dyhkwong
8de2f27043
fix protocol matching in routing ( #2540 )
...
* remove invalid http2 sniffer
* do not set metadata protocol for http inbound
http inbound may have transport settings
* fix doh metadata protocol
2023-09-14 08:27:36 +08:00
秋のかえで
d58649764e
fix: parse for the CipherType of Shadowsocks in simplified config ( #2510 )
2023-07-25 16:27:53 +08:00
Shelikhoo
5a68536530
Add h1SkipWaitForReply Option to http proxy protocol: auto generated
2023-05-29 00:07:26 +01:00
Shelikhoo
cfc6bd465b
Add h1SkipWaitForReply Option to http proxy protocol
2023-05-29 00:07:26 +01:00
dyhkwong
8433420654
make use of buf.NewWithSize() in Trojan's PacketReader and PacketWriter
...
also fix a domain length check bug
2023-05-24 00:18:19 +01:00
dyhkwong
923d49464d
proxy/trojan: fix writing UDP packet
...
close v2fly#2440, close v2fly#1795
2023-05-24 00:18:19 +01:00
Shelikhoo
680d5bb2ac
refactor trojan WriteHeader function.
2023-05-24 00:10:44 +01:00
AkinoKaede
72475c2924
fix: always send Trojan header
2023-05-23 14:05:10 +08:00
Shelikhoo
9308de4e74
Fix incorrect UDP length in Torjan packet addr
2023-03-19 23:23:02 +00:00
Vigilans
882a363b85
DomainStrategy support for all outbounds
2023-02-19 13:34:15 +00:00
秋のかえで
67c19f7054
feat: refine PacketConnectionReader
2023-02-18 21:44:30 +00:00
秋のかえで
ca185b3310
chore: format code
2023-02-18 21:44:30 +00:00
秋のかえで
1bd1de5f52
fix: read logic of PacketConnectionReader
2023-02-18 21:44:29 +00:00
秋のかえで
c10e16cb5e
Style: format imports
2023-02-18 21:44:29 +00:00
秋のかえで
147641e981
Style: refine code style
2023-02-18 21:44:29 +00:00
秋のかえで
01a2686568
Feat: add PacketAddr support to Trojan client
2023-02-18 21:44:29 +00:00
秋のかえで
f2ae2777fe
Feat: add PacketAddr support to Trojan server
2023-02-18 21:44:25 +00:00
Vigilans
f8ac919d66
[app/dns] Support per-client configuration for fakedns ( #2212 )
...
* Move `filterIP` from `hosts.go` to `dnscommon.go`
* Implement adding pools for fakedns.HolderMulti
* Implement per-client fakedns for DNS app
* Remove `dns.ClientWithIPOption` and replace with new programming model
* Implement JSON config support for new fakedns config
* Fix lint and tests
* Fix some codacy analysis
2022-12-15 10:38:28 +08:00
Vigilans
ac0d9480bd
[app/dispatcher] [proxy/dns] Support domain string validation ( #2188 )
2022-12-10 17:07:59 +08:00
dyhkwong
d467eb7511
fix: socks4/4a client handshake ( #1971 )
2022-10-08 10:59:28 +08:00
Huang-Huang Bao
ddc6312c5d
Fix: guard against nil pointer dereference of (*NetworkList)
2022-09-07 10:50:17 +01:00
Shelikhoo
137cd7093c
chore: regenerate protobuf file
2022-09-06 20:36:27 +01:00
秋のかえで
8b7d283bf8
Feat: rename network to networks for JsonV5
2022-08-19 22:28:20 +08:00
秋のかえで
adb7871f82
Feat: refine cipher and network config ( #1436 )
2022-08-19 20:41:18 +08:00
秋のかえで
8f883040ab
Lint: add nolint flags to avoid SA1029
2022-08-19 20:09:39 +08:00
秋のかえで
a788be738e
Lint: add nolint flags to avoid lint
2022-08-19 20:05:50 +08:00
世界
fc6ae4d4e7
Fix lint
2022-06-28 21:36:12 +08:00
yuhan6665
9484390b18
Fix TestUserValidator
2022-06-25 19:39:21 +01:00
lrh2000
396ee770b7
proxy: Unify timeouts of different protocols for reading the first payload
2022-06-25 19:34:32 +01:00
lrh2000
17d85263e2
proxy/http: Avoid getting stuck when using server-first protocols
...
