Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DNS (Resolver) tag in server side config has no effect #1111

Open
robin98 opened this issue May 30, 2024 · 2 comments
Open

DNS (Resolver) tag in server side config has no effect #1111

robin98 opened this issue May 30, 2024 · 2 comments
Labels
bug Something isn't working

Comments

@robin98
Copy link

robin98 commented May 30, 2024

Describe the bug
I tried the resolver tag on my server side config at /etc/hysteria/config.yaml like this;
but this method didn't work for my clients as their resolver didn't change from alibaba to any other DNS resolver I specified.

listen: :8443

tls:
  cert: /opt/cert/xxxx/fullchain.pem
  key: /opt/cert/xxxx/privkey.pem

auth:
  type: password
  password: xxxx

masquerade:
  type: proxy
  proxy:
    url: https://xxxx.com/
    rewriteHost: true

resolver:
  type: udp
  udp:
    addr: 9.9.9.9:53
    timeout: 10s

Logs

dns

Device and Operating System
ubuntu server 22.04.4

@robin98 robin98 added the bug Something isn't working label May 30, 2024
@haruue
Copy link
Collaborator

haruue commented May 30, 2024

If you use Hysteria client with transparent proxy (e.g. redirect/proxy/tun), name resolving is done on client side, so server side DNS setting & domain ACL will not work in this case.

We have plan to introduce feature known as "sniffing" or "deep packet inspection" on server side to extract hostname from SNI in ClientHello and resolve it again. This will be able to fix the problem, but not available now.

@eddiehex
Copy link

If you use Hysteria client with transparent proxy (e.g. redirect/proxy/tun), name resolving is done on client side, so server side DNS setting & domain ACL will not work in this case.

We have plan to introduce feature known as "sniffing" or "deep packet inspection" on server side to extract hostname from SNI in ClientHello and resolve it again. This will be able to fix the problem, but not available now.

If I enable the sniffing in the client side, will ACL work?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

3 participants