2023-09-15 09:42:16 +08:00
|
|
|
|
#!/bin/sh
|
|
|
|
|
|
|
|
|
|
DIR="$(cd "$(dirname "$0")" && pwd)"
|
|
|
|
|
MY_PATH=$DIR/iptables.sh
|
2024-12-23 20:38:23 +08:00
|
|
|
|
IPSET_LOCAL="passwall_local"
|
|
|
|
|
IPSET_LAN="passwall_lan"
|
|
|
|
|
IPSET_VPS="passwall_vps"
|
|
|
|
|
IPSET_SHUNT="passwall_shunt"
|
|
|
|
|
IPSET_GFW="passwall_gfw"
|
|
|
|
|
IPSET_CHN="passwall_chn"
|
|
|
|
|
IPSET_BLACK="passwall_black"
|
|
|
|
|
IPSET_WHITE="passwall_white"
|
|
|
|
|
IPSET_BLOCK="passwall_block"
|
|
|
|
|
|
|
|
|
|
IPSET_LOCAL6="passwall_local6"
|
|
|
|
|
IPSET_LAN6="passwall_lan6"
|
|
|
|
|
IPSET_VPS6="passwall_vps6"
|
|
|
|
|
IPSET_SHUNT6="passwall_shunt6"
|
|
|
|
|
IPSET_GFW6="passwall_gfw6"
|
|
|
|
|
IPSET_CHN6="passwall_chn6"
|
|
|
|
|
IPSET_BLACK6="passwall_black6"
|
|
|
|
|
IPSET_WHITE6="passwall_white6"
|
|
|
|
|
IPSET_BLOCK6="passwall_block6"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
FORCE_INDEX=2
|
|
|
|
|
|
2024-12-03 00:28:00 +08:00
|
|
|
|
USE_SHUNT_TCP=0
|
|
|
|
|
USE_SHUNT_UDP=0
|
|
|
|
|
|
2023-09-15 09:42:16 +08:00
|
|
|
|
. /lib/functions/network.sh
|
|
|
|
|
|
|
|
|
|
ipt=$(command -v iptables-legacy || command -v iptables)
|
|
|
|
|
ip6t=$(command -v ip6tables-legacy || command -v ip6tables)
|
|
|
|
|
|
|
|
|
|
ipt_n="$ipt -t nat -w"
|
|
|
|
|
ipt_m="$ipt -t mangle -w"
|
|
|
|
|
ip6t_n="$ip6t -t nat -w"
|
|
|
|
|
ip6t_m="$ip6t -t mangle -w"
|
|
|
|
|
[ -z "$ip6t" -o -z "$(lsmod | grep 'ip6table_nat')" ] && ip6t_n="eval #$ip6t_n"
|
|
|
|
|
[ -z "$ip6t" -o -z "$(lsmod | grep 'ip6table_mangle')" ] && ip6t_m="eval #$ip6t_m"
|
|
|
|
|
FWI=$(uci -q get firewall.passwall.path 2>/dev/null)
|
2024-08-18 16:20:55 +08:00
|
|
|
|
FAKE_IP="198.18.0.0/15"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
factor() {
|
|
|
|
|
if [ -z "$1" ] || [ -z "$2" ]; then
|
|
|
|
|
echo ""
|
|
|
|
|
elif [ "$1" == "1:65535" ]; then
|
|
|
|
|
echo ""
|
|
|
|
|
else
|
|
|
|
|
echo "$2 $1"
|
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
dst() {
|
|
|
|
|
echo "-m set $2 --match-set $1 dst"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
comment() {
|
|
|
|
|
local name=$(echo $1 | sed 's/ /_/g')
|
|
|
|
|
echo "-m comment --comment '$name'"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
destroy_ipset() {
|
|
|
|
|
for i in "$@"; do
|
|
|
|
|
ipset -q -F $i
|
|
|
|
|
ipset -q -X $i
|
|
|
|
|
done
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
insert_rule_before() {
|
|
|
|
|
[ $# -ge 3 ] || {
|
|
|
|
|
return 1
|
|
|
|
|
}
|
|
|
|
|
local ipt_tmp="${1}"; shift
|
|
|
|
|
local chain="${1}"; shift
|
|
|
|
|
local keyword="${1}"; shift
|
|
|
|
|
local rule="${1}"; shift
|
|
|
|
|
local default_index="${1}"; shift
|
|
|
|
|
default_index=${default_index:-0}
|
|
|
|
|
local _index=$($ipt_tmp -n -L $chain --line-numbers 2>/dev/null | grep "$keyword" | head -n 1 | awk '{print $1}')
|
|
|
|
|
if [ -z "${_index}" ] && [ "${default_index}" = "0" ]; then
|
|
|
|
|
$ipt_tmp -A $chain $rule
|
|
|
|
|
else
|
|
|
|
|
if [ -z "${_index}" ]; then
|
|
|
|
|
_index=${default_index}
|
|
|
|
|
fi
|
|
|
|
|
$ipt_tmp -I $chain $_index $rule
|
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
insert_rule_after() {
|
|
|
|
|
[ $# -ge 3 ] || {
|
|
|
|
|
return 1
|
|
|
|
|
}
|
|
|
|
|
local ipt_tmp="${1}"; shift
|
|
|
|
|
local chain="${1}"; shift
|
|
|
|
|
local keyword="${1}"; shift
|
|
|
|
|
local rule="${1}"; shift
|
|
|
|
|
local default_index="${1}"; shift
|
|
|
|
|
default_index=${default_index:-0}
|
|
|
|
|
local _index=$($ipt_tmp -n -L $chain --line-numbers 2>/dev/null | grep "$keyword" | awk 'END {print}' | awk '{print $1}')
|
|
|
|
|
if [ -z "${_index}" ] && [ "${default_index}" = "0" ]; then
|
|
|
|
|
$ipt_tmp -A $chain $rule
|
|
|
|
|
else
|
|
|
|
|
if [ -n "${_index}" ]; then
|
|
|
|
|
_index=$((_index + 1))
|
|
|
|
|
else
|
|
|
|
|
_index=${default_index}
|
|
|
|
|
fi
|
|
|
|
|
$ipt_tmp -I $chain $_index $rule
|
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
RULE_LAST_INDEX() {
|
|
|
|
|
[ $# -ge 3 ] || {
|
|
|
|
|
echolog "索引列举方式不正确(iptables),终止执行!"
|
|
|
|
|
return 1
|
|
|
|
|
}
|
|
|
|
|
local ipt_tmp="${1}"; shift
|
|
|
|
|
local chain="${1}"; shift
|
|
|
|
|
local list="${1}"; shift
|
|
|
|
|
local default="${1:-0}"; shift
|
|
|
|
|
local _index=$($ipt_tmp -n -L $chain --line-numbers 2>/dev/null | grep "$list" | head -n 1 | awk '{print $1}')
|
|
|
|
|
echo "${_index:-${default}}"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
REDIRECT() {
|
|
|
|
|
local s="-j REDIRECT"
|
|
|
|
|
[ -n "$1" ] && {
|
|
|
|
|
local s="$s --to-ports $1"
|
|
|
|
|
[ "$2" == "MARK" ] && s="-j MARK --set-mark $1"
|
|
|
|
|
[ "$2" == "TPROXY" ] && {
|
|
|
|
|
local mark="-m mark --mark 1"
|
|
|
|
|
s="${mark} -j TPROXY --tproxy-mark 1/1 --on-port $1"
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
echo $s
|
|
|
|
|
}
|
|
|
|
|
|
2024-02-19 16:13:47 +08:00
|
|
|
|
get_jump_ipt() {
|
2023-09-15 09:42:16 +08:00
|
|
|
|
case "$1" in
|
2024-02-19 16:13:47 +08:00
|
|
|
|
direct)
|
2024-04-01 20:31:43 +08:00
|
|
|
|
local mark="-m mark ! --mark 1"
|
|
|
|
|
s="${mark} -j RETURN"
|
|
|
|
|
echo $s
|
2023-09-15 09:42:16 +08:00
|
|
|
|
;;
|
2024-02-19 16:13:47 +08:00
|
|
|
|
proxy)
|
|
|
|
|
if [ -n "$2" ] && [ -n "$(echo $2 | grep "^-")" ]; then
|
|
|
|
|
echo "$2"
|
|
|
|
|
else
|
|
|
|
|
echo "$(REDIRECT $2 $3)"
|
|
|
|
|
fi
|
2023-09-15 09:42:16 +08:00
|
|
|
|
;;
|
|
|
|
|
esac
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
gen_lanlist() {
|
|
|
|
|
cat $RULES_PATH/lanlist_ipv4 | tr -s '\n' | grep -v "^#"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
gen_lanlist_6() {
|
|
|
|
|
cat $RULES_PATH/lanlist_ipv6 | tr -s '\n' | grep -v "^#"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
get_wan_ip() {
|
|
|
|
|
local NET_IF
|
|
|
|
|
local NET_ADDR
|
|
|
|
|
|
|
|
|
|
network_flush_cache
|
|
|
|
|
network_find_wan NET_IF
|
|
|
|
|
network_get_ipaddr NET_ADDR "${NET_IF}"
|
|
|
|
|
|
|
|
|
|
echo $NET_ADDR
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
get_wan6_ip() {
|
|
|
|
|
local NET_IF
|
|
|
|
|
local NET_ADDR
|
|
|
|
|
|
|
|
|
|
network_flush_cache
|
|
|
|
|
network_find_wan6 NET_IF
|
|
|
|
|
network_get_ipaddr6 NET_ADDR "${NET_IF}"
|
|
|
|
|
|
|
|
|
|
echo $NET_ADDR
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
load_acl() {
|
2024-04-25 04:16:58 +08:00
|
|
|
|
([ "$ENABLED_ACLS" == 1 ] || ([ "$ENABLED_DEFAULT_ACL" == 1 ] && [ "$CLIENT_PROXY" == 1 ])) && echolog " - 访问控制:"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
[ "$ENABLED_ACLS" == 1 ] && {
|
|
|
|
|
acl_app
|
2024-03-12 04:20:49 +08:00
|
|
|
|
for sid in $(ls -F ${TMP_ACL_PATH} | grep '/$' | awk -F '/' '{print $1}' | grep -v 'default'); do
|
2023-09-15 09:42:16 +08:00
|
|
|
|
eval $(uci -q show "${CONFIG}.${sid}" | cut -d'.' -sf 3-)
|
2024-02-19 16:13:47 +08:00
|
|
|
|
|
2023-09-15 09:42:16 +08:00
|
|
|
|
tcp_no_redir_ports=${tcp_no_redir_ports:-default}
|
|
|
|
|
udp_no_redir_ports=${udp_no_redir_ports:-default}
|
2024-03-10 04:14:35 +08:00
|
|
|
|
use_global_config=${use_global_config:-0}
|
2023-09-15 09:42:16 +08:00
|
|
|
|
tcp_proxy_drop_ports=${tcp_proxy_drop_ports:-default}
|
|
|
|
|
udp_proxy_drop_ports=${udp_proxy_drop_ports:-default}
|
|
|
|
|
tcp_redir_ports=${tcp_redir_ports:-default}
|
|
|
|
|
udp_redir_ports=${udp_redir_ports:-default}
|
2024-02-19 16:13:47 +08:00
|
|
|
|
use_direct_list=${use_direct_list:-1}
|
|
|
|
|
use_proxy_list=${use_proxy_list:-1}
|
|
|
|
|
use_block_list=${use_block_list:-1}
|
|
|
|
|
use_gfw_list=${use_gfw_list:-1}
|
|
|
|
|
chn_list=${chn_list:-direct}
|
|
|
|
|
tcp_proxy_mode=${tcp_proxy_mode:-proxy}
|
|
|
|
|
udp_proxy_mode=${udp_proxy_mode:-proxy}
|
2023-09-15 09:42:16 +08:00
|
|
|
|
[ "$tcp_no_redir_ports" = "default" ] && tcp_no_redir_ports=$TCP_NO_REDIR_PORTS
|
|
|
|
|
[ "$udp_no_redir_ports" = "default" ] && udp_no_redir_ports=$UDP_NO_REDIR_PORTS
|
|
|
|
|
[ "$tcp_proxy_drop_ports" = "default" ] && tcp_proxy_drop_ports=$TCP_PROXY_DROP_PORTS
|
|
|
|
|
[ "$udp_proxy_drop_ports" = "default" ] && udp_proxy_drop_ports=$UDP_PROXY_DROP_PORTS
|
|
|
|
|
[ "$tcp_redir_ports" = "default" ] && tcp_redir_ports=$TCP_REDIR_PORTS
|
|
|
|
|
[ "$udp_redir_ports" = "default" ] && udp_redir_ports=$UDP_REDIR_PORTS
|
2024-03-11 20:28:41 +08:00
|
|
|
|
|
2024-12-17 16:29:49 +08:00
|
|
|
|
[ -n "$(get_cache_var "ACL_${sid}_tcp_node")" ] && tcp_node=$(get_cache_var "ACL_${sid}_tcp_node")
|
2024-12-19 16:28:00 +08:00
|
|
|
|
[ -n "$(get_cache_var "ACL_${sid}_tcp_redir_port")" ] && tcp_port=$(get_cache_var "ACL_${sid}_tcp_redir_port")
|
2024-12-17 16:29:49 +08:00
|
|
|
|
[ -n "$(get_cache_var "ACL_${sid}_udp_node")" ] && udp_node=$(get_cache_var "ACL_${sid}_udp_node")
|
2024-12-19 16:28:00 +08:00
|
|
|
|
[ -n "$(get_cache_var "ACL_${sid}_udp_redir_port")" ] && udp_port=$(get_cache_var "ACL_${sid}_udp_redir_port")
|
2024-12-17 16:29:49 +08:00
|
|
|
|
[ -n "$(get_cache_var "ACL_${sid}_dns_port")" ] && dns_redirect_port=$(get_cache_var "ACL_${sid}_dns_port")
|
2024-12-19 16:28:00 +08:00
|
|
|
|
[ -n "$tcp_node" ] && tcp_node_remark=$(config_n_get $tcp_node remarks)
|
|
|
|
|
[ -n "$udp_node" ] && udp_node_remark=$(config_n_get $udp_node remarks)
|
2024-12-03 00:28:00 +08:00
|
|
|
|
|
|
|
|
|
use_shunt_tcp=0
|
|
|
|
|
use_shunt_udp=0
|
2024-12-19 16:28:00 +08:00
|
|
|
|
[ -n "$tcp_node" ] && [ "$(config_n_get $tcp_node protocol)" = "_shunt" ] && use_shunt_tcp=1
|
|
|
|
|
[ -n "$udp_node" ] && [ "$(config_n_get $udp_node protocol)" = "_shunt" ] && use_shunt_udp=1
|
2024-03-11 20:28:41 +08:00
|
|
|
|
|
|
|
|
|
[ "${use_global_config}" = "1" ] && {
|
|
|
|
|
tcp_node_remark=$(config_n_get $TCP_NODE remarks)
|
|
|
|
|
udp_node_remark=$(config_n_get $UDP_NODE remarks)
|
2024-03-30 04:17:20 +08:00
|
|
|
|
use_direct_list=${USE_DIRECT_LIST}
|
|
|
|
|
use_proxy_list=${USE_PROXY_LIST}
|
|
|
|
|
use_block_list=${USE_BLOCK_LIST}
|
|
|
|
|
use_gfw_list=${USE_GFW_LIST}
|
|
|
|
|
chn_list=${CHN_LIST}
|
2024-06-29 20:30:57 +08:00
|
|
|
|
tcp_proxy_mode=${TCP_PROXY_MODE}
|
|
|
|
|
udp_proxy_mode=${UDP_PROXY_MODE}
|
2024-12-13 00:27:41 +08:00
|
|
|
|
use_shunt_tcp=${USE_SHUNT_TCP}
|
|
|
|
|
use_shunt_udp=${USE_SHUNT_UDP}
|
|
|
|
|
dns_redirect_port=${DNS_REDIRECT_PORT}
|
2024-12-23 20:38:23 +08:00
|
|
|
|
black_set_name=${IPSET_BLACK}
|
|
|
|
|
black6_set_name=${IPSET_BLACK6}
|
|
|
|
|
gfw_set_name=${IPSET_GFW}
|
|
|
|
|
gfw6_set_name=${IPSET_GFW6}
|
|
|
|
|
shunt_set_name=${IPSET_SHUNT}
|
|
|
|
|
shunt6_set_name=${IPSET_SHUNT6}
|
2024-03-11 20:28:41 +08:00
|
|
|
|
}
|
|
|
|
|
|
2024-11-21 20:41:14 +08:00
|
|
|
|
_acl_list=${TMP_ACL_PATH}/${sid}/source_list
|
2024-09-24 00:23:48 +08:00
|
|
|
|
|
|
|
|
|
for i in $(cat $_acl_list); do
|
2024-11-21 20:41:14 +08:00
|
|
|
|
local _ipt_source
|
|
|
|
|
local msg
|
|
|
|
|
if [ -n "${interface}" ]; then
|
|
|
|
|
. /lib/functions/network.sh
|
|
|
|
|
local gateway device
|
|
|
|
|
network_get_gateway gateway "${interface}"
|
|
|
|
|
network_get_device device "${interface}"
|
|
|
|
|
[ -z "${device}" ] && device="${interface}"
|
|
|
|
|
_ipt_source="-i ${device} "
|
|
|
|
|
msg="源接口【${device}】,"
|
2024-12-24 00:24:41 +08:00
|
|
|
|
else
|
|
|
|
|
msg="源接口【所有】,"
|
2024-11-21 20:41:14 +08:00
|
|
|
|
fi
|
|
|
|
|
if [ -n "$(echo ${i} | grep '^iprange:')" ]; then
|
|
|
|
|
_iprange=$(echo ${i} | sed 's#iprange:##g')
|
|
|
|
|
_ipt_source=$(factor ${_iprange} "${_ipt_source}-m iprange --src-range")
|
|
|
|
|
msg="${msg}IP range【${_iprange}】,"
|
|
|
|
|
unset _iprange
|
|
|
|
|
elif [ -n "$(echo ${i} | grep '^ipset:')" ]; then
|
|
|
|
|
_ipset=$(echo ${i} | sed 's#ipset:##g')
|
|
|
|
|
msg="${msg}IPset【${_ipset}】,"
|
|
|
|
|
ipset -q list ${_ipset} >/dev/null
|
|
|
|
|
if [ $? -eq 0 ]; then
|
|
|
|
|
_ipt_source="${_ipt_source}-m set --match-set ${_ipset} src"
|
|
|
|
|
unset _ipset
|
2024-09-24 00:23:48 +08:00
|
|
|
|
else
|
2024-11-21 20:41:14 +08:00
|
|
|
|
echolog " - 【$remarks】,${msg}不存在,忽略。"
|
|
|
|
|
unset _ipset
|
2024-09-24 00:23:48 +08:00
|
|
|
|
continue
|
|
|
|
|
fi
|
2024-11-21 20:41:14 +08:00
|
|
|
|
elif [ -n "$(echo ${i} | grep '^ip:')" ]; then
|
|
|
|
|
_ip=$(echo ${i} | sed 's#ip:##g')
|
|
|
|
|
_ipt_source=$(factor ${_ip} "${_ipt_source}-s")
|
|
|
|
|
msg="${msg}IP【${_ip}】,"
|
|
|
|
|
unset _ip
|
|
|
|
|
elif [ -n "$(echo ${i} | grep '^mac:')" ]; then
|
|
|
|
|
_mac=$(echo ${i} | sed 's#mac:##g')
|
|
|
|
|
_ipt_source=$(factor ${_mac} "${_ipt_source}-m mac --mac-source")
|
|
|
|
|
msg="${msg}MAC【${_mac}】,"
|
|
|
|
|
unset _mac
|
2024-12-24 00:24:41 +08:00
|
|
|
|
elif [ -n "$(echo ${i} | grep '^any')" ]; then
|
|
|
|
|
msg="${msg}所有设备,"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
else
|
2024-11-21 20:41:14 +08:00
|
|
|
|
continue
|
2023-09-15 09:42:16 +08:00
|
|
|
|
fi
|
2024-11-21 20:41:14 +08:00
|
|
|
|
msg="【$remarks】,${msg}"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
ipt_tmp=$ipt_n
|
|
|
|
|
[ -n "${is_tproxy}" ] && ipt_tmp=$ipt_m
|
2024-03-06 05:32:52 +08:00
|
|
|
|
|
|
|
|
|
[ "$tcp_no_redir_ports" != "disable" ] && {
|
|
|
|
|
if [ "$tcp_no_redir_ports" != "1:65535" ]; then
|
|
|
|
|
$ip6t_m -A PSW $(comment "$remarks") ${_ipt_source} -p tcp -m multiport --dport $tcp_no_redir_ports -j RETURN 2>/dev/null
|
|
|
|
|
$ipt_tmp -A PSW $(comment "$remarks") ${_ipt_source} -p tcp -m multiport --dport $tcp_no_redir_ports -j RETURN
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}不代理 TCP 端口[${tcp_no_redir_ports}]"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
else
|
2024-03-10 04:14:35 +08:00
|
|
|
|
#结束时会return,无需加多余的规则。
|
2024-03-06 05:32:52 +08:00
|
|
|
|
unset tcp_port
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}不代理所有 TCP 端口"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ "$udp_no_redir_ports" != "disable" ] && {
|
|
|
|
|
if [ "$udp_no_redir_ports" != "1:65535" ]; then
|
|
|
|
|
$ip6t_m -A PSW $(comment "$remarks") ${_ipt_source} -p udp -m multiport --dport $udp_no_redir_ports -j RETURN 2>/dev/null
|
|
|
|
|
$ipt_m -A PSW $(comment "$remarks") ${_ipt_source} -p udp -m multiport --dport $udp_no_redir_ports -j RETURN
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}不代理 UDP 端口[${udp_no_redir_ports}]"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
else
|
2024-03-10 04:14:35 +08:00
|
|
|
|
#结束时会return,无需加多余的规则。
|
2024-03-06 05:32:52 +08:00
|
|
|
|
unset udp_port
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}不代理所有 UDP 端口"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
fi
|
|
|
|
|
}
|
2024-12-16 00:24:10 +08:00
|
|
|
|
|
|
|
|
|
local dns_redirect
|
2024-12-16 04:22:23 +08:00
|
|
|
|
[ $(config_t_get global dns_redirect "1") = "1" ] && dns_redirect=53
|
2024-12-13 00:27:41 +08:00
|
|
|
|
if ([ -n "$tcp_port" ] && [ -n "${tcp_proxy_mode}" ]) || ([ -n "$udp_port" ] && [ -n "${udp_proxy_mode}" ]); then
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && {
|
|
|
|
|
[ "${use_global_config}" = "0" ] && {
|
|
|
|
|
black_set_name="passwall_${sid}_black"
|
|
|
|
|
black6_set_name="passwall_${sid}_black6"
|
|
|
|
|
ipset -! create $black_set_name nethash maxelem 1048576 timeout 172800
|
|
|
|
|
ipset -! create $black6_set_name nethash family inet6 maxelem 1048576 timeout 172800
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && {
|
|
|
|
|
[ "${use_global_config}" = "0" ] && {
|
|
|
|
|
gfw_set_name="passwall_${sid}_gfw"
|
|
|
|
|
gfw6_set_name="passwall_${sid}_gfw6"
|
|
|
|
|
ipset -! create $gfw_set_name nethash maxelem 1048576 timeout 172800
|
|
|
|
|
ipset -! create $gfw6_set_name nethash family inet6 maxelem 1048576 timeout 172800
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
[ "${use_shunt_tcp}" = "1" -o "${use_shunt_udp}" = "1" ] && {
|
|
|
|
|
[ "${use_global_config}" = "0" ] && {
|
|
|
|
|
shunt_set_name="passwall_${sid}_shunt"
|
|
|
|
|
shunt6_set_name="passwall_${sid}_shunt6"
|
|
|
|
|
ipset -! create $shunt_set_name nethash maxelem 1048576 timeout 172800
|
|
|
|
|
ipset -! create $shunt6_set_name nethash family inet6 maxelem 1048576 timeout 172800
|
|
|
|
|
}
|
|
|
|
|
}
|
2024-12-16 00:24:10 +08:00
|
|
|
|
[ -n "${dns_redirect_port}" ] && dns_redirect=${dns_redirect_port}
|
2024-12-13 00:27:41 +08:00
|
|
|
|
else
|
2024-12-16 00:24:10 +08:00
|
|
|
|
[ -n "${DIRECT_DNSMASQ_PORT}" ] && dns_redirect=${DIRECT_DNSMASQ_PORT}
|
|
|
|
|
fi
|
|
|
|
|
if [ -n "${dns_redirect}" ]; then
|
|
|
|
|
$ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} --dport 53 -j RETURN
|
|
|
|
|
$ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} --dport 53 -j RETURN 2>/dev/null
|
|
|
|
|
$ipt_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} --dport 53 -j RETURN
|
|
|
|
|
$ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} --dport 53 -j RETURN 2>/dev/null
|
2024-12-16 04:22:23 +08:00
|
|
|
|
$ipt_n -A PSW_DNS $(comment "$remarks") -p udp ${_ipt_source} --dport 53 -j REDIRECT --to-ports ${dns_redirect}
|
|
|
|
|
$ip6t_n -A PSW_DNS $(comment "$remarks") -p udp ${_ipt_source} --dport 53 -j REDIRECT --to-ports ${dns_redirect} 2>/dev/null
|
|
|
|
|
$ipt_n -A PSW_DNS $(comment "$remarks") -p tcp ${_ipt_source} --dport 53 -j REDIRECT --to-ports ${dns_redirect}
|
|
|
|
|
$ip6t_n -A PSW_DNS $(comment "$remarks") -p tcp ${_ipt_source} --dport 53 -j REDIRECT --to-ports ${dns_redirect} 2>/dev/null
|
2024-12-21 00:24:08 +08:00
|
|
|
|
[ -z "$(get_cache_var "ACL_${sid}_tcp_default")" ] && echolog " - ${msg}使用与全局配置不相同节点,已将DNS强制重定向到专用 DNS 服务器。"
|
2024-12-13 00:27:41 +08:00
|
|
|
|
fi
|
|
|
|
|
|
2024-03-06 05:32:52 +08:00
|
|
|
|
[ -n "$tcp_port" -o -n "$udp_port" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_direct_list}" = "1" ] && $ipt_tmp -A PSW $(comment "$remarks") ${_ipt_source} $(dst $IPSET_WHITE) -j RETURN
|
|
|
|
|
[ "${use_block_list}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") ${_ipt_source} $(dst $IPSET_BLOCK) -j DROP
|
2024-03-06 05:32:52 +08:00
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_direct_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") ${_ipt_source} $(dst $IPSET_WHITE6) -j RETURN 2>/dev/null
|
|
|
|
|
[ "${use_block_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") ${_ipt_source} $(dst $IPSET_BLOCK6) -j DROP 2>/dev/null
|
2024-03-06 05:32:52 +08:00
|
|
|
|
}
|
2024-03-12 04:20:49 +08:00
|
|
|
|
|
|
|
|
|
[ "$tcp_proxy_drop_ports" != "disable" ] && {
|
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") $(dst $black6_set_name) -j DROP 2>/dev/null
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") $(dst $gfw6_set_name) -j DROP 2>/dev/null
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${chn_list} "-j DROP") 2>/dev/null
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_tcp}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") $(dst $shunt6_set_name) -j DROP 2>/dev/null
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${tcp_proxy_mode}" != "disable" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") -j DROP 2>/dev/null
|
|
|
|
|
}
|
|
|
|
|
$ipt_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") -d $FAKE_IP -j DROP
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") $(dst $black_set_name) -j DROP
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") $(dst $gfw_set_name) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ipt_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${chn_list} "-j DROP")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_tcp}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") $(dst $shunt_set_name) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${tcp_proxy_mode}" != "disable" ] && $ipt_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_proxy_drop_ports "-m multiport --dport") -j DROP
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}屏蔽代理 TCP 端口[${tcp_proxy_drop_ports}]"
|
2024-03-12 04:20:49 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ "$udp_proxy_drop_ports" != "disable" ] && {
|
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") $(dst $black6_set_name) -j DROP 2>/dev/null
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") $(dst $gfw6_set_name) -j DROP 2>/dev/null
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${chn_list} "-j DROP") 2>/dev/null
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_udp}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") $(dst $shunt6_set_name) -j DROP 2>/dev/null
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${udp_proxy_mode}" != "disable" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") -j DROP 2>/dev/null
|
|
|
|
|
}
|
|
|
|
|
$ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") -d $FAKE_IP -j DROP
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") $(dst $black_set_name) -j DROP
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") $(dst $gfw_set_name) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${chn_list} "-j DROP")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_udp}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") $(dst $shunt_set_name) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${udp_proxy_mode}" != "disable" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_proxy_drop_ports "-m multiport --dport") -j DROP
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}屏蔽代理 UDP 端口[${udp_proxy_drop_ports}]"
|
2024-03-12 04:20:49 +08:00
|
|
|
|
}
|
2024-02-19 16:13:47 +08:00
|
|
|
|
}
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
[ -n "$tcp_port" ] && {
|
2024-02-19 16:13:47 +08:00
|
|
|
|
if [ -n "${tcp_proxy_mode}" ]; then
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg2="${msg}使用 TCP 节点[$tcp_node_remark]"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
if [ -n "${is_tproxy}" ]; then
|
2024-03-06 05:32:52 +08:00
|
|
|
|
msg2="${msg2}(TPROXY:${tcp_port})"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
ipt_tmp=$ipt_m
|
2024-12-05 14:17:25 +08:00
|
|
|
|
ipt_j="-j PSW_RULE"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
else
|
2024-03-06 05:32:52 +08:00
|
|
|
|
msg2="${msg2}(REDIRECT:${tcp_port})"
|
2024-12-05 14:17:25 +08:00
|
|
|
|
ipt_j="$(REDIRECT $tcp_port)"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
[ "$accept_icmp" = "1" ] && {
|
|
|
|
|
$ipt_n -A PSW $(comment "$remarks") -p icmp ${_ipt_source} -d $FAKE_IP $(REDIRECT)
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ipt_n -A PSW $(comment "$remarks") -p icmp ${_ipt_source} $(dst $black_set_name) $(REDIRECT)
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ipt_n -A PSW $(comment "$remarks") -p icmp ${_ipt_source} $(dst $gfw_set_name) $(REDIRECT)
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ipt_n -A PSW $(comment "$remarks") -p icmp ${_ipt_source} $(dst $IPSET_CHN) $(get_jump_ipt ${chn_list})
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_tcp}" = "1" ] && $ipt_n -A PSW $(comment "$remarks") -p icmp ${_ipt_source} $(dst $shunt_set_name) $(REDIRECT)
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${tcp_proxy_mode}" != "disable" ] && $ipt_n -A PSW $(comment "$remarks") -p icmp ${_ipt_source} $(REDIRECT)
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ "$accept_icmpv6" = "1" ] && [ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ip6t_n -A PSW $(comment "$remarks") -p ipv6-icmp ${_ipt_source} $(dst $black6_set_name) $(REDIRECT) 2>/dev/null
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ip6t_n -A PSW $(comment "$remarks") -p ipv6-icmp ${_ipt_source} $(dst $gfw6_set_name) $(REDIRECT) 2>/dev/null
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ip6t_n -A PSW $(comment "$remarks") -p ipv6-icmp ${_ipt_source} $(dst $IPSET_CHN6) $(get_jump_ipt ${chn_list}) 2>/dev/null
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_tcp}" = "1" ] && $ip6t_n -A PSW $(comment "$remarks") -p ipv6-icmp ${_ipt_source} $(dst $shunt6_set_name) $(REDIRECT) 2>/dev/null
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${tcp_proxy_mode}" != "disable" ] && $ip6t_n -A PSW $(comment "$remarks") -p ipv6-icmp ${_ipt_source} $(REDIRECT) 2>/dev/null
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
2024-12-05 14:17:25 +08:00
|
|
|
|
|
|
|
|
|
$ipt_tmp -A PSW $(comment "$remarks") -p tcp ${_ipt_source} -d $FAKE_IP ${ipt_j}
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ipt_tmp -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") $(dst $black_set_name) ${ipt_j}
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ipt_tmp -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") $(dst $gfw_set_name) ${ipt_j}
|
2024-12-05 14:17:25 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ipt_tmp -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${chn_list} "${ipt_j}")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_tcp}" = "1" ] && $ipt_tmp -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") $(dst $shunt_set_name) ${ipt_j}
|
2024-12-05 14:17:25 +08:00
|
|
|
|
[ "${tcp_proxy_mode}" != "disable" ] && $ipt_tmp -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") ${ipt_j}
|
|
|
|
|
[ -n "${is_tproxy}" ] && $ipt_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(REDIRECT $tcp_port TPROXY)
|
|
|
|
|
|
2023-09-15 09:42:16 +08:00
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") $(dst $black6_set_name) -j PSW_RULE 2>/dev/null
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") $(dst $gfw6_set_name) -j PSW_RULE 2>/dev/null
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${chn_list} "-j PSW_RULE") 2>/dev/null
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_tcp}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") $(dst $shunt6_set_name) -j PSW_RULE 2>/dev/null
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${tcp_proxy_mode}" != "disable" ] && $ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(factor $tcp_redir_ports "-m multiport --dport") -j PSW_RULE 2>/dev/null
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ip6t_m -A PSW $(comment "$remarks") -p tcp ${_ipt_source} $(REDIRECT $tcp_port TPROXY) 2>/dev/null
|
|
|
|
|
}
|
|
|
|
|
else
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg2="${msg}不代理 TCP"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
fi
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg2}"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
$ip6t_m -A PSW $(comment "$remarks") ${_ipt_source} -p tcp -j RETURN 2>/dev/null
|
|
|
|
|
$ipt_tmp -A PSW $(comment "$remarks") ${_ipt_source} -p tcp -j RETURN
|
|
|
|
|
|
|
|
|
|
[ -n "$udp_port" ] && {
|
2024-02-19 16:13:47 +08:00
|
|
|
|
if [ -n "${udp_proxy_mode}" ]; then
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg2="${msg}使用 UDP 节点[$udp_node_remark]"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
msg2="${msg2}(TPROXY:${udp_port})"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
$ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} -d $FAKE_IP -j PSW_RULE
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") $(dst $black_set_name) -j PSW_RULE
