1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-07-01 11:35:23 +00:00
Commit Graph

1415 Commits

Author SHA1 Message Date
秋のかえで
d58649764e
fix: parse for the CipherType of Shadowsocks in simplified config (#2510) 2023-07-25 16:27:53 +08:00
Shelikhoo
5a68536530
Add h1SkipWaitForReply Option to http proxy protocol: auto generated 2023-05-29 00:07:26 +01:00
Shelikhoo
cfc6bd465b
Add h1SkipWaitForReply Option to http proxy protocol 2023-05-29 00:07:26 +01:00
dyhkwong
8433420654
make use of buf.NewWithSize() in Trojan's PacketReader and PacketWriter
also fix a domain length check bug
2023-05-24 00:18:19 +01:00
dyhkwong
923d49464d
proxy/trojan: fix writing UDP packet
close v2fly#2440, close v2fly#1795
2023-05-24 00:18:19 +01:00
Shelikhoo
680d5bb2ac
refactor trojan WriteHeader function. 2023-05-24 00:10:44 +01:00
AkinoKaede
72475c2924
fix: always send Trojan header 2023-05-23 14:05:10 +08:00
Shelikhoo
9308de4e74
Fix incorrect UDP length in Torjan packet addr 2023-03-19 23:23:02 +00:00
Vigilans
882a363b85
DomainStrategy support for all outbounds 2023-02-19 13:34:15 +00:00
秋のかえで
67c19f7054
feat: refine PacketConnectionReader 2023-02-18 21:44:30 +00:00
秋のかえで
ca185b3310
chore: format code 2023-02-18 21:44:30 +00:00
秋のかえで
1bd1de5f52
fix: read logic of PacketConnectionReader 2023-02-18 21:44:29 +00:00
秋のかえで
c10e16cb5e
Style: format imports 2023-02-18 21:44:29 +00:00
秋のかえで
147641e981
Style: refine code style 2023-02-18 21:44:29 +00:00
秋のかえで
01a2686568
Feat: add PacketAddr support to Trojan client 2023-02-18 21:44:29 +00:00
秋のかえで
f2ae2777fe
Feat: add PacketAddr support to Trojan server 2023-02-18 21:44:25 +00:00
Vigilans
f8ac919d66
[app/dns] Support per-client configuration for fakedns (#2212)
* Move `filterIP` from `hosts.go` to `dnscommon.go`

