|
@@ -199,7 +199,9 @@ func (s *ServerSession) DecodeRequestHeader(reader io.Reader) (*protocol.Request
|
|
|
if s.isAEADForced {
|
|
if s.isAEADForced {
|
|
|
return nil, drainConnection(newError("invalid user: VMessAEAD is enforced and a non VMessAEAD connection is received. You can still disable this security feature with environment variable v2ray.vmess.aead.forced = false . You will not be able to enable legacy header workaround in the future."))
|
|
return nil, drainConnection(newError("invalid user: VMessAEAD is enforced and a non VMessAEAD connection is received. You can still disable this security feature with environment variable v2ray.vmess.aead.forced = false . You will not be able to enable legacy header workaround in the future."))
|
|
|
}
|
|
}
|
|
|
- newError("Critical Warning: potentially invalid user: a non VMessAEAD connection is received. From 2022 Jan 1st, this kind of connection will be rejected by default. You should update or replace your client software now. ").AtWarning().WriteToLog()
|
|
|
|
|
|
|
+ if s.userValidator.ShouldShowLegacyWarn() {
|
|
|
|
|
+ newError("Critical Warning: potentially invalid user: a non VMessAEAD connection is received. From 2022 Jan 1st, this kind of connection will be rejected by default. You should update or replace your client software now. This message will not be shown for further violation on this inbound.").AtWarning().WriteToLog()
|
|
|
|
|
+ }
|
|
|
user = userLegacy
|
|
user = userLegacy
|
|
|
iv := hashTimestamp(md5.New(), timestamp)
|
|
iv := hashTimestamp(md5.New(), timestamp)
|
|
|
vmessAccount = userLegacy.Account.(*vmess.MemoryAccount)
|
|
vmessAccount = userLegacy.Account.(*vmess.MemoryAccount)
|