diff --git a/init.d/openwrt/custom-nfqws-quic4all b/init.d/openwrt/custom-nfqws-quic4all index 1ce2f764..4363d6c3 100644 --- a/init.d/openwrt/custom-nfqws-quic4all +++ b/init.d/openwrt/custom-nfqws-quic4all @@ -44,5 +44,5 @@ zapret_custom_firewall_nft() zapret_apply_firewall_rules_nft f="udp dport 443" - nft_fw_nfqws_post $1 "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 + nft_fw_nfqws_post "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 } diff --git a/init.d/openwrt/custom-nfqws-quic4all-complex b/init.d/openwrt/custom-nfqws-quic4all-complex index bd5e0d30..d9ecf52e 100644 --- a/init.d/openwrt/custom-nfqws-quic4all-complex +++ b/init.d/openwrt/custom-nfqws-quic4all-complex @@ -57,9 +57,9 @@ zapret_custom_firewall_nft() zapret_apply_firewall_rules_nft f="udp dport 443" - nft_fw_nfqws_post $1 "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 + nft_fw_nfqws_post "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 # this for ipv4 only. do not have access to ipv6 enabled TSPU to test - nft_fw_nfqws_post $1 "$f $desync $udplen $short_header4" "" $QNUM3 + nft_fw_nfqws_post "$f $desync $udplen $short_header4" "" $QNUM3 # add flow offload exemption for the whole stream because we dont know when short_header rule triggers nft_add_flow_offload_exemption "$f" "" "QUIC exemption for complex TSPU hack" } diff --git a/init.d/sysv/custom-nfqws-quic4all b/init.d/sysv/custom-nfqws-quic4all index 0228dac6..af0f7191 100644 --- a/init.d/sysv/custom-nfqws-quic4all +++ b/init.d/sysv/custom-nfqws-quic4all @@ -44,5 +44,5 @@ zapret_custom_firewall_nft() zapret_apply_firewall_rules_nft f="udp dport 443" - nft_fw_nfqws_post $1 "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 + nft_fw_nfqws_post "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 } diff --git a/init.d/sysv/custom-nfqws-quic4all-complex b/init.d/sysv/custom-nfqws-quic4all-complex index 73aa189f..31c090e7 100644 --- a/init.d/sysv/custom-nfqws-quic4all-complex +++ b/init.d/sysv/custom-nfqws-quic4all-complex @@ -57,9 +57,9 @@ zapret_custom_firewall_nft() zapret_apply_firewall_rules_nft f="udp dport 443" - nft_fw_nfqws_post $1 "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 + nft_fw_nfqws_post "$f $desync $first_packets_only" "$f $desync $first_packets_only" $QNUM2 # this for ipv4 only. do not have access to ipv6 enabled TSPU to test - nft_fw_nfqws_post $1 "$f $desync $udplen $short_header4" "" $QNUM3 + nft_fw_nfqws_post "$f $desync $udplen $short_header4" "" $QNUM3 # add flow offload exemption for the whole stream because we dont know when short_header rule triggers nft_add_flow_offload_exemption "$f" "" "QUIC exemption for complex TSPU hack" }