* Implement adding pools for fakedns.HolderMulti

* Implement per-client fakedns for DNS app

* Remove `dns.ClientWithIPOption` and replace with new programming model

* Implement JSON config support for new fakedns config

* Fix lint and tests

* Fix some codacy analysis
2022-12-15 10:38:28 +08:00
Vigilans
ac0d9480bd
[app/dispatcher] [proxy/dns] Support domain string validation (#2188) 2022-12-10 17:07:59 +08:00
dyhkwong
d467eb7511
fix: socks4/4a client handshake (#1971) 2022-10-08 10:59:28 +08:00
Huang-Huang Bao
ddc6312c5d Fix: guard against nil pointer dereference of (*NetworkList) 2022-09-07 10:50:17 +01:00
Shelikhoo
137cd7093c
chore: regenerate protobuf file 2022-09-06 20:36:27 +01:00
秋のかえで
8b7d283bf8
Feat: rename network to networks for JsonV5 2022-08-19 22:28:20 +08:00
秋のかえで
adb7871f82
Feat: refine cipher and network config (#1436) 2022-08-19 20:41:18 +08:00
秋のかえで
8f883040ab
Lint: add nolint flags to avoid SA1029 2022-08-19 20:09:39 +08:00
秋のかえで
a788be738e
Lint: add nolint flags to avoid lint 2022-08-19 20:05:50 +08:00
世界
fc6ae4d4e7
Fix lint 2022-06-28 21:36:12 +08:00
yuhan6665
9484390b18 Fix TestUserValidator 2022-06-25 19:39:21 +01:00
lrh2000
396ee770b7
proxy: Unify timeouts of different protocols for reading the first payload 2022-06-25 19:34:32 +01:00
lrh2000
17d85263e2
proxy/http: Avoid getting stuck when using server-first protocols
PR #99 reduces an extra RTT when setting up the CONNECT tunnel
via http proxy, however, server-first protocols (such as MySQL)
will be unusable as v2ray keeps to wait for the client request.
This commit solves the problem by limiting the maximum waiting
time to 50 ms.
2022-06-25 19:26:33 +01:00
Shelikhoo
5eff77c48a
Fix DoS attack vulnerability in VMess Option Processing 2022-06-12 23:29:09 +01:00
dyhkwong
703b2da5a7 Fix "disable quit on connection interrupt" 2022-05-02 15:50:35 +01:00
Shelikhoo
f4b0241b4f
disable quit on connection interrupt 2022-05-01 16:05:00 +01:00
Loyalsoldier
d9125f91af
Fix: gci command for formatting code (#1757)
* Fix: gci command for formatting code
* Chore: format code
2022-05-01 00:47:14 +08:00
Shelikhoo
d7ad10ff14
fix coding style issue 2022-04-29 21:36:26 +01:00
Shelikhoo
8a3e90c11f Fix bug incorrect config parse in VLite inbound 2022-04-28 19:32:55 +01:00
Shelikhoo
87090bf408 Add VLite inbound auto generated files 2022-04-28 19:32:55 +01:00
Shelikhoo
e6e5aa6ffc Add Support for VLite UDP Server: auto generated 2022-04-28 19:32:55 +01:00
Shelikhoo
4c79629c69 Add Support for VLite UDP Server 2022-04-28 19:32:55 +01:00
Shelikhoo
7b1203ca96 Add Packet Scramble Support for VLite UDP Client 2022-04-28 19:32:55 +01:00
Shelikhoo
4016e0e961 Add VLite Server Support Definition: auto generated 2022-04-28 19:32:55 +01:00
Shelikhoo
c009faa7c7 Add VLite Server Support Definition 2022-04-28 19:32:55 +01:00
Shelikhoo
11362acc79 Add VLite Client Support for Packet Armor: auto generated 2022-04-28 19:32:55 +01:00
Shelikhoo
322c8cc663 Add VLite Client Support for Packet Armor 2022-04-28 19:32:55 +01:00
Shelikhoo
010aa3a103 Fix VLite UDP Outbound bugs 2022-04-28 19:32:55 +01:00
Shelikhoo
0dea56fc63 Add UDP VLite Outbound Support: auto generated 2022-04-28 19:32:55 +01:00
Shelikhoo
f25530717b Add UDP VLite Outbound Support 2022-04-28 19:32:55 +01:00
Shelikhoo
86f64c031a Add UDP VLite protobuf config 2022-04-28 19:32:55 +01:00
秋のかえで
552936674c
Style: formart code by gofumpt 2022-04-07 00:06:46 +08:00
yuhan6665
7bcb3c901b
Fix client dialer log (#1568)
* Fix client dialer log

Log such as:
tunneling request to tcp:www.google.com:80 via tcp:x.x.x.x:443
the second "tcp" is misleading when using mKcp or quic transport

Remove the second "tcp" and add the correct logging for transport dialer:
- transport/internet/tcp: dialing TCP to tcp:x.x.x.x:443
- transport/internet/quic: dialing quic to udp:x.x.x.x:443

* Update transport/internet/quic/dialer.go

Co-authored-by: 秋のかえで <autmaple@protonmail.com>

Co-authored-by: 秋のかえで <autmaple@protonmail.com>
Co-authored-by: Kslr <kslrwang@gmail.com>
2022-04-06 13:24:43 +08:00
Shelikhoo
ca5695244c add reduced iv head entropy to simplified config processor(fix) 2022-01-15 20:47:20 +00:00