ES
const sock = possibleSocks[this.sock.n++ % possibleSocks.length];
Вот это рандомный выбор сокета. То есть первый кусочек файла пойдет в один сокет а второй кусок в другой?
Size: a a a
ES
const sock = possibleSocks[this.sock.n++ % possibleSocks.length];
Вот это рандомный выбор сокета. То есть первый кусочек файла пойдет в один сокет а второй кусок в другой?
AK
AK
AK
O
openssl s_client -connect stream.com:5050/proxy/url=https://instasgram.com -tls1 -servername stream.com -cert fullchain.pem -key privkey.pem -CAfile my-root-ca.crt.pem
CONNECTED(00000003)
4495517292:error:1409442E:SSL routines:ssl3_read_bytes:tlsv1 alert protocol version:s3_pkt.c:1498:SSL alert number 70
4495517292:error:1409E0E5:SSL routines:ssl3_write_bytes:ssl handshake failure:s3_pkt.c:659:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 0 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1
Cipher : 0000
Session-ID:
Session-ID-ctx:
Master-Key:
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1564261336
Timeout : 7200 (sec)
Verify return code: 0 (ok)
---
O
* Connected to stream.com (127.0.0.1) port 5353 (#109)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /etc/ssl/cert.pem
* CApath: none
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: C=US; ST=Utah; L=Provo; O=ACME Tech Inc; CN=stream.com
* start date: Jul 27 20:36:14 2019 GMT
* expire date: Dec 8 20:36:14 2020 GMT
* common name: stream.com (matched)
* issuer: C=US; ST=Utah; L=Provo; O=ACME Signing Authority Inc; CN=example.com
* SSL certificate verify ok.
ecdhCurve
- заработало вроде,SV
const fs = require('fs');
const txt = ‘file.txt';
for(i = 0; i < 10; i++) {
console.log(i)
fs.writeFile(txt, i, (err) => {
console.log(i, ' MASS I')
if (err) {
console.log(err.message)
}
});
}
🏡К
const fs = require('fs');
const txt = ‘file.txt';
for(i = 0; i < 10; i++) {
console.log(i)
fs.writeFile(txt, i, (err) => {
console.log(i, ' MASS I')
if (err) {
console.log(err.message)
}
});
}
TS
const fs = require('fs');
const txt = ‘file.txt';
for(i = 0; i < 10; i++) {
console.log(i)
fs.writeFile(txt, i, (err) => {
console.log(i, ' MASS I')
if (err) {
console.log(err.message)
}
});
}
SV
SV
🏡К