Drain Connection Based on uuid based behavior seed(skip auth info drain for now)

pull/2545/head
Shelikhoo 5 years ago
parent d671780804
commit ca032dd00f
No known key found for this signature in database
GPG Key ID: C4D5E79D22B25316

@ -152,8 +152,7 @@ func (s *ServerSession) DecodeRequestHeader(reader io.Reader) (*protocol.Request
user, timestamp, valid := s.userValidator.Get(buffer.Bytes())
if !valid {
//It is possible that we are under attack described in https://github.com/v2ray/v2ray-core/issues/2523
return nil, drainConnection(newError("invalid user"))
return nil, newError("invalid user")
}
iv := hashTimestamp(md5.New(), timestamp)

Loading…
Cancel
Save