Robot5
Robot5
``` TCP Request stream: +--------+------------------------+---------------------------+------------------------+---------------------------+---+ | salt | encrypted header chunk | encrypted header chunk | encrypted length chunk | encrypted payload chunk |...| +--------+------------------------+---------------------------+------------------------+---------------------------+---+ | 16/32B | 11B +...
@database64128 Thanks, my mistake.
About UDP relay, why is it necessary to open a new relay session(UDP socket) based on (source address, port), as there is a session id in the separated header and...
> In the 3.2 section of spec: Each time the proxy receives a packet from a new source address and port, it opens a new relay session > In the...
> You already answered it yourself. After a packet from the new client address is received, subsequent server-to-client packets are sent to the new address. An address is a host:port...
> How to perform a timestamp check is well documented in the spec. Just search "timestamp" in the spec and you'll see. I know, but it is only in the...
In TCP Detection Prevention section, what does the "receive buffer" stand for, the kernel or the application buffer? If the server closes the connection when data received is not enough...