diff --git a/infra/control/certchainhash.go b/infra/control/certchainhash.go index 5d69a2896..e30b7df27 100644 --- a/infra/control/certchainhash.go +++ b/infra/control/certchainhash.go @@ -5,7 +5,6 @@ import ( "fmt" "io/ioutil" - "github.com/v2fly/v2ray-core/v4/common" v2tls "github.com/v2fly/v2ray-core/v4/transport/internet/tls" ) @@ -42,5 +41,6 @@ func (c CertificateChainHashCommand) Execute(args []string) error { } func init() { - common.Must(RegisterCommand(&CertificateChainHashCommand{})) + // Do not release tool before v5's refactor + // common.Must(RegisterCommand(&CertificateChainHashCommand{})) } diff --git a/infra/control/tlsping.go b/infra/control/tlsping.go index 2c0c36ae7..2231b1041 100644 --- a/infra/control/tlsping.go +++ b/infra/control/tlsping.go @@ -73,11 +73,12 @@ func (c *TLSPingCommand) Execute(args []string) error { return newError("dial tcp").Base(err) } tlsConn := tls.Client(tcpConn, &tls.Config{ - InsecureSkipVerify: true, - NextProtos: []string{"http/1.1"}, - MaxVersion: tls.VersionTLS12, - MinVersion: tls.VersionTLS12, - VerifyPeerCertificate: showCert(), + InsecureSkipVerify: true, + NextProtos: []string{"http/1.1"}, + MaxVersion: tls.VersionTLS12, + MinVersion: tls.VersionTLS12, + // Do not release tool before v5's refactor + // VerifyPeerCertificate: showCert(), }) err = tlsConn.Handshake() if err != nil { @@ -97,11 +98,12 @@ func (c *TLSPingCommand) Execute(args []string) error { return newError("dial tcp").Base(err) } tlsConn := tls.Client(tcpConn, &tls.Config{ - ServerName: domain, - NextProtos: []string{"http/1.1"}, - MaxVersion: tls.VersionTLS12, - MinVersion: tls.VersionTLS12, - VerifyPeerCertificate: showCert(), + ServerName: domain, + NextProtos: []string{"http/1.1"}, + MaxVersion: tls.VersionTLS12, + MinVersion: tls.VersionTLS12, + // Do not release tool before v5's refactor + // VerifyPeerCertificate: showCert(), }) err = tlsConn.Handshake() if err != nil {