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") $(dst $gfw_set_name) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${chn_list} "-j PSW_RULE")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_udp}" = "1" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") $(dst $shunt_set_name) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${udp_proxy_mode}" != "disable" ] && $ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") -j PSW_RULE
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ipt_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(REDIRECT $udp_port TPROXY)
|
|
|
|
|
|
2025-01-02 04:20:24 +08:00
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_proxy_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") $(dst $black6_set_name) -j PSW_RULE 2>/dev/null
|
|
|
|
|
[ "${use_gfw_list}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") $(dst $gfw6_set_name) -j PSW_RULE 2>/dev/null
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${chn_list}" != "0" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${chn_list} "-j PSW_RULE") 2>/dev/null
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${use_shunt_udp}" = "1" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") $(dst $shunt6_set_name) -j PSW_RULE 2>/dev/null
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${udp_proxy_mode}" != "disable" ] && $ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(factor $udp_redir_ports "-m multiport --dport") -j PSW_RULE 2>/dev/null
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ip6t_m -A PSW $(comment "$remarks") -p udp ${_ipt_source} $(REDIRECT $udp_port TPROXY) 2>/dev/null
|
|
|
|
|
}
|
|
|
|
|
else
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg2="${msg}不代理 UDP"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
fi
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg2}"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
$ip6t_m -A PSW $(comment "$remarks") ${_ipt_source} -p udp -j RETURN 2>/dev/null
|
|
|
|
|
$ipt_m -A PSW $(comment "$remarks") ${_ipt_source} -p udp -j RETURN
|
2024-12-05 14:17:25 +08:00
|
|
|
|
unset ipt_tmp ipt_j _ipt_source msg msg2
|
2023-09-15 09:42:16 +08:00
|
|
|
|
done
|
2024-12-13 00:27:41 +08:00
|
|
|
|
unset enabled sid remarks sources use_global_config use_direct_list use_proxy_list use_block_list use_gfw_list chn_list tcp_proxy_mode udp_proxy_mode dns_redirect_port tcp_no_redir_ports udp_no_redir_ports tcp_proxy_drop_ports udp_proxy_drop_ports tcp_redir_ports udp_redir_ports tcp_node udp_node interface
|
2024-12-16 00:24:10 +08:00
|
|
|
|
unset tcp_port udp_port tcp_node_remark udp_node_remark _acl_list use_shunt_tcp use_shunt_udp dns_redirect
|
2023-09-15 09:42:16 +08:00
|
|
|
|
done
|
|
|
|
|
}
|
|
|
|
|
|
2024-03-06 05:32:52 +08:00
|
|
|
|
[ "$ENABLED_DEFAULT_ACL" == 1 ] && [ "$CLIENT_PROXY" == 1 ] && {
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg="【默认】,"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
local ipt_tmp=$ipt_n
|
|
|
|
|
[ -n "${is_tproxy}" ] && ipt_tmp=$ipt_m
|
|
|
|
|
|
|
|
|
|
[ "$TCP_NO_REDIR_PORTS" != "disable" ] && {
|
|
|
|
|
$ip6t_m -A PSW $(comment "默认") -p tcp -m multiport --dport $TCP_NO_REDIR_PORTS -j RETURN
|
|
|
|
|
$ipt_tmp -A PSW $(comment "默认") -p tcp -m multiport --dport $TCP_NO_REDIR_PORTS -j RETURN
|
|
|
|
|
if [ "$TCP_NO_REDIR_PORTS" != "1:65535" ]; then
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}不代理 TCP 端口[${TCP_NO_REDIR_PORTS}]"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
else
|
|
|
|
|
unset TCP_PROXY_MODE
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}不代理所有 TCP 端口"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ "$UDP_NO_REDIR_PORTS" != "disable" ] && {
|
|
|
|
|
$ip6t_m -A PSW $(comment "默认") -p udp -m multiport --dport $UDP_NO_REDIR_PORTS -j RETURN
|
|
|
|
|
$ipt_m -A PSW $(comment "默认") -p udp -m multiport --dport $UDP_NO_REDIR_PORTS -j RETURN
|
|
|
|
|
if [ "$UDP_NO_REDIR_PORTS" != "1:65535" ]; then
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}不代理 UDP 端口[${UDP_NO_REDIR_PORTS}]"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
else
|
|
|
|
|
unset UDP_PROXY_MODE
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}不代理所有 UDP 端口"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
fi
|
|
|
|
|
}
|
2024-12-16 04:22:23 +08:00
|
|
|
|
|
|
|
|
|
local DNS_REDIRECT
|
|
|
|
|
[ $(config_t_get global dns_redirect "1") = "1" ] && DNS_REDIRECT=53
|
2024-12-19 16:28:00 +08:00
|
|
|
|
if ([ -n "$TCP_NODE" ] && [ -n "${TCP_PROXY_MODE}" ]) || ([ -n "$UDP_NODE" ] && [ -n "${UDP_PROXY_MODE}" ]); then
|
2024-12-16 04:22:23 +08:00
|
|
|
|
[ -n "${DNS_REDIRECT_PORT}" ] && DNS_REDIRECT=${DNS_REDIRECT_PORT}
|
|
|
|
|
else
|
|
|
|
|
[ -n "${DIRECT_DNSMASQ_PORT}" ] && DNS_REDIRECT=${DIRECT_DNSMASQ_PORT}
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if [ -n "${DNS_REDIRECT}" ]; then
|
|
|
|
|
$ipt_m -A PSW $(comment "默认") -p udp --dport 53 -j RETURN
|
|
|
|
|
$ip6t_m -A PSW $(comment "默认") -p udp --dport 53 -j RETURN 2>/dev/null
|
|
|
|
|
$ipt_m -A PSW $(comment "默认") -p tcp --dport 53 -j RETURN
|
|
|
|
|
$ip6t_m -A PSW $(comment "默认") -p tcp --dport 53 -j RETURN 2>/dev/null
|
|
|
|
|
$ipt_n -A PSW_DNS $(comment "默认") -p udp --dport 53 -j REDIRECT --to-ports ${DNS_REDIRECT}
|
|
|
|
|
$ip6t_n -A PSW_DNS $(comment "默认") -p udp --dport 53 -j REDIRECT --to-ports ${DNS_REDIRECT} 2>/dev/null
|
|
|
|
|
$ipt_n -A PSW_DNS $(comment "默认") -p tcp --dport 53 -j REDIRECT --to-ports ${DNS_REDIRECT}
|
|
|
|
|
$ip6t_n -A PSW_DNS $(comment "默认") -p tcp --dport 53 -j REDIRECT --to-ports ${DNS_REDIRECT} 2>/dev/null
|
2024-12-13 00:27:41 +08:00
|
|
|
|
fi
|
|
|
|
|
|
2024-03-06 05:32:52 +08:00
|
|
|
|
[ -n "${TCP_PROXY_MODE}" -o -n "${UDP_PROXY_MODE}" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_DIRECT_LIST}" = "1" ] && $ipt_tmp -A PSW $(comment "默认") $(dst $IPSET_WHITE) -j RETURN
|
|
|
|
|
[ "${USE_BLOCK_LIST}" = "1" ] && $ipt_m -A PSW $(comment "默认") $(dst $IPSET_BLOCK) -j DROP
|
2024-03-06 05:32:52 +08:00
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_DIRECT_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") $(dst $IPSET_WHITE6) -j RETURN 2>/dev/null
|
|
|
|
|
[ "${USE_BLOCK_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") $(dst $IPSET_BLOCK6) -j DROP 2>/dev/null
|
2024-03-06 05:32:52 +08:00
|
|
|
|
}
|
2024-03-12 04:20:49 +08:00
|
|
|
|
|
|
|
|
|
[ "$TCP_PROXY_DROP_PORTS" != "disable" ] && {
|
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_BLACK6) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_GFW6) -j DROP
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${CHN_LIST} "-j DROP")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT6) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${TCP_PROXY_MODE}" != "disable" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") -j DROP
|
|
|
|
|
}
|
|
|
|
|
$ipt_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") -d $FAKE_IP -j DROP
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_BLACK) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_GFW) -j DROP
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST} "-j DROP")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ipt_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${TCP_PROXY_MODE}" != "disable" ] && $ipt_m -A PSW $(comment "默认") -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") -j DROP
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}屏蔽代理 TCP 端口[${TCP_PROXY_DROP_PORTS}]"
|
2024-03-12 04:20:49 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ "$UDP_PROXY_DROP_PORTS" != "disable" ] && {
|
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_BLACK6) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_GFW6) -j DROP
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${CHN_LIST} "-j DROP")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT6) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${UDP_PROXY_MODE}" != "disable" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") -j DROP
|
|
|
|
|
}
|
|
|
|
|
$ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") -d $FAKE_IP -j DROP
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_BLACK) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_GFW) -j DROP
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST} "-j DROP")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_UDP}" = "1" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${UDP_PROXY_MODE}" != "disable" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") -j DROP
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg}屏蔽代理 UDP 端口[${UDP_PROXY_DROP_PORTS}]"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2024-03-12 04:20:49 +08:00
|
|
|
|
# 加载TCP默认代理模式
|
2024-02-19 16:13:47 +08:00
|
|
|
|
if [ -n "${TCP_PROXY_MODE}" ]; then
|
2024-12-19 16:28:00 +08:00
|
|
|
|
[ -n "$TCP_NODE" ] && {
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg2="${msg}使用 TCP 节点[$(config_n_get $TCP_NODE remarks)]"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
