fixed recv_errors spoofing condition (#482)
Hi @nbrownus Fixed a small bug that was introduced in df7c7ee#diff-5d05d02296a1953fd5fbcb3f4ab486bc5f7c34b14c3bdedb068008ec8ff5beb4 having problems due to it
This commit is contained in:
parent
2e1d6743be
commit
d13f4b5948
|
@ -7,6 +7,10 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|||
|
||||
## [Unreleased]
|
||||
|
||||
### Fixed
|
||||
|
||||
- Valid recv_error packets were incorrectly marked as "spoofing" and ignored. (#482)
|
||||
|
||||
## [1.4.0] - 2021-05-11
|
||||
|
||||
### Added
|
||||
|
|
|
@ -340,7 +340,7 @@ func (f *Interface) handleRecvError(addr *udpAddr, h *Header) {
|
|||
if !hostinfo.RecvErrorExceeded() {
|
||||
return
|
||||
}
|
||||
if hostinfo.remote != nil && hostinfo.remote.Equals(addr) {
|
||||
if hostinfo.remote != nil && !hostinfo.remote.Equals(addr) {
|
||||
f.l.Infoln("Someone spoofing recv_errors? ", addr, hostinfo.remote)
|
||||
return
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue