From 3b0ae8c28220ced5daaeafefca05654f20447ca1 Mon Sep 17 00:00:00 2001 From: Jun Kurihara Date: Wed, 25 Jan 2023 14:20:08 +0900 Subject: [PATCH] deps and config example --- Cargo.toml | 2 +- config-example.toml | 8 ++++++-- 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/Cargo.toml b/Cargo.toml index e9ebe17..a385957 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -18,7 +18,7 @@ http3 = ["quinn", "h3", "h3-quinn"] [dependencies] env_logger = "0.10.0" anyhow = "1.0.68" -clap = { version = "4.1.3", features = ["std", "cargo", "wrap_help"] } +clap = { version = "4.1.4", features = ["std", "cargo", "wrap_help"] } futures = { version = "0.3.25", features = ["alloc", "async-await"] } hyper = { version = "0.14.23", default-features = false, features = [ "server", diff --git a/config-example.toml b/config-example.toml index cbf8c8e..9b2b463 100644 --- a/config-example.toml +++ b/config-example.toml @@ -85,9 +85,13 @@ reverse_proxy = [{ upstream = [{ location = 'www.google.com', tls = true }] }] # Experimantal settings # ################################### [experimental] -ignore_sni_consistency = false # Higly recommend not to be true. If true, you ignore RFC. if not specified, it is always false. +# Higly recommend not to be true. If true, you ignore RFC. if not specified, it is always false. +# This might be required to be true when a certificate is used by multiple backend hosts, especially in case where a TLS connection is re-used. +# We should note that this strongly depends on the client implementation. +ignore_sni_consistency = false -[experimental.h3] # If this specified, h3 is enabled +# If this specified, h3 is enabled +[experimental.h3] alt_svc_max_age = 3600 # sec request_max_body_size = 65536 # bytes max_concurrent_connections = 10000