-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gen_fake_sni errors #17
Comments
Ouch, that is strange. I will playaround with it, thank you. Btw if you know how can you please dump iph from gen_fake_sni? iph is an argument of a function. Just print it(as hex) on each function call. for(size_t i=0;i<sizeof(struct iphdr);i++) I think the reason may be in ip extensions, but no sure. |
a96d621 is just a temporary solution. It allows to entirely disable fake sni with -DNO_FAKE_SNI I had to do it earlier but I'm too lazy. The issue itself needs in further research. |
Here goes iph
|
Thank you for dumps. |
Oh yeah, we love chrome fat packets. I was able to reproduce. At very start I also put a debug (displayed in -DDEBUG) message |
Please, reopen the issue if you get the error again. |
Last version works good. Built
it reports error but it works. Something is not permitted, but we don't know what. =) |
My bad, fresh version does not work. It was browser's cache. |
3rd undocumented EPERM, Let's go! So, I haven't got this error on my machine but have on router. May be something in firewall drops the packet or idk what happening. |
Interesting. I think it may relate to RELATED,ESTABLISHED in conntrack iptables settings. May be RELATED flag will drop fake sni packets since them are out-of-ack and out-of-seq |
The solution will be
|
Haven't understood what to do =( |
Am I right that you propose to switch off 'Prevent NAT leakage' rule? Do you know is there any chance to get same conntrack mark for two new packets? |
Yes, but better solution is just to immediately (as early as possible for filter output chain) accept any packet marked with youtubeUnblock's mark (I will change it in next versions according to #15 ). I cannot say anything about connmark. It needs in manual testing. Note that even if you set nfqueue to forward chain. All the traffic from raw socket (fake client hello and two original client hello segments) will go through the output chain. So you should always put the netfilter rule to accept by mark to the output chain. You can find the mark defined somewhere in the code :) |
Next step is to update readme |
Updated the documentation. I hope this is finally fixed. |
That's funny but thanks to this issue I was able to fix degraded performance for my router. I was never used nftables before but now I see that this is a very powerful tool. I don't know is it possible to filter conntrack by sent packets in iptables but nftables makes it too easy :) |
I am currently testing on a router with an old version of OpenWRT that uses iptables. To send the first 20 packets to the queue, I use this rule: |
Thank you! |
So cool! Everything worked for me. |
Add iptables connbytes counter thanks to this comment #17 (comment)
I see that you added this rule to the README. It would be helpful to mention that in OpenWRT for |
Updated. Thanks |
It worked. Yessss. Thank you for this piece of art! |
I confirm that deleting output rule helps. But
and I'm still getting |
@zabbius Why do you create separate chain for just one rule? Use config for firewall from |
Because it is default way for last OpenWRT to add custom fw4 rules. See Tried you file - it works good. |
Found the difference. I think the best solution for the future is to provide default drop-in includes in Current script adds rules correctly but I'm not sure that your rules will remain alive after firewall reload. |
Checked out last version and it does not work. Got
13e78bd works perfectly with POSTROUTING rule
I can help you with testing on OpenWRT if you want.
The text was updated successfully, but these errors were encountered: