I need to identify the ssf protocol in order to let sslh (protocol demultiplexer by Yves Rutschle) recognize it and distinguish an ssf client connection on port 1234 from the others.
If sslh recognizes an ssf client it should forward the tcp connection to localhost:8011.
Emulating the server with the command ncat -lk 1234 | xxd I can see that when an ssf (Windows) client attempts a connection the first 11 bytes sent are always:
\x16\x03\x01\x00\x5a\x01\x00\x00\x56\x03\x03
Is this a reliable check?
I need to identify the ssf protocol in order to let sslh (protocol demultiplexer by Yves Rutschle) recognize it and distinguish an ssf client connection on port 1234 from the others.
If sslh recognizes an ssf client it should forward the tcp connection to localhost:8011.
Emulating the server with the command
ncat -lk 1234 | xxdI can see that when an ssf (Windows) client attempts a connection the first 11 bytes sent are always:\x16\x03\x01\x00\x5a\x01\x00\x00\x56\x03\x03Is this a reliable check?