if [ -n "${is_tproxy}" ]; then
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg2="${msg2}(TPROXY:${TCP_REDIR_PORT})"
|
2024-12-05 14:17:25 +08:00
|
|
|
|
ipt_j="-j PSW_RULE"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
else
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg2="${msg2}(REDIRECT:${TCP_REDIR_PORT})"
|
2024-12-05 14:17:25 +08:00
|
|
|
|
ipt_j="$(REDIRECT $TCP_REDIR_PORT)"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
[ "$accept_icmp" = "1" ] && {
|
|
|
|
|
$ipt_n -A PSW $(comment "默认") -p icmp -d $FAKE_IP $(REDIRECT)
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_n -A PSW $(comment "默认") -p icmp $(dst $IPSET_BLACK) $(REDIRECT)
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_n -A PSW $(comment "默认") -p icmp $(dst $IPSET_GFW) $(REDIRECT)
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_n -A PSW $(comment "默认") -p icmp $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST})
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ipt_n -A PSW $(comment "默认") -p icmp $(dst $IPSET_SHUNT) $(REDIRECT)
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${TCP_PROXY_MODE}" != "disable" ] && $ipt_n -A PSW $(comment "默认") -p icmp $(REDIRECT)
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ "$accept_icmpv6" = "1" ] && [ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ip6t_n -A PSW $(comment "默认") -p ipv6-icmp $(dst $IPSET_BLACK6) $(REDIRECT)
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ip6t_n -A PSW $(comment "默认") -p ipv6-icmp $(dst $IPSET_GFW6) $(REDIRECT)
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ip6t_n -A PSW $(comment "默认") -p ipv6-icmp $(dst $IPSET_CHN6) $(get_jump_ipt ${CHN_LIST})
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ip6t_n -A PSW $(comment "默认") -p ipv6-icmp $(dst $IPSET_SHUNT6) $(REDIRECT)
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${TCP_PROXY_MODE}" != "disable" ] && $ip6t_n -A PSW $(comment "默认") -p ipv6-icmp $(REDIRECT)
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
2024-12-05 14:17:25 +08:00
|
|
|
|
|
|
|
|
|
$ipt_tmp -A PSW $(comment "默认") -p tcp -d $FAKE_IP ${ipt_j}
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_tmp -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_BLACK) ${ipt_j}
|
2024-12-05 14:17:25 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_tmp -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_GFW) ${ipt_j}
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_tmp -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST} "${ipt_j}")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ipt_tmp -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT) ${ipt_j}
|
2024-12-05 14:17:25 +08:00
|
|
|
|
[ "${TCP_PROXY_MODE}" != "disable" ] && $ipt_tmp -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") ${ipt_j}
|
|
|
|
|
[ -n "${is_tproxy}" ]&& $ipt_tmp -A PSW $(comment "默认") -p tcp $(REDIRECT $TCP_REDIR_PORT TPROXY)
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_BLACK6) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_GFW6) -j PSW_RULE
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${CHN_LIST} "-j PSW_RULE")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT6) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${TCP_PROXY_MODE}" != "disable" ] && $ip6t_m -A PSW $(comment "默认") -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") -j PSW_RULE
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ip6t_m -A PSW $(comment "默认") -p tcp $(REDIRECT $TCP_REDIR_PORT TPROXY)
|
|
|
|
|
}
|
|
|
|
|
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg2}"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
fi
|
|
|
|
|
$ipt_n -A PSW $(comment "默认") -p tcp -j RETURN
|
|
|
|
|
$ipt_m -A PSW $(comment "默认") -p tcp -j RETURN
|
|
|
|
|
$ip6t_m -A PSW $(comment "默认") -p tcp -j RETURN
|
|
|
|
|
|
|
|
|
|
# 加载UDP默认代理模式
|
2024-02-19 16:13:47 +08:00
|
|
|
|
if [ -n "${UDP_PROXY_MODE}" ]; then
|
2024-12-19 16:28:00 +08:00
|
|
|
|
[ -n "$UDP_NODE" -o "$TCP_UDP" = "1" ] && {
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg2="${msg}使用 UDP 节点[$(config_n_get $UDP_NODE remarks)](TPROXY:${UDP_REDIR_PORT})"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
$ipt_m -A PSW $(comment "默认") -p udp -d $FAKE_IP -j PSW_RULE
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_BLACK) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_GFW) -j PSW_RULE
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST} "-j PSW_RULE")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_UDP}" = "1" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${UDP_PROXY_MODE}" != "disable" ] && $ipt_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") -j PSW_RULE
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ipt_m -A PSW $(comment "默认") -p udp $(REDIRECT $UDP_REDIR_PORT TPROXY)
|
|
|
|
|
|
2025-01-02 04:20:24 +08:00
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_BLACK6) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_GFW6) -j PSW_RULE
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${CHN_LIST} "-j PSW_RULE")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_UDP}" = "1" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT6) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${UDP_PROXY_MODE}" != "disable" ] && $ip6t_m -A PSW $(comment "默认") -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") -j PSW_RULE
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ip6t_m -A PSW $(comment "默认") -p udp $(REDIRECT $UDP_REDIR_PORT TPROXY)
|
|
|
|
|
}
|
|
|
|
|
|
2024-04-25 04:16:58 +08:00
|
|
|
|
echolog " - ${msg2}"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
fi
|
|
|
|
|
$ipt_m -A PSW $(comment "默认") -p udp -j RETURN
|
|
|
|
|
$ip6t_m -A PSW $(comment "默认") -p udp -j RETURN
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
filter_haproxy() {
|
|
|
|
|
for item in ${haproxy_items}; do
|
|
|
|
|
local ip=$(get_host_ip ipv4 $(echo $item | awk -F ":" '{print $1}') 1)
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -q add $IPSET_VPS $ip
|
2023-09-15 09:42:16 +08:00
|
|
|
|
done
|
2024-12-23 20:38:23 +08:00
|
|
|
|
echolog " - [$?]加入负载均衡的节点到ipset[$IPSET_VPS]直连完成"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
filter_vpsip() {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
uci show $CONFIG | grep -E "(.address=|.download_address=)" | cut -d "'" -f 2 | grep -E "([0-9]{1,3}[\.]){3}[0-9]{1,3}" | grep -v "^127\.0\.0\.1$" | sed -e "/^$/d" | sed -e "s/^/add $IPSET_VPS &/g" | awk '{print $0} END{print "COMMIT"}' | ipset -! -R
|
|
|
|
|
echolog " - [$?]加入所有IPv4节点到ipset[$IPSET_VPS]直连完成"
|
|
|
|
|
uci show $CONFIG | grep -E "(.address=|.download_address=)" | cut -d "'" -f 2 | grep -E "([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4}" | sed -e "/^$/d" | sed -e "s/^/add $IPSET_VPS6 &/g" | awk '{print $0} END{print "COMMIT"}' | ipset -! -R
|
|
|
|
|
echolog " - [$?]加入所有IPv6节点到ipset[$IPSET_VPS6]直连完成"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
|
2024-12-16 20:42:33 +08:00
|
|
|
|
filter_server_port() {
|
|
|
|
|
local address=${1}
|
|
|
|
|
local port=${2}
|
|
|
|
|
local stream=${3}
|
|
|
|
|
stream=$(echo ${3} | tr 'A-Z' 'a-z')
|
|
|
|
|
local _is_tproxy ipt_tmp
|
|
|
|
|
ipt_tmp=$ipt_n
|
|
|
|
|
_is_tproxy=${is_tproxy}
|
|
|
|
|
[ "$stream" == "udp" ] && _is_tproxy="TPROXY"
|
|
|
|
|
[ -n "${_is_tproxy}" ] && ipt_tmp=$ipt_m
|
|
|
|
|
|
|
|
|
|
for _ipt in 4 6; do
|
|
|
|
|
[ "$_ipt" == "4" ] && _ipt=$ipt_tmp
|
|
|
|
|
[ "$_ipt" == "6" ] && _ipt=$ip6t_m
|
|
|
|
|
$_ipt -n -L PSW_OUTPUT | grep -q "${address}:${port}"
|
|
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
|
$_ipt -I PSW_OUTPUT $(comment "${address}:${port}") -p $stream -d $address --dport $port -j RETURN 2>/dev/null
|
2023-09-15 09:42:16 +08:00
|
|
|
|
fi
|
2024-12-16 20:42:33 +08:00
|
|
|
|
done
|
|
|
|
|
}
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
2024-12-16 20:42:33 +08:00
|
|
|
|
filter_node() {
|
|
|
|
|
local node=${1}
|
|
|
|
|
local stream=${2}
|
2024-12-19 16:28:00 +08:00
|
|
|
|
if [ -n "$node" ]; then
|
2024-12-16 20:42:33 +08:00
|
|
|
|
local address=$(config_n_get $node address)
|
|
|
|
|
local port=$(config_n_get $node port)
|
|
|
|
|
[ -z "$address" ] && [ -z "$port" ] && {
|
|
|
|
|
return 1
|
2024-12-13 00:27:41 +08:00
|
|
|
|
}
|
2024-12-16 20:42:33 +08:00
|
|
|
|
filter_server_port $address $port $stream
|
|
|
|
|
filter_server_port $address $port $stream
|
2023-09-15 09:42:16 +08:00
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
|
2024-12-16 20:42:33 +08:00
|
|
|
|
filter_direct_node_list() {
|
|
|
|
|
[ ! -s "$TMP_PATH/direct_node_list" ] && return
|
|
|
|
|
for _node_id in $(cat $TMP_PATH/direct_node_list | awk '!seen[$0]++'); do
|
|
|
|
|
filter_node "$_node_id" TCP
|
|
|
|
|
filter_node "$_node_id" UDP
|
|
|
|
|
unset _node_id
|
|
|
|
|
done
|
|
|
|
|
}
|
|
|
|
|
|
2023-09-15 09:42:16 +08:00
|
|
|
|
add_firewall_rule() {
|
|
|
|
|
echolog "开始加载防火墙规则..."
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -! create $IPSET_LOCAL nethash maxelem 1048576
|
|
|
|
|
ipset -! create $IPSET_LAN nethash maxelem 1048576
|
|
|
|
|
ipset -! create $IPSET_VPS nethash maxelem 1048576
|
|
|
|
|
ipset -! create $IPSET_SHUNT nethash maxelem 1048576 timeout 172800
|
2024-09-14 11:03:26 +08:00
|
|
|
|
ipset -! create $IPSET_GFW nethash maxelem 1048576 timeout 172800
|
|
|
|
|
ipset -! create $IPSET_CHN nethash maxelem 1048576 timeout 172800
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -! create $IPSET_BLACK nethash maxelem 1048576 timeout 172800
|
|
|
|
|
ipset -! create $IPSET_WHITE nethash maxelem 1048576 timeout 172800
|
|
|
|
|
ipset -! create $IPSET_BLOCK nethash maxelem 1048576 timeout 172800
|
|
|
|
|
|
|
|
|
|
ipset -! create $IPSET_LOCAL6 nethash family inet6 maxelem 1048576
|
|
|
|
|
ipset -! create $IPSET_LAN6 nethash family inet6 maxelem 1048576
|
|
|
|
|
ipset -! create $IPSET_VPS6 nethash family inet6 maxelem 1048576
|
|
|
|
|
ipset -! create $IPSET_SHUNT6 nethash family inet6 maxelem 1048576 timeout 172800
|
2024-09-14 11:03:26 +08:00
|
|
|
|
ipset -! create $IPSET_GFW6 nethash family inet6 maxelem 1048576 timeout 172800
|
|
|
|
|
ipset -! create $IPSET_CHN6 nethash family inet6 maxelem 1048576 timeout 172800
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -! create $IPSET_BLACK6 nethash family inet6 maxelem 1048576 timeout 172800
|
|
|
|
|
ipset -! create $IPSET_WHITE6 nethash family inet6 maxelem 1048576 timeout 172800
|
|
|
|
|
ipset -! create $IPSET_BLOCK6 nethash family inet6 maxelem 1048576 timeout 172800
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
2024-12-28 20:35:11 +08:00
|
|
|
|
cat $RULES_PATH/chnroute | tr -s '\n' | grep -v "^#" | sed -e "/^$/d" | sed -e "s/^/add $IPSET_CHN &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
|
|
|
|
cat $RULES_PATH/chnroute6 | tr -s '\n' | grep -v "^#" | sed -e "/^$/d" | sed -e "s/^/add $IPSET_CHN6 &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
2024-12-07 16:24:54 +08:00
|
|
|
|
|
|
|
|
|
#导入规则列表、分流规则中的IP列表
|
2024-11-16 00:27:08 +08:00
|
|
|
|
local USE_SHUNT_NODE=0
|
2024-12-07 16:24:54 +08:00
|
|
|
|
local USE_PROXY_LIST_ALL=${USE_PROXY_LIST}
|
|
|
|
|
local USE_DIRECT_LIST_ALL=${USE_DIRECT_LIST}
|
|
|
|
|
local USE_BLOCK_LIST_ALL=${USE_BLOCK_LIST}
|
2024-12-19 16:28:00 +08:00
|
|
|
|
local _TCP_NODE=$(config_t_get global tcp_node)
|
|
|
|
|
local _UDP_NODE=$(config_t_get global udp_node)
|
2024-12-07 16:24:54 +08:00
|
|
|
|
local USE_GEOVIEW=$(config_t_get global_rules enable_geoview)
|
2024-12-03 00:28:00 +08:00
|
|
|
|
|
2024-12-19 16:28:00 +08:00
|
|
|
|
[ -n "$_TCP_NODE" ] && [ "$(config_n_get $_TCP_NODE protocol)" = "_shunt" ] && USE_SHUNT_TCP=1 && USE_SHUNT_NODE=1
|
|
|
|
|
[ -n "$_UDP_NODE" ] && [ "$(config_n_get $_UDP_NODE protocol)" = "_shunt" ] && USE_SHUNT_UDP=1 && USE_SHUNT_NODE=1
|
2024-12-03 00:28:00 +08:00
|
|
|
|
[ "$_UDP_NODE" = "tcp" ] && USE_SHUNT_UDP=$USE_SHUNT_TCP
|
2024-12-07 16:24:54 +08:00
|
|
|
|
|
|
|
|
|
for acl_section in $(uci show ${CONFIG} | grep "=acl_rule" | cut -d '.' -sf 2 | cut -d '=' -sf 1); do
|
|
|
|
|
[ "$(config_n_get $acl_section enabled)" != "1" ] && continue
|
|
|
|
|
[ "$(config_n_get $acl_section use_global_config 0)" != "1" ] && {
|
|
|
|
|
[ "$(config_n_get $acl_section use_direct_list 1)" = "1" ] && USE_PROXY_LIST_ALL=1
|
|
|
|
|
[ "$(config_n_get $acl_section use_proxy_list 1)" = "1" ] && USE_DIRECT_LIST_ALL=1
|
|
|
|
|
[ "$(config_n_get $acl_section use_block_list 1)" = "1" ] && USE_BLOCK_LIST_ALL=1
|
|
|
|
|
}
|
|
|
|
|
for _node in $(config_n_get $acl_section tcp_node) $(config_n_get $acl_section udp_node); do
|
|
|
|
|
local node_protocol=$(config_n_get $_node protocol)
|
|
|
|
|
[ "$node_protocol" = "_shunt" ] && { USE_SHUNT_NODE=1; break; }
|
2024-11-16 00:27:08 +08:00
|
|
|
|
done
|
2024-12-07 16:24:54 +08:00
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
#直连列表
|
|
|
|
|
[ "$USE_DIRECT_LIST_ALL" = "1" ] && {
|
2024-12-29 04:20:24 +08:00
|
|
|
|
cat $RULES_PATH/direct_ip | tr -s "\r\n" "\n" | grep -v "^#" | sed -e "/^$/d" | grep -E "(\.((2(5[0-5]|[0-4][0-9]))|[0-1]?[0-9]{1,2})){3}" | sed -e "s/^/add $IPSET_WHITE &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
|
|
|
|
cat $RULES_PATH/direct_ip | tr -s "\r\n" "\n" | grep -v "^#" | sed -e "/^$/d" | grep -E "([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4}" | sed -e "s/^/add $IPSET_WHITE6 &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
2024-12-07 16:24:54 +08:00
|
|
|
|
[ "$USE_GEOVIEW" = "1" ] && {
|
2024-12-29 04:20:24 +08:00
|
|
|
|
local GEOIP_CODE=$(cat $RULES_PATH/direct_ip | tr -s "\r\n" "\n" | sed -e "/^$/d" | grep -E "^geoip:" | grep -v "^geoip:private" | sed -E 's/^geoip:(.*)/\1/' | sed ':a;N;$!ba;s/\n/,/g')
|
2024-12-07 16:24:54 +08:00
|
|
|
|
if [ -n "$GEOIP_CODE" ] && type geoview &> /dev/null; then
|
2024-12-28 20:35:11 +08:00
|
|
|
|
get_geoip $GEOIP_CODE ipv4 | grep -E "(\.((2(5[0-5]|[0-4][0-9]))|[0-1]?[0-9]{1,2})){3}" | sed -e "s/^/add $IPSET_WHITE &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
|
|
|
|
get_geoip $GEOIP_CODE ipv6 | grep -E "([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4}" | sed -e "s/^/add $IPSET_WHITE6 &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
2024-12-07 16:24:54 +08:00
|
|
|
|
echolog " - [$?]解析并加入[直连列表] GeoIP 到 IPSET 完成"
|
|
|
|
|
fi
|
|
|
|
|
}
|
2024-11-16 00:27:08 +08:00
|
|
|
|
}
|
2024-12-03 00:28:00 +08:00
|
|
|
|
|
2024-12-07 16:24:54 +08:00
|
|
|
|
#代理列表
|
|
|
|
|
[ "$USE_PROXY_LIST_ALL" = "1" ] && {
|
2024-12-29 04:20:24 +08:00
|
|
|
|
cat $RULES_PATH/proxy_ip | tr -s "\r\n" "\n" | grep -v "^#" | sed -e "/^$/d" | grep -E "(\.((2(5[0-5]|[0-4][0-9]))|[0-1]?[0-9]{1,2})){3}" | sed -e "s/^/add $IPSET_BLACK &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
|
|
|
|
cat $RULES_PATH/proxy_ip | tr -s "\r\n" "\n" | grep -v "^#" | sed -e "/^$/d" | grep -E "([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4}" | sed -e "s/^/add $IPSET_BLACK6 &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
2024-12-07 16:24:54 +08:00
|
|
|
|
[ "$USE_GEOVIEW" = "1" ] && {
|
2024-12-29 04:20:24 +08:00
|
|
|
|
local GEOIP_CODE=$(cat $RULES_PATH/proxy_ip | tr -s "\r\n" "\n" | sed -e "/^$/d" | grep -E "^geoip:" | grep -v "^geoip:private" | sed -E 's/^geoip:(.*)/\1/' | sed ':a;N;$!ba;s/\n/,/g')
|
2024-12-07 16:24:54 +08:00
|
|
|
|
if [ -n "$GEOIP_CODE" ] && type geoview &> /dev/null; then
|
2024-12-28 20:35:11 +08:00
|
|
|
|
get_geoip $GEOIP_CODE ipv4 | grep -E "(\.((2(5[0-5]|[0-4][0-9]))|[0-1]?[0-9]{1,2})){3}" | sed -e "s/^/add $IPSET_BLACK &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
|
|
|
|
get_geoip $GEOIP_CODE ipv6 | grep -E "([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4}" | sed -e "s/^/add $IPSET_BLACK6 &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
2024-12-07 16:24:54 +08:00
|
|
|
|
echolog " - [$?]解析并加入[代理列表] GeoIP 到 IPSET 完成"
|
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#屏蔽列表
|
2024-12-26 20:37:57 +08:00
|
|
|
|
[ "$USE_BLOCK_LIST_ALL" = "1" ] && {
|
2024-12-29 04:20:24 +08:00
|
|
|
|
cat $RULES_PATH/block_ip | tr -s "\r\n" "\n" | grep -v "^#" | sed -e "/^$/d" | grep -E "(\.((2(5[0-5]|[0-4][0-9]))|[0-1]?[0-9]{1,2})){3}" | sed -e "s/^/add $IPSET_BLOCK &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
|
|
|
|
cat $RULES_PATH/block_ip | tr -s "\r\n" "\n" | grep -v "^#" | sed -e "/^$/d" | grep -E "([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4}" | sed -e "s/^/add $IPSET_BLOCK6 &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
