|  | @@ -995,7 +995,7 @@ fetch_from_buf_socks(buf_t *buf, socks_request_t *req,
 | 
	
		
			
				|  |  |            strlcpy(req->address,tmpbuf,sizeof(req->address));
 | 
	
		
			
				|  |  |            req->port = ntohs(*(uint16_t*)(buf->cur+8));
 | 
	
		
			
				|  |  |            buf_remove_from_front(buf, 10);
 | 
	
		
			
				|  |  | -          if (!address_is_in_virtual_range(req->address) &&
 | 
	
		
			
				|  |  | +          if (!addressmap_have_mapping(req->address) &&
 | 
	
		
			
				|  |  |                !have_warned_about_unsafe_socks) {
 | 
	
		
			
				|  |  |              log_warn(LD_APP,
 | 
	
		
			
				|  |  |                  "Your application (using socks5 on port %d) is giving "
 | 
	
	
		
			
				|  | @@ -1091,7 +1091,7 @@ fetch_from_buf_socks(buf_t *buf, socks_request_t *req,
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |        startaddr = NULL;
 | 
	
		
			
				|  |  |        if (socks4_prot != socks4a &&
 | 
	
		
			
				|  |  | -          !address_is_in_virtual_range(tmpbuf) &&
 | 
	
		
			
				|  |  | +          !addressmap_have_mapping(tmpbuf) &&
 | 
	
		
			
				|  |  |            !have_warned_about_unsafe_socks) {
 | 
	
		
			
				|  |  |          log_warn(LD_APP,
 | 
	
		
			
				|  |  |                   "Your application (using socks4 on port %d) is giving Tor "
 |