Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add description for "Filter HTTP/3" in AdGuard for Android #301

Closed
wants to merge 3 commits into from

Conversation

sonya-orlova
Copy link
Member

  • Small fix to "Log removed HTML events"

+ Small fix to "Log removed HTML events"
@sonya-orlova sonya-orlova requested a review from nataMai September 4, 2023 14:58
@@ -35,7 +35,7 @@ Here you can list domains that will be forwarded directly to fallback upstreams

#### Detect search domains

If this option is enabled, AdGuard will detect search domains and automatically forward them to fallback upstreams.
This option makes AdGuard detect search domains and automatically forward them to fallback upstreams.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, AdGuard will detect search domains and automatically forward them to fallback upstreams.

@@ -72,33 +72,33 @@ Here you can specify the maximum number of cached responses. Default value is 10

#### ECH blocking

If enabled, AdGuard strips Encrypted Client Hello parameters from DNS responses.
This option makes AdGuard strip Encrypted Client Hello parameters from DNS responses.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, AdGuard will strip Encrypted Client Hello parameters from DNS responses.


#### Ignore unavailable outbound proxy

Enable this feature to make AdGuard send DNS requests directly if the outbound proxy is unavailable.
This option makes AdGuard send DNS requests directly if the outbound proxy is unavailable.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, AdGuard will send DNS requests directly when the outbound proxy is unavailable.


#### Try HTTP/3 for DNS-over-HTTPS upstreams

By default, all DNS requests for DNS-over-HTTPS are sent via HTTP/2 protocol. If enabled, AdGuard uses HTTP/3 to speed up DNS query resolution for DoH upstreams.
By default, all DNS requests for DNS-over-HTTPS are sent via HTTP/2 protocol. This option makes AdGuard use HTTP/3 to speed up DNS query resolution for DoH upstreams.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, AdGuard will use HTTP/3 to speed up DNS query resolution for DoH upstreams.
Otherwise, AdGuard will revert to its default behavior and use HTTP/2 to send all DNS requests for DNS-over-HTTPS.


#### SERVFAIL failure response

Once enabled, AdGuard sends a SERVFAIL response to the client if all upstreams, including fallback ones, fail to reply. When this setting is disabled, no response is sent to the client.
This option makes AdGuard send a SERVFAIL response to the client if all upstreams, including fallback ones, fail to reply. When this setting is disabled, no response is sent to the client.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, AdGuard will send a SERVFAIL response to the client if all upstreams, including fallback ones, fail to reply. When this setting is disabled, no response is sent to the client.


#### Packet capture (PCAP)

If enabled, AdGuard will create the special file name `timestamp.pcap` (for instance, 1682599851461.pcap). It contains all network packets transferred through the VPN. This file is located in the app cache directory and can be analyzed with the Wireshark program.
This option makes AdGuard create a file `timestamp.pcap` (for instance, 1682599851461.pcap) that lists all network packets transferred through the VPN and is located in the app cache directory. This file can be analyzed with the Wireshark program.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, AdGuard will create a file timestamp.pcap (for instance, 1682599851461.pcap) in the app cache directory. This file lists all network packets transferred through the VPN and can be analyzed with the Wireshark program.


#### Include Wi-Fi gateway in VPN routes

If you want the gateway IP addresses to be added to VPN routes when on Wi-Fi, enable this feature.
This option adds the gateway IP addresses to VPN routes when on Wi-Fi.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, the gateway IP addresses will be added to to VPN routes when on Wi-Fi.


#### IPv4 address

Here you can enter the IP address that will be used to create a TUN interface. By default, it is `172.18.11.218`.

#### Forcibly route LAN IPv4

When enabled, AdGuard filters all LAN connections, including local IPv4 network traffic, even if the *Route all LAN IPv4 connections* option is enabled.
This option makes AdGuard filter all LAN connections, including local IPv4 network traffic, even if the *Route all LAN IPv4 connections* option is enabled.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, AdGuard will filter all LAN connections, including local IPv4 network traffic, even if the Route all LAN IPv4 connections option is enabled.


#### Route all LAN IPv4 connections

Once enabled, AdGuard excludes LAN connections from filtering for simple networks. May not work for complex networks. Works only with the *Forcibly route LAN IPv4* option disabled.
This option makes AdGuard exclude LAN connections from filtering for simple networks. May not work for complex networks. Works only with the *Forcibly route LAN IPv4* option disabled.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, AdGuard will exclude LAN connections from filtering for simple networks. This may not work for complex networks. This setting only applies if Forcibly route LAN IPv4 is disabled.

@@ -214,4 +218,4 @@ Here you can enter the IP address that will be used to create a TUN interface. B

#### Detect Samsung Pay

Korean users may encounter issues with Samsung Pay when AdGuard is enabled. Activate this feature to pause AdGuard's protection and use the Samsung Pay app seamlessly.
Korean users may encounter issues with Samsung Pay when AdGuard is enabled. This option pauses AdGuard's protection while Samsung Pay is used.
Copy link
Contributor

@nataMai nataMai Sep 4, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is enabled, AdGuard protection will be paused while Samsung Pay is in use. Some of our users require this feature as they experience issues with Samsung Pay when AdGuard is enabled.

@sonya-orlova
Copy link
Member Author

These suggestions will be addressed in the next pull request

@sonya-orlova sonya-orlova deleted the filter-http3-android branch September 5, 2023 11:07
sonya-orlova added a commit that referenced this pull request Sep 14, 2023
Suggested changes from #301 plus one link
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants