Skip to content

Commit 0299262

Browse files
committed
Set unknown_sni_action to mask — fix SNI rejection on v3.3.31+ (#40)
Since telemt v3.3.31 the default unknown_sni_action changed from mask to drop, causing the engine to reject connections whose TLS ClientHello SNI doesn't exactly match tls_domain. This breaks clients that send a different or cached SNI. Explicitly set unknown_sni_action = "mask" in the generated config.toml to restore the previous permissive behavior.
1 parent e64adab commit 0299262

1 file changed

Lines changed: 1 addition & 0 deletions

File tree

mtproxymax.sh

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1082,6 +1082,7 @@ client_ack = 90
10821082
10831083
[censorship]
10841084
tls_domain = "${domain}"
1085+
unknown_sni_action = "mask"
10851086
mask = ${mask_enabled}
10861087
mask_port = ${mask_port}
10871088
$([ "$mask_enabled" = "true" ] && [ -n "$mask_host" ] && echo "mask_host = \"${mask_host}\"")

0 commit comments

Comments
 (0)