fix: replace accounts.googl.com with accounts.google.com in SNI pool (#92)

The googl.com shortener domain is NOT in Google's GFE certificate SAN list — verified via `openssl s_client -verify_hostname accounts.googl.com` returning hostname mismatch. Every Nth connection where the rotation landed on this entry was failing cert validation with `verify_ssl=true`. Replaced with accounts.google.com which is covered by *.google.com wildcard.
This commit is contained in:
vahidlazio
2026-04-23 22:33:11 +02:00
committed by GitHub
parent 658e72fe0d
commit 39537e6689
+8 -9
View File
@@ -1161,15 +1161,14 @@ pub const DEFAULT_GOOGLE_SNI_POOL: &[&str] = &[
"drive.google.com",
"docs.google.com",
"calendar.google.com",
// accounts.googl.com is a Google-owned alias (googl.com redirects
// to Google properties) whose cert is served off the same GFE IP
// pool. Reported in issue #42 as passing DPI on Samantel / MCI
// (Iranian carriers) specifically, where some of the longer
// `*.google.com` names are selectively SNI-blocked. Rotation-only
// use: we never actually HTTP-to it, just present it in the TLS
// handshake.
"accounts.googl.com",
// scholar.google.com — same logic as accounts.googl.com, reported
// accounts.google.com — standard Google account service, covered by
// the *.google.com wildcard cert. Previously listed as
// accounts.googl.com (issue #42), but googl.com is NOT in the SAN
// list of Google's GFE certificate — connections with verify_ssl=true
// fail with "certificate not valid for name" when the round-robin
// lands on it.
"accounts.google.com",
// scholar.google.com — reported
// in #47 as a DPI-passing SNI on MCI / Samantel. Covered by the
// core *.google.com cert so it handshakes normally against
// google_ip:443.