2024-12-07 16:24:54 +08:00
|
|
|
|
[ "$USE_GEOVIEW" = "1" ] && {
|
2024-12-29 04:20:24 +08:00
|
|
|
|
local GEOIP_CODE=$(cat $RULES_PATH/block_ip | tr -s "\r\n" "\n" | sed -e "/^$/d" | grep -E "^geoip:" | grep -v "^geoip:private" | sed -E 's/^geoip:(.*)/\1/' | sed ':a;N;$!ba;s/\n/,/g')
|
2024-12-07 16:24:54 +08:00
|
|
|
|
if [ -n "$GEOIP_CODE" ] && type geoview &> /dev/null; then
|
2024-12-28 20:35:11 +08:00
|
|
|
|
get_geoip $GEOIP_CODE ipv4 | grep -E "(\.((2(5[0-5]|[0-4][0-9]))|[0-1]?[0-9]{1,2})){3}" | sed -e "s/^/add $IPSET_BLOCK &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
|
|
|
|
get_geoip $GEOIP_CODE ipv6 | grep -E "([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4}" | sed -e "s/^/add $IPSET_BLOCK6 &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
2024-12-07 16:24:54 +08:00
|
|
|
|
echolog " - [$?]解析并加入[屏蔽列表] GeoIP 到 IPSET 完成"
|
|
|
|
|
fi
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#分流列表
|
2024-11-16 00:27:08 +08:00
|
|
|
|
[ "$USE_SHUNT_NODE" = "1" ] && {
|
2024-11-29 00:25:38 +08:00
|
|
|
|
local GEOIP_CODE=""
|
2024-11-16 00:27:08 +08:00
|
|
|
|
local shunt_ids=$(uci show $CONFIG | grep "=shunt_rules" | awk -F '.' '{print $2}' | awk -F '=' '{print $1}')
|
|
|
|
|
for shunt_id in $shunt_ids; do
|
2024-12-29 04:20:24 +08:00
|
|
|
|
config_n_get $shunt_id ip_list | tr -s "\r\n" "\n" | grep -v "^#" | sed -e "/^$/d" | grep -E "(\.((2(5[0-5]|[0-4][0-9]))|[0-1]?[0-9]{1,2})){3}" | sed -e "s/^/add $IPSET_SHUNT &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
|
|
|
|
config_n_get $shunt_id ip_list | tr -s "\r\n" "\n" | grep -v "^#" | sed -e "/^$/d" | grep -E "([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4}" | sed -e "s/^/add $IPSET_SHUNT6 &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
2024-12-07 16:24:54 +08:00
|
|
|
|
[ "$USE_GEOVIEW" = "1" ] && {
|
2024-12-29 04:20:24 +08:00
|
|
|
|
local geoip_code=$(config_n_get $shunt_id ip_list | tr -s "\r\n" "\n" | sed -e "/^$/d" | grep -E "^geoip:" | grep -v "^geoip:private" | sed -E 's/^geoip:(.*)/\1/' | sed ':a;N;$!ba;s/\n/,/g')
|
2024-11-29 00:25:38 +08:00
|
|
|
|
[ -n "$geoip_code" ] && GEOIP_CODE="${GEOIP_CODE:+$GEOIP_CODE,}$geoip_code"
|
|
|
|
|
}
|
2024-11-16 00:27:08 +08:00
|
|
|
|
done
|
2024-12-07 16:24:54 +08:00
|
|
|
|
if [ -n "$GEOIP_CODE" ] && type geoview &> /dev/null; then
|
2024-12-28 20:35:11 +08:00
|
|
|
|
get_geoip $GEOIP_CODE ipv4 | grep -E "(\.((2(5[0-5]|[0-4][0-9]))|[0-1]?[0-9]{1,2})){3}" | sed -e "s/^/add $IPSET_SHUNT &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
|
|
|
|
get_geoip $GEOIP_CODE ipv6 | grep -E "([A-Fa-f0-9]{1,4}::?){1,7}[A-Fa-f0-9]{1,4}" | sed -e "s/^/add $IPSET_SHUNT6 &/g" -e "s/$/ timeout 0/g" | ipset -! -R
|
2024-12-07 16:24:54 +08:00
|
|
|
|
echolog " - [$?]解析并加入[分流节点] GeoIP 到 IPSET 完成"
|
|
|
|
|
fi
|
2024-11-15 00:25:46 +08:00
|
|
|
|
}
|
2024-12-16 00:24:10 +08:00
|
|
|
|
|
|
|
|
|
ipset -! -R <<-EOF
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$(ip address show | grep -w "inet" | awk '{print $2}' | awk -F '/' '{print $1}' | sed -e "s/^/add $IPSET_LOCAL /")
|
2024-12-16 00:24:10 +08:00
|
|
|
|
EOF
|
|
|
|
|
|
|
|
|
|
ipset -! -R <<-EOF
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$(ip address show | grep -w "inet6" | awk '{print $2}' | awk -F '/' '{print $1}' | sed -e "s/^/add $IPSET_LOCAL6 /")
|
2024-12-16 00:24:10 +08:00
|
|
|
|
EOF
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
2024-12-07 16:24:54 +08:00
|
|
|
|
#局域网IP列表
|
2023-09-15 09:42:16 +08:00
|
|
|
|
ipset -! -R <<-EOF
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$(gen_lanlist | sed -e "s/^/add $IPSET_LAN /")
|
2023-09-15 09:42:16 +08:00
|
|
|
|
EOF
|
|
|
|
|
|
|
|
|
|
ipset -! -R <<-EOF
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$(gen_lanlist_6 | sed -e "s/^/add $IPSET_LAN6 /")
|
2023-09-15 09:42:16 +08:00
|
|
|
|
EOF
|
|
|
|
|
|
|
|
|
|
# 忽略特殊IP段
|
|
|
|
|
local lan_ifname lan_ip
|
|
|
|
|
lan_ifname=$(uci -q -p /tmp/state get network.lan.ifname)
|
|
|
|
|
[ -n "$lan_ifname" ] && {
|
|
|
|
|
lan_ip=$(ip address show $lan_ifname | grep -w "inet" | awk '{print $2}')
|
|
|
|
|
lan_ip6=$(ip address show $lan_ifname | grep -w "inet6" | awk '{print $2}')
|
|
|
|
|
#echolog "本机IPv4网段互访直连:${lan_ip}"
|
|
|
|
|
#echolog "本机IPv6网段互访直连:${lan_ip6}"
|
|
|
|
|
|
|
|
|
|
[ -n "$lan_ip" ] && ipset -! -R <<-EOF
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$(echo $lan_ip | sed -e "s/ /\n/g" | sed -e "s/^/add $IPSET_LAN /")
|
2023-09-15 09:42:16 +08:00
|
|
|
|
EOF
|
|
|
|
|
|
|
|
|
|
[ -n "$lan_ip6" ] && ipset -! -R <<-EOF
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$(echo $lan_ip6 | sed -e "s/ /\n/g" | sed -e "s/^/add $IPSET_LAN6 /")
|
2023-09-15 09:42:16 +08:00
|
|
|
|
EOF
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ -n "$ISP_DNS" ] && {
|
|
|
|
|
#echolog "处理 ISP DNS 例外..."
|
|
|
|
|
for ispip in $ISP_DNS; do
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -! add $IPSET_WHITE $ispip timeout 0
|
2024-03-05 09:10:25 +08:00
|
|
|
|
echolog " - [$?]追加ISP IPv4 DNS到白名单:${ispip}"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
done
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ -n "$ISP_DNS6" ] && {
|
|
|
|
|
#echolog "处理 ISP IPv6 DNS 例外..."
|
|
|
|
|
for ispip6 in $ISP_DNS6; do
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -! add $IPSET_WHITE6 $ispip6 timeout 0
|
2024-03-05 09:10:25 +08:00
|
|
|
|
echolog " - [$?]追加ISP IPv6 DNS到白名单:${ispip6}"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
done
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
# 过滤所有节点IP
|
|
|
|
|
filter_vpsip > /dev/null 2>&1 &
|
2024-09-05 20:36:23 +08:00
|
|
|
|
# filter_haproxy > /dev/null 2>&1 &
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
accept_icmp=$(config_t_get global_forwarding accept_icmp 0)
|
|
|
|
|
accept_icmpv6=$(config_t_get global_forwarding accept_icmpv6 0)
|
|
|
|
|
|
2025-01-02 04:20:24 +08:00
|
|
|
|
if [ "${TCP_PROXY_WAY}" = "redirect" ]; then
|
2023-09-15 09:42:16 +08:00
|
|
|
|
unset is_tproxy
|
2025-01-02 04:20:24 +08:00
|
|
|
|
elif [ "${TCP_PROXY_WAY}" = "tproxy" ]; then
|
2023-09-15 09:42:16 +08:00
|
|
|
|
is_tproxy="TPROXY"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
$ipt_n -N PSW
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ipt_n -A PSW $(dst $IPSET_LAN) -j RETURN
|
|
|
|
|
$ipt_n -A PSW $(dst $IPSET_VPS) -j RETURN
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
WAN_IP=$(get_wan_ip)
|
|
|
|
|
[ ! -z "${WAN_IP}" ] && $ipt_n -A PSW $(comment "WAN_IP_RETURN") -d "${WAN_IP}" -j RETURN
|
|
|
|
|
|
|
|
|
|
[ "$accept_icmp" = "1" ] && insert_rule_after "$ipt_n" "PREROUTING" "prerouting_rule" "-p icmp -j PSW"
|
|
|
|
|
[ -z "${is_tproxy}" ] && insert_rule_after "$ipt_n" "PREROUTING" "prerouting_rule" "-p tcp -j PSW"
|
|
|
|
|
|
|
|
|
|
$ipt_n -N PSW_OUTPUT
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ipt_n -A PSW_OUTPUT $(dst $IPSET_LAN) -j RETURN
|
|
|
|
|
$ipt_n -A PSW_OUTPUT $(dst $IPSET_VPS) -j RETURN
|
|
|
|
|
[ "${USE_DIRECT_LIST}" = "1" ] && $ipt_n -A PSW_OUTPUT $(dst $IPSET_WHITE) -j RETURN
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ipt_n -A PSW_OUTPUT -m mark --mark 0xff -j RETURN
|
|
|
|
|
|
2024-12-15 00:23:58 +08:00
|
|
|
|
$ipt_n -N PSW_DNS
|
2024-12-16 04:22:23 +08:00
|
|
|
|
if [ $(config_t_get global dns_redirect "1") = "0" ]; then
|
|
|
|
|
#Only hijack when dest address is local IP
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ipt_n -I PREROUTING $(dst $IPSET_LOCAL) -j PSW_DNS
|
2024-12-16 04:22:23 +08:00
|
|
|
|
else
|
|
|
|
|
