
1497073375.634069 debug redsocks.c:310 process_shutdown_on_write_(...) [192.168.2.8:51851->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 473, fout: 0, tin: 0
1497073375.635053 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51852->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success
1497073375.635167 debug redsocks.c:310 process_shutdown_on_write_(...) [192.168.2.8:51852->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 0, fout: 0, tin: 0
Segmentation fault
@semigodking 服务器相关信息发你邮箱了。
你先试下关掉autoproxy, 我之前确实忘测带autoproxy的情况了
rampageX notifications@github.com于2017年6月10日周六 13:50写道:
一连接程序就出错退出:
1497073375.521161 debug autoproxy.c:475 auto_drop_relay(...) [192.168.2.8:51852->148.251.84.40:80]: dropping relay only 1497073375.615298 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51853->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success 1497073375.615416 debug redsocks.c:310 process_shutdown_onwrite(...) [192.168.2.8:51853->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 0, fout: 0, tin: 0 1497073375.633026 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51854->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success 1497073375.633146 debug redsocks.c:310 process_shutdown_onwrite(...) [192.168.2.8:51854->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 0, fout: 0, tin: 0 1497073375.633955 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51851->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success 1497073375.634069 debug redsocks.c:310 process_shutdown_onwrite(...) [192.168.2.8:51851->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 473, fout: 0, tin: 0 1497073375.635053 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51852->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success 1497073375.635167 debug redsocks.c:310 process_shutdown_onwrite(...) [192.168.2.8:51852->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 0, fout: 0, tin: 0 Segmentation fault
@semigodking https://github.com/semigodking 服务器相关信息发你邮箱了。
— You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-307544796, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rj07wkIqW7rHif-tewxKAMIi3JeOFks5sCi6JgaJpZM4NhUsV .
又更新了一下用你的服务器测试没问题。用我的服务器测试也没有问题。
Semigod King semigodking@gmail.com于2017年6月10日周六 15:38写道:
你先试下关掉autoproxy, 我之前确实忘测带autoproxy的情况了
rampageX notifications@github.com于2017年6月10日周六 13:50写道:
一连接程序就出错退出:
1497073375.521161 debug autoproxy.c:475 auto_drop_relay(...) [192.168.2.8:51852->148.251.84.40:80]: dropping relay only 1497073375.615298 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51853->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success 1497073375.615416 debug redsocks.c:310 process_shutdown_onwrite(...) [192.168.2.8:51853->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 0, fout: 0, tin: 0 1497073375.633026 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51854->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success 1497073375.633146 debug redsocks.c:310 process_shutdown_onwrite(...) [192.168.2.8:51854->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 0, fout: 0, tin: 0 1497073375.633955 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51851->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success 1497073375.634069 debug redsocks.c:310 process_shutdown_onwrite(...) [192.168.2.8:51851->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 473, fout: 0, tin: 0 1497073375.635053 debug https-connect.c:148 httpsc_event_cb(...) [192.168.2.8:51852->148.251.84.40:80]: relay, what: 0|0|0|0|0|CONNECTED|0x0: Success 1497073375.635167 debug redsocks.c:310 process_shutdown_onwrite(...) [192.168.2.8:51852->148.251.84.40:80]: WCB relay, fs: 0, ts: 0, fin: 0, fout: 0, tin: 0 Segmentation fault
@semigodking https://github.com/semigodking 服务器相关信息发你邮箱了。
— You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-307544796, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rj07wkIqW7rHif-tewxKAMIi3JeOFks5sCi6JgaJpZM4NhUsV .
@semigodking 可以了,感谢。目前只有 OpenSSL 版本支持 HTTPS 吧?
你可以调整下Makefile试下,我觉得用mbdtls也是行的,但它还是要用openssl的功能,所以,还是直接用openssl的比较好
rampageX notifications@github.com于2017年6月10日周六 20:11写道:
@semigodking https://github.com/semigodking 可以了,感谢。目前只有 OpenSSL 版本支持 HTTPS 吧?
— You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub https://github.com/semigodking/redsocks/issues/70#issuecomment-307561487, or mute the thread https://github.com/notifications/unsubscribe-auth/AB-rj3HGALZwwGbw-5BRKklPlZqI8Ig5ks5sCofcgaJpZM4NhUsV .
现在很多网站都全面转向了https了,最近有没有计划增加内置HTTPS代理支持的功能呢?