From 50db246003965350423197b52eacbde9c87c8add Mon Sep 17 00:00:00 2001 From: dyhkwong <50692134+dyhkwong@users.noreply.github.com> Date: Thu, 6 Nov 2025 19:45:51 +0800 Subject: [PATCH] Revert "Disable TCP slow open for anytls" --- protocol/anytls/outbound.go | 8 -------- 1 file changed, 8 deletions(-) diff --git a/protocol/anytls/outbound.go b/protocol/anytls/outbound.go index c8d8bf438b..b026ed1803 100644 --- a/protocol/anytls/outbound.go +++ b/protocol/anytls/outbound.go @@ -13,7 +13,6 @@ import ( "github.com/sagernet/sing-box/log" "github.com/sagernet/sing-box/option" "github.com/sagernet/sing/common" - E "github.com/sagernet/sing/common/exceptions" M "github.com/sagernet/sing/common/metadata" N "github.com/sagernet/sing/common/network" "github.com/sagernet/sing/common/uot" @@ -44,13 +43,6 @@ func NewOutbound(ctx context.Context, router adapter.Router, logger log.ContextL if options.TLS == nil || !options.TLS.Enabled { return nil, C.ErrTLSRequired } - // TCP Fast Open is incompatible with anytls because TFO creates a lazy connection - // that only establishes on first write. The lazy connection returns an empty address - // before establishment, but anytls SOCKS wrapper tries to access the remote address - // during handshake, causing a null pointer dereference crash. - if options.DialerOptions.TCPFastOpen { - return nil, E.New("tcp_fast_open is not supported with anytls outbound") - } tlsConfig, err := tls.NewClient(ctx, options.Server, common.PtrValueOrDefault(options.TLS)) if err != nil {