aboutsummaryrefslogtreecommitdiff
path: root/src/include/ndpi_typedefs.h
diff options
context:
space:
mode:
authorIvan Nardi <12729895+IvanNardi@users.noreply.github.com>2023-07-27 09:05:22 +0200
committerGitHub <noreply@github.com>2023-07-27 09:05:22 +0200
commitbc91192acadda102169adacfed967f57f395f1bd (patch)
treecc2fb723b533c8dbfd86dc5b4e659841f1a2ce4e /src/include/ndpi_typedefs.h
parent3326fa258ec92e553e39fc8a1bfa3921dc81f15c (diff)
ProtonVPN: split the ip list (#2060)
Use two separate lists: * one for the ingress nodes, which triggers a ProtonVPN classification * one for the egress nodes, which triggers the `NDPI_ANONYMOUS_SUBSCRIBER` risk Add a command line option (to `ndpiReader`) to easily test IP/port matching. Add another example of custom rule.
Diffstat (limited to 'src/include/ndpi_typedefs.h')
-rw-r--r--src/include/ndpi_typedefs.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/include/ndpi_typedefs.h b/src/include/ndpi_typedefs.h
index 3d15517fc..f56fdab8f 100644
--- a/src/include/ndpi_typedefs.h
+++ b/src/include/ndpi_typedefs.h
@@ -1761,6 +1761,7 @@ typedef enum {
This heuristic only analyzes the first packet of the flow.
See: https://www.usenix.org/system/files/sec23fall-prepub-234-wu-mingshi.pdf */
ndpi_disable_fully_encrypted_heuristic = (1 << 21),
+ ndpi_dont_load_protonvpn_exit_nodes_list = (1 << 22),
} ndpi_prefs;
typedef struct {