Commit d5a3e6da authored by Max Lv's avatar Max Lv

fix bypass policy

parent 61673247
...@@ -284,20 +284,16 @@ public class ShadowsocksService extends Service { ...@@ -284,20 +284,16 @@ public class ShadowsocksService extends Service {
boolean resolved = false; boolean resolved = false;
if (isDNSProxy) { if (appHost != null) {
if (appHost != null) { InetAddress addr = null;
InetAddress addr = null; try {
try { addr = InetAddress.getByName(appHost);
addr = InetAddress.getByName(appHost); } catch (UnknownHostException ignored) {
} catch (UnknownHostException ignored) { }
} if (addr != null) {
if (addr != null) { appHost = addr.getHostAddress();
appHost = addr.getHostAddress(); resolved = true;
resolved = true;
}
} }
} else {
resolved = true;
} }
Log.d(TAG, "IPTABLES: " + Utils.getIptables()); Log.d(TAG, "IPTABLES: " + Utils.getIptables());
...@@ -544,7 +540,7 @@ public class ShadowsocksService extends Service { ...@@ -544,7 +540,7 @@ public class ShadowsocksService extends Service {
String cmd_bypass = Utils.getIptables() + CMD_IPTABLES_RETURN; String cmd_bypass = Utils.getIptables() + CMD_IPTABLES_RETURN;
init_sb.append(cmd_bypass.replace("-d 0.0.0.0", "--dport " + remotePort)); init_sb.append(cmd_bypass.replace("-d 0.0.0.0", "-d " + appHost));
init_sb.append(cmd_bypass.replace("0.0.0.0", "127.0.0.1")); init_sb.append(cmd_bypass.replace("0.0.0.0", "127.0.0.1"));
if (!isDNSProxy) { if (!isDNSProxy) {
init_sb.append(cmd_bypass.replace("-d 0.0.0.0", "--dport " + 53)); init_sb.append(cmd_bypass.replace("-d 0.0.0.0", "--dport " + 53));
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment