Skip to content

Feature Request: Add Certificate Pinning Support for ShadowTLS (Mitigate State-Level TLS MITM Risk) #134

@nomae123

Description

@nomae123

Some recently leaked GFW internal documents (https://gfw.report/blog/geedge_and_mesa_leak/en/) indicate that state-level MITM systems may intercept TLS traffic by using their own trusted root certificates to re-sign TLS connections.
Since ShadowTLS relies on connecting to a real TLS server, this creates a risk: if a forged certificate is presented by a MITM TLS proxy, ShadowTLS v3 cannot currently detect it.

To improve security in hostile networks, I would like to request support for certificate pinning (e.g., SHA-256 SPKI or certificate hash). This would ensure ShadowTLS only accepts the genuine certificate of the backend site and becomes more resistant to active interception.

Thank you for considering this feature.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions