Fix fake sni strategy ttl

This commit is contained in:
Vadim Vetrov 2024-08-08 18:58:21 +03:00
parent 50933ee0d6
commit 8e3fa48510
No known key found for this signature in database
GPG Key ID: E8A308689D7A73A5
2 changed files with 6 additions and 6 deletions

View File

@ -473,11 +473,11 @@ int gen_fake_sni(const struct iphdr *iph, const struct tcphdr *tcph,
ntcph->th_dport = tcph->th_dport;
ntcph->th_sport = tcph->th_sport;
#if FAKE_SNI_STRATEGY == FKSN_STRAT_TTL
ntcph->ack = tcph->ack;
ntcph->ack_seq = tcph->ack_seq;
niph->ttl = FAKE_SNI_TTL;
#endif
if (config.fake_sni_strategy == FKSN_STRAT_TTL) {
ntcph->seq = tcph->seq;
ntcph->ack_seq = tcph->ack_seq;
niph->ttl = config.fake_sni_ttl;
}
#endif

View File

@ -517,7 +517,7 @@ static int process_packet(const struct packet_data packet, struct queue_data qda
if (dlen > 1480) {
if (config.verbose)
fprintf(stderr, "WARNING! Google video packet is too big and may cause issues!\n");
fprintf(stderr, "WARNING! Client Hello packet is too big and may cause issues!\n");
}
uint8_t frag1[MNL_SOCKET_BUFFER_SIZE];