From ca032dd00fef86558174819d988fdeceb47a52b1 Mon Sep 17 00:00:00 2001 From: Shelikhoo Date: Tue, 2 Jun 2020 15:16:17 +0800 Subject: [PATCH] Drain Connection Based on uuid based behavior seed(skip auth info drain for now) --- proxy/vmess/encoding/server.go | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/proxy/vmess/encoding/server.go b/proxy/vmess/encoding/server.go index a7b6e81b..0d6cfcfc 100644 --- a/proxy/vmess/encoding/server.go +++ b/proxy/vmess/encoding/server.go @@ -152,8 +152,7 @@ func (s *ServerSession) DecodeRequestHeader(reader io.Reader) (*protocol.Request user, timestamp, valid := s.userValidator.Get(buffer.Bytes()) if !valid { - //It is possible that we are under attack described in https://github.com/v2ray/v2ray-core/issues/2523 - return nil, drainConnection(newError("invalid user")) + return nil, newError("invalid user") } iv := hashTimestamp(md5.New(), timestamp)