We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
делаю запрос: curl -x socks4a://192.168.0.1:1001 ipinfo.io tcpdump показывает, что от Windows к Linux идет обычный TCP handshake, а не TCP Fast Open:
> SYN < SYN,ACK > ACK > PSH,ACK < ACK
Windows 11 (192.168.0.1):
fakeresolve auth iponly allow * * parent 1000 socks4+ 192.168.0.2 1001 socks -p1001 -ocUSE_TCP_FASTOPEN, -osUSE_TCP_FASTOPEN, -olUSE_TCP_FASTOPEN, -orUSE_TCP_FASTOPEN, -oRUSE_TCP_FASTOPEN flush end
Linux Debian 12 (192.168.0.2):
nserver 8.8.8.8 nscache 65535 auth iponly allow * * socks -p1001 -ocUSE_TCP_FASTOPEN, -osUSE_TCP_FASTOPEN, -olUSE_TCP_FASTOPEN, -orUSE_TCP_FASTOPEN, -oRUSE_TCP_FASTOPEN flush end
The text was updated successfully, but these errors were encountered:
Почему USE_TCP_FASTOPEN а не TCP_FASTOPEN?
Sorry, something went wrong.
No branches or pull requests
делаю запрос: curl -x socks4a://192.168.0.1:1001 ipinfo.io
tcpdump показывает, что от Windows к Linux идет обычный TCP handshake, а не TCP Fast Open:
Windows 11 (192.168.0.1):
Linux Debian 12 (192.168.0.2):
The text was updated successfully, but these errors were encountered: