Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: refraction-networking/utls
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v1.8.0
Choose a base ref
...
head repository: refraction-networking/utls
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v1.8.1
Choose a head ref
  • 2 commits
  • 2 files changed
  • 2 contributors

Commits on Jul 26, 2025

  1. fix: PubServerHelloMsg.ServerShare is not exported correctly

    Signed-off-by: wwqgtxx <wwqgtxx@gmail.com>
    wwqgtxx authored Jul 26, 2025
    Configuration menu
    Copy the full SHA
    a5511b3 View commit details
    Browse the repository at this point in the history

Commits on Oct 14, 2025

  1. fix: use AES in GREASE ECH for Chrome fingerprint

    There is a fingerprint mismatch with Chrome when using GREASE ECH,
    having to do with ciphersuite selection. When Chrome selects the
    preferred ciphersuite in the outer ClientHello and the ciphersuite for
    ECH, it does so consistently based on hardware support. That means, for
    example, if it prefers AES for the outer ciphersuite, it would also use
    AES for ECH. The Chrome parrot in utls hardcodes AES preference for
    outer ciphersuites but selects the ECH ciphersuite randomly between
    AES and ChaCha20. So there is a 50% chance of selecting ChaCha20 for
    ECH while using AES for the outer ciphersuite, which is impossible in
    Chrome.
    
    This commit makes the Chrome parrot use AES only for GREASE ECH,
    consistent with the currrent AES outer ciphersuite preference.
    
    I think this is only a problem in GREASE ECH, since in real ECH Chrome
    selects the first valid ciphersuite when AES is preferred, which is the
    same in utls. So no change is done there.
    
    Thanks to the original reporter for reporting this issue.
    mingyech committed Oct 14, 2025
    Configuration menu
    Copy the full SHA
    24bd1e0 View commit details
    Browse the repository at this point in the history
Loading