Commit Graph

16 Commits

Author SHA1 Message Date
Anton Tolchanov
c07cdeff92 Do not exit the server loop on obfs4 connection errors
obfs4Listener.Accept() returns an error when obfs4 handshake fails, which in
practice happens routinely when someone scans a machine that has an open
listening port.

Currently the accept loop in server.go exits on first such error, which makes
further connections to the same port impossible.

This change wraps obfs4 handshake errors into a custom error type that
satisfies net.Error and presents itself as temporary, which will prevent such
errors from aborting the server.
2023-01-19 14:43:10 +08:00
openwrt2223
937b27dd95 update:update package 2021-12-16 22:38:27 +08:00
Guangming Li
8dd4d8d9a1 fix obfs-tls with shadowsocks aead issue #695 2021-02-06 13:13:40 +08:00
ginuerzh
2e0aa67faf fix typo 2020-03-03 18:58:28 +08:00
ginuerzh
ec5052e55f obfs: tls max data length limitation 2020-03-03 18:56:43 +08:00
ginuerzh
1587c679e7 add relay proxy protocol 2020-02-27 14:56:48 +08:00
ginuerzh
a99ff4aa15 add otls 2020-02-24 14:53:51 +08:00
ginuerzh
88efafca06 fix obfs http client 2019-01-12 12:47:05 +08:00
ginuerzh
af98b99a8b fix obfs-http server 2019-01-10 23:17:20 +08:00
ginuerzh
445889c47e add more test cases for socks5 2018-12-31 20:44:20 +08:00
ginuerzh
bb1afcc437 add more tests 2018-12-26 20:24:20 +08:00
ginuerzh
d3b03e4231 add default timeout 2018-12-24 13:14:53 +08:00
rui.zheng
da30584df1 add host for client handshake 2017-11-10 11:00:35 +08:00
rui.zheng
65c0ce36bc add obfuscation support for SNI 2017-10-25 17:40:57 +08:00
rui.zheng
6a65b32b71 #60: add http obfuscating tunnel support 2017-09-11 17:55:55 +08:00
rui.zheng
08476e8b2a support HTTP obfuscating tunnel 2017-08-24 16:58:03 +08:00