PR #99 reduces an extra RTT when setting up the CONNECT tunnel
via http proxy, however, server-first protocols (such as MySQL)
will be unusable as v2ray keeps to wait for the client request.
This commit solves the problem by limiting the maximum waiting
time to 50 ms.
2022-06-25 19:26:33 +01:00
Shelikhoo
5eff77c48a
Fix DoS attack vulnerability in VMess Option Processing
2022-06-12 23:29:09 +01:00
dyhkwong
703b2da5a7
Fix "disable quit on connection interrupt"
2022-05-02 15:50:35 +01:00
Shelikhoo
f4b0241b4f
disable quit on connection interrupt
2022-05-01 16:05:00 +01:00
Loyalsoldier
d9125f91af
Fix: gci command for formatting code ( #1757 )
...
* Fix: gci command for formatting code
* Chore: format code
2022-05-01 00:47:14 +08:00
Shelikhoo
d7ad10ff14
fix coding style issue
2022-04-29 21:36:26 +01:00
Shelikhoo
8a3e90c11f
Fix bug incorrect config parse in VLite inbound
2022-04-28 19:32:55 +01:00
Shelikhoo
87090bf408
Add VLite inbound auto generated files
2022-04-28 19:32:55 +01:00
Shelikhoo
e6e5aa6ffc
Add Support for VLite UDP Server: auto generated
2022-04-28 19:32:55 +01:00
Shelikhoo
4c79629c69
Add Support for VLite UDP Server
2022-04-28 19:32:55 +01:00
Shelikhoo
7b1203ca96
Add Packet Scramble Support for VLite UDP Client
2022-04-28 19:32:55 +01:00
Shelikhoo
4016e0e961
Add VLite Server Support Definition: auto generated
2022-04-28 19:32:55 +01:00
Shelikhoo
c009faa7c7
Add VLite Server Support Definition
2022-04-28 19:32:55 +01:00
Shelikhoo
11362acc79
Add VLite Client Support for Packet Armor: auto generated
2022-04-28 19:32:55 +01:00
Shelikhoo
322c8cc663
Add VLite Client Support for Packet Armor
2022-04-28 19:32:55 +01:00
Shelikhoo
010aa3a103
Fix VLite UDP Outbound bugs
2022-04-28 19:32:55 +01:00
Shelikhoo
0dea56fc63
Add UDP VLite Outbound Support: auto generated
2022-04-28 19:32:55 +01:00
Shelikhoo
f25530717b
Add UDP VLite Outbound Support
2022-04-28 19:32:55 +01:00
Shelikhoo
86f64c031a
Add UDP VLite protobuf config
2022-04-28 19:32:55 +01:00
秋のかえで
552936674c
Style: formart code by gofumpt
2022-04-07 00:06:46 +08:00
yuhan6665
7bcb3c901b
Fix client dialer log ( #1568 )
...
* Fix client dialer log
Log such as:
tunneling request to tcp:www.google.com:80 via tcp:x.x.x.x:443
the second "tcp" is misleading when using mKcp or quic transport
Remove the second "tcp" and add the correct logging for transport dialer:
- transport/internet/tcp: dialing TCP to tcp:x.x.x.x:443
- transport/internet/quic: dialing quic to udp:x.x.x.x:443
* Update transport/internet/quic/dialer.go
Co-authored-by: 秋のかえで <autmaple@protonmail.com>
Co-authored-by: 秋のかえで <autmaple@protonmail.com>
Co-authored-by: Kslr <kslrwang@gmail.com>
2022-04-06 13:24:43 +08:00