diff --git a/init.d/openwrt/custom-nfqws-quic4all b/init.d/openwrt/custom-nfqws-quic4all index 1ce2f76..4363d6c 100644 --- a/init.d/openwrt/custom-nfqws-quic4all +++ b/init.d/openwrt/custom-nfqws-quic4all @@ -44,5 +44,5 @@ zapret_custom_firewall_nft() zapret_apply_firewall_rules_nft f="udp dport 443" - nft_fw_nfqws_post $1 "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 + nft_fw_nfqws_post "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 } diff --git a/init.d/openwrt/custom-nfqws-quic4all-complex b/init.d/openwrt/custom-nfqws-quic4all-complex index bd5e0d3..d9ecf52 100644 --- a/init.d/openwrt/custom-nfqws-quic4all-complex +++ b/init.d/openwrt/custom-nfqws-quic4all-complex @@ -57,9 +57,9 @@ zapret_custom_firewall_nft() zapret_apply_firewall_rules_nft f="udp dport 443" - nft_fw_nfqws_post $1 "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 + nft_fw_nfqws_post "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 # this for ipv4 only. do not have access to ipv6 enabled TSPU to test - nft_fw_nfqws_post $1 "$f $desync $udplen $short_header4" "" $QNUM3 + nft_fw_nfqws_post "$f $desync $udplen $short_header4" "" $QNUM3 # add flow offload exemption for the whole stream because we dont know when short_header rule triggers nft_add_flow_offload_exemption "$f" "" "QUIC exemption for complex TSPU hack" } diff --git a/init.d/sysv/custom-nfqws-quic4all b/init.d/sysv/custom-nfqws-quic4all index 0228dac..af0f719 100644 --- a/init.d/sysv/custom-nfqws-quic4all +++ b/init.d/sysv/custom-nfqws-quic4all @@ -44,5 +44,5 @@ zapret_custom_firewall_nft() zapret_apply_firewall_rules_nft f="udp dport 443" - nft_fw_nfqws_post $1 "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 + nft_fw_nfqws_post "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 } diff --git a/init.d/sysv/custom-nfqws-quic4all-complex b/init.d/sysv/custom-nfqws-quic4all-complex index 73aa189..31c090e 100644 --- a/init.d/sysv/custom-nfqws-quic4all-complex +++ b/init.d/sysv/custom-nfqws-quic4all-complex @@ -57,9 +57,9 @@ zapret_custom_firewall_nft() zapret_apply_firewall_rules_nft f="udp dport 443" - nft_fw_nfqws_post $1 "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 + nft_fw_nfqws_post "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 # this for ipv4 only. do not have access to ipv6 enabled TSPU to test - nft_fw_nfqws_post $1 "$f $desync $udplen $short_header4" "" $QNUM3 + nft_fw_nfqws_post "$f $desync $udplen $short_header4" "" $QNUM3 # add flow offload exemption for the whole stream because we dont know when short_header rule triggers nft_add_flow_offload_exemption "$f" "" "QUIC exemption for complex TSPU hack" }