description | a tool for SNI-based HTTPS filtering circumvention |
owner | yogaskung@protonmail.ch |
last change | Wed, 3 May 2023 15:53:11 +0000 (3 15:53 +0000) |
URL | git://repo.or.cz/Accesser.git |
https://repo.or.cz/Accesser.git | |
push URL | ssh://repo.or.cz/Accesser.git |
https://repo.or.cz/Accesser.git (learn more) | |
bundle info | Accesser.git downloadable bundles |
content tags |
forked from github.com/URenko/Accesser
A tool for bypassing SNI-based HTTPS Filtering using Domain Fronting
Accesser tries TLS handshake without sending SNI; Or you can add rules in config.toml's alter_hostname
, ordering Accesser use specified SNI for specified site. In both scenario Accesser will check the certificates is correct for that SNI, print a WARNING if not match, and will abort the connection.
Accesser would also abort connection for expired or self-signed certificates.
Download Windows executable program from here and run it. The first time you use it, you will be asked to install a certificate, just select yes.
pip3 install -U accesser[doh]
If you don't need DNS-over-HTTPS, you can install without [doh]
.
Then launch it with the following command:
accesser
For Windows, by default (without specifying --notsetproxy
) it will set the system PAC proxy to http://localhost:7654/pac/?t=<random number>
, if not you can set it manually.
In addition, for Windows, by default (without specifying --notimportca
) the certificate will be imported to the system automatically, if not you can import it manually, please see here.
Edit config.toml
in the working directory. See the comments therein. After saving, reopen the program.
see CDN.md.
17 months ago | master | logtree |