[tor-commits] [meek/master] Document utls options in meek-client man page.

dcf at torproject.org dcf at torproject.org
Thu May 9 19:37:25 UTC 2019


commit cb5f5978a9168ab05247506cfad37f578a3246c4
Author: David Fifield <david at bamsoftware.com>
Date:   Fri Jan 25 00:25:18 2019 -0700

    Document utls options in meek-client man page.
---
 doc/meek-client.1     | 159 +++++++++++++++++++++++++++++++++++++++++++++++++-
 doc/meek-client.1.txt |  30 ++++++++++
 2 files changed, 187 insertions(+), 2 deletions(-)

diff --git a/doc/meek-client.1 b/doc/meek-client.1
index b379116..58fd755 100644
--- a/doc/meek-client.1
+++ b/doc/meek-client.1
@@ -2,12 +2,12 @@
 .\"     Title: meek-client
 .\"    Author: [FIXME: author] [see http://docbook.sf.net/el/author]
 .\" Generator: DocBook XSL Stylesheets v1.79.1 <http://docbook.sf.net/>
-.\"      Date: 02/01/2019
+.\"      Date: 02/06/2019
 .\"    Manual: \ \&
 .\"    Source: \ \&
 .\"  Language: English
 .\"
-.TH "MEEK\-CLIENT" "1" "02/01/2019" "\ \&" "\ \&"
+.TH "MEEK\-CLIENT" "1" "02/06/2019" "\ \&" "\ \&"
 .\" -----------------------------------------------------------------
 .\" * Define some portability stuff
 .\" -----------------------------------------------------------------
@@ -54,6 +54,153 @@ Front domain name\&. If provided, this domain name will replace the domain name
 \fBurl\fR
 in the DNS request and TLS SNI field\&. The URL\(cqs true domain name will still appear in the Host header of HTTP requests\&.
 .RE
+.PP
+\fButls\fR=\fICLIENTHELLOID\fR
+.RS 4
+Use the
+uTLS library
+with the named TLS fingerprint for TLS camouflage\&. This arg is incompatible with the
+\fB\-\-helper\fR
+command line option\&. The possible values of
+\fICLIENTHELLOID\fR
+are:
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloRandomizedALPN
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloRandomizedNoALPN
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloFirefox_55
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloFirefox_56
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloFirefox_63
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloFirefox_Auto
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloChrome_58
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloChrome_62
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloChrome_70
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloChrome_Auto
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloIOS_11_1
+.RE
+.sp
+.RS 4
+.ie n \{\
+\h'-04'\(bu\h'+03'\c
+.\}
+.el \{\
+.sp -1
+.IP \(bu 2.3
+.\}
+HelloIOS_Auto
+.RE
+.sp
+As a special case, the values "none" and "HelloGolang" are recognized as aliases for omitting the
+\fButls\fR
+SOCKS arg; i\&.e\&., use native Go TLS\&.
+.RE
 .sp
 For backward compatibility, each SOCKS arg also has an equivalent command line option\&. For example, this configuration using SOCKS args:
 .sp
@@ -144,6 +291,14 @@ URL to correspond with\&. Prefer using the
 SOCKS arg on a bridge line over using this command line option\&.
 .RE
 .PP
+\fB\-\-utls\fR=\fICLIENTHELLOID\fR
+.RS 4
+Use uTLS with the given TLS fingerprint for TLS camouflage\&. This option is incompatible with
+\fB\-\-helper\fR\&. Prefer using the
+\fButls\fR
+SOCKS arg over using this command line option\&.
+.RE
+.PP
 \fB\-h\fR, \fB\-\-help\fR
 .RS 4
 Display a help message and exit\&.
diff --git a/doc/meek-client.1.txt b/doc/meek-client.1.txt
index d7883ec..33e2916 100644
--- a/doc/meek-client.1.txt
+++ b/doc/meek-client.1.txt
@@ -43,6 +43,31 @@ The possible SOCKS args are:
     of **url** in the DNS request and TLS SNI field.
     The URL's true domain name will still appear in the Host header
     of HTTP requests.
+**utls**=__CLIENTHELLOID__::
++
+--
+Use the https://github.com/refraction-networking/utls[uTLS library]
+with the named TLS fingerprint for TLS camouflage.
+This arg is incompatible with the **--helper** command line option.
+The possible values of __CLIENTHELLOID__ are:
+
+- HelloRandomizedALPN
+- HelloRandomizedNoALPN
+- HelloFirefox_55
+- HelloFirefox_56
+- HelloFirefox_63
+- HelloFirefox_Auto
+- HelloChrome_58
+- HelloChrome_62
+- HelloChrome_70
+- HelloChrome_Auto
+- HelloIOS_11_1
+- HelloIOS_Auto
+
+As a special case, the values "none" and "HelloGolang"
+are recognized as aliases for
+omitting the **utls** SOCKS arg; i.e., use native Go TLS.
+--
 
 For backward compatibility, each SOCKS arg also has an equivalent
 command line option.
@@ -109,6 +134,11 @@ OPTIONS
     URL to correspond with. Prefer using the **url** SOCKS arg
     on a bridge line over using this command line option.
 
+**--utls**=__CLIENTHELLOID__::
+    Use uTLS with the given TLS fingerprint for TLS camouflage.
+    This option is incompatible with **--helper**.
+    Prefer using the **utls** SOCKS arg over using this command line option.
+
 **-h**, **--help**::
     Display a help message and exit.
 





More information about the tor-commits mailing list