$ipt_n -I PREROUTING 1 -j PSW_DNS
|
|
|
|
|
fi
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
$ipt_m -N PSW_DIVERT
|
|
|
|
|
$ipt_m -A PSW_DIVERT -j MARK --set-mark 1
|
|
|
|
|
$ipt_m -A PSW_DIVERT -j ACCEPT
|
|
|
|
|
|
|
|
|
|
$ipt_m -N PSW_RULE
|
|
|
|
|
$ipt_m -A PSW_RULE -j CONNMARK --restore-mark
|
|
|
|
|
$ipt_m -A PSW_RULE -m mark --mark 1 -j RETURN
|
|
|
|
|
$ipt_m -A PSW_RULE -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j MARK --set-xmark 1
|
|
|
|
|
$ipt_m -A PSW_RULE -p udp -m conntrack --ctstate NEW -j MARK --set-xmark 1
|
|
|
|
|
$ipt_m -A PSW_RULE -j CONNMARK --save-mark
|
|
|
|
|
|
|
|
|
|
$ipt_m -N PSW
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ipt_m -A PSW $(dst $IPSET_LAN) -j RETURN
|
|
|
|
|
$ipt_m -A PSW $(dst $IPSET_VPS) -j RETURN
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
2024-09-04 20:36:53 +08:00
|
|
|
|
[ ! -z "${WAN_IP}" ] && {
|
|
|
|
|
$ipt_m -A PSW $(comment "WAN_IP_RETURN") -d "${WAN_IP}" -j RETURN
|
|
|
|
|
echolog " - [$?]追加WAN IP到iptables:${WAN_IP}"
|
|
|
|
|
}
|
2023-09-15 09:42:16 +08:00
|
|
|
|
unset WAN_IP
|
|
|
|
|
|
|
|
|
|
insert_rule_before "$ipt_m" "PREROUTING" "mwan3" "-j PSW"
|
|
|
|
|
insert_rule_before "$ipt_m" "PREROUTING" "PSW" "-p tcp -m socket -j PSW_DIVERT"
|
|
|
|
|
|
|
|
|
|
$ipt_m -N PSW_OUTPUT
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ipt_m -A PSW_OUTPUT $(dst $IPSET_LAN) -j RETURN
|
|
|
|
|
$ipt_m -A PSW_OUTPUT $(dst $IPSET_VPS) -j RETURN
|
2024-08-08 04:19:17 +08:00
|
|
|
|
|
|
|
|
|
[ -n "$IPT_APPEND_DNS" ] && {
|
|
|
|
|
local local_dns dns_address dns_port
|
|
|
|
|
for local_dns in $(echo $IPT_APPEND_DNS | tr ',' ' '); do
|
|
|
|
|
dns_address=$(echo "$local_dns" | sed -E 's/(@|\[)?([0-9a-fA-F:.]+)(@|#|$).*/\2/')
|
|
|
|
|
dns_port=$(echo "$local_dns" | sed -nE 's/.*#([0-9]+)$/\1/p')
|
|
|
|
|
if echo "$dns_address" | grep -q -v ':'; then
|
2024-08-07 00:22:15 +08:00
|
|
|
|
$ipt_m -A PSW_OUTPUT -p udp -d ${dns_address} --dport ${dns_port:-53} -j RETURN
|
|
|
|
|
$ipt_m -A PSW_OUTPUT -p tcp -d ${dns_address} --dport ${dns_port:-53} -j RETURN
|
|
|
|
|
echolog " - [$?]追加直连DNS到iptables:${dns_address}:${dns_port:-53}"
|
2024-08-08 04:19:17 +08:00
|
|
|
|
else
|
|
|
|
|
$ip6t_m -A PSW_OUTPUT -p udp -d ${dns_address} --dport ${dns_port:-53} -j RETURN
|
|
|
|
|
$ip6t_m -A PSW_OUTPUT -p tcp -d ${dns_address} --dport ${dns_port:-53} -j RETURN
|
|
|
|
|
echolog " - [$?]追加直连DNS到iptables:[${dns_address}]:${dns_port:-53}"
|
2024-08-07 00:22:15 +08:00
|
|
|
|
fi
|
2024-03-05 09:10:25 +08:00
|
|
|
|
done
|
|
|
|
|
}
|
2024-08-08 04:19:17 +08:00
|
|
|
|
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_DIRECT_LIST}" = "1" ] && $ipt_m -A PSW_OUTPUT $(dst $IPSET_WHITE) -j RETURN
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ipt_m -A PSW_OUTPUT -m mark --mark 0xff -j RETURN
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_BLOCK_LIST}" = "1" ] && $ipt_m -A PSW_OUTPUT $(dst $IPSET_BLOCK) -j DROP
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
ip rule add fwmark 1 lookup 100
|
|
|
|
|
ip route add local 0.0.0.0/0 dev lo table 100
|
|
|
|
|
|
|
|
|
|
[ "$accept_icmpv6" = "1" ] && {
|
|
|
|
|
$ip6t_n -N PSW
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ip6t_n -A PSW $(dst $IPSET_LAN6) -j RETURN
|
|
|
|
|
$ip6t_n -A PSW $(dst $IPSET_VPS6) -j RETURN
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ip6t_n -A PREROUTING -p ipv6-icmp -j PSW
|
|
|
|
|
|
|
|
|
|
$ip6t_n -N PSW_OUTPUT
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ip6t_n -A PSW_OUTPUT $(dst $IPSET_LAN6) -j RETURN
|
|
|
|
|
$ip6t_n -A PSW_OUTPUT $(dst $IPSET_VPS6) -j RETURN
|
|
|
|
|
[ "${USE_DIRECT_LIST}" = "1" ] && $ip6t_n -A PSW_OUTPUT $(dst $IPSET_WHITE6) -j RETURN
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ip6t_n -A PSW_OUTPUT -m mark --mark 0xff -j RETURN
|
|
|
|
|
}
|
|
|
|
|
|
2024-12-15 00:23:58 +08:00
|
|
|
|
$ip6t_n -N PSW_DNS
|
2024-12-16 04:22:23 +08:00
|
|
|
|
if [ $(config_t_get global dns_redirect "1") = "0" ]; then
|
|
|
|
|
#Only hijack when dest address is local IP
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ip6t_n -I PREROUTING $(dst $IPSET_LOCAL6) -j PSW_DNS
|
2024-12-16 04:22:23 +08:00
|
|
|
|
else
|
|
|
|
|
$ip6t_n -I PREROUTING 1 -j PSW_DNS
|
|
|
|
|
fi
|
2024-12-13 00:27:41 +08:00
|
|
|
|
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ip6t_m -N PSW_DIVERT
|
|
|
|
|
$ip6t_m -A PSW_DIVERT -j MARK --set-mark 1
|
|
|
|
|
$ip6t_m -A PSW_DIVERT -j ACCEPT
|
|
|
|
|
|
|
|
|
|
$ip6t_m -N PSW_RULE
|
|
|
|
|
$ip6t_m -A PSW_RULE -j CONNMARK --restore-mark
|
|
|
|
|
$ip6t_m -A PSW_RULE -m mark --mark 1 -j RETURN
|
|
|
|
|
$ip6t_m -A PSW_RULE -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j MARK --set-xmark 1
|
|
|
|
|
$ip6t_m -A PSW_RULE -p udp -m conntrack --ctstate NEW -j MARK --set-xmark 1
|
|
|
|
|
$ip6t_m -A PSW_RULE -j CONNMARK --save-mark
|
|
|
|
|
|
|
|
|
|
$ip6t_m -N PSW
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ip6t_m -A PSW $(dst $IPSET_LAN6) -j RETURN
|
|
|
|
|
$ip6t_m -A PSW $(dst $IPSET_VPS6) -j RETURN
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
WAN6_IP=$(get_wan6_ip)
|
|
|
|
|
[ ! -z "${WAN6_IP}" ] && $ip6t_m -A PSW $(comment "WAN6_IP_RETURN") -d ${WAN6_IP} -j RETURN
|
|
|
|
|
unset WAN6_IP
|
|
|
|
|
|
|
|
|
|
insert_rule_before "$ip6t_m" "PREROUTING" "mwan3" "-j PSW"
|
|
|
|
|
insert_rule_before "$ip6t_m" "PREROUTING" "PSW" "-p tcp -m socket -j PSW_DIVERT"
|
|
|
|
|
|
|
|
|
|
$ip6t_m -N PSW_OUTPUT
|
|
|
|
|
$ip6t_m -A PSW_OUTPUT -m mark --mark 0xff -j RETURN
|
2024-12-23 20:38:23 +08:00
|
|
|
|
$ip6t_m -A PSW_OUTPUT $(dst $IPSET_LAN6) -j RETURN
|
|
|
|
|
$ip6t_m -A PSW_OUTPUT $(dst $IPSET_VPS6) -j RETURN
|
|
|
|
|
[ "${USE_DIRECT_LIST}" = "1" ] && $ip6t_m -A PSW_OUTPUT $(dst $IPSET_WHITE6) -j RETURN
|
|
|
|
|
[ "${USE_BLOCK_LIST}" = "1" ] && $ip6t_m -A PSW_OUTPUT $(dst $IPSET_BLOCK6) -j DROP
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
ip -6 rule add fwmark 1 table 100
|
|
|
|
|
ip -6 route add local ::/0 dev lo table 100
|
|
|
|
|
|
2024-12-19 16:28:00 +08:00
|
|
|
|
[ "$TCP_UDP" = "1" ] && [ -z "$UDP_NODE" ] && UDP_NODE=$TCP_NODE
|
2024-12-16 20:42:33 +08:00
|
|
|
|
|
2023-09-15 09:42:16 +08:00
|
|
|
|
[ "$ENABLED_DEFAULT_ACL" == 1 ] && {
|
2024-03-06 05:32:52 +08:00
|
|
|
|
local ipt_tmp=$ipt_n
|
2024-12-05 14:17:25 +08:00
|
|
|
|
if [ -n "${is_tproxy}" ]; then
|
|
|
|
|
ipt_tmp=$ipt_m
|
|
|
|
|
ipt_j="-j PSW_RULE"
|
|
|
|
|
else
|
|
|
|
|
ipt_j="$(REDIRECT $TCP_REDIR_PORT)"
|
|
|
|
|
fi
|
2024-03-06 05:32:52 +08:00
|
|
|
|
|
2024-03-12 04:20:49 +08:00
|
|
|
|
msg="【路由器本机】,"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
[ "$TCP_NO_REDIR_PORTS" != "disable" ] && {
|
|
|
|
|
$ipt_tmp -A PSW_OUTPUT -p tcp -m multiport --dport $TCP_NO_REDIR_PORTS -j RETURN
|
|
|
|
|
$ip6t_m -A PSW_OUTPUT -p tcp -m multiport --dport $TCP_NO_REDIR_PORTS -j RETURN
|
2024-03-12 04:20:49 +08:00
|
|
|
|
if [ "$TCP_NO_REDIR_PORTS" != "1:65535" ]; then
|
|
|
|
|
echolog " - ${msg}不代理 TCP 端口[${TCP_NO_REDIR_PORTS}]"
|
|
|
|
|
else
|
|
|
|
|
unset LOCALHOST_TCP_PROXY_MODE
|
|
|
|
|
echolog " - ${msg}不代理所有 TCP 端口"
|
|
|
|
|
fi
|
2024-03-06 05:32:52 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ "$UDP_NO_REDIR_PORTS" != "disable" ] && {
|
|
|
|
|
$ipt_m -A PSW_OUTPUT -p udp -m multiport --dport $UDP_NO_REDIR_PORTS -j RETURN
|
|
|
|
|
$ip6t_m -A PSW_OUTPUT -p udp -m multiport --dport $UDP_NO_REDIR_PORTS -j RETURN
|
2024-03-12 04:20:49 +08:00
|
|
|
|
if [ "$UDP_NO_REDIR_PORTS" != "1:65535" ]; then
|
|
|
|
|
echolog " - ${msg}不代理 UDP 端口[${UDP_NO_REDIR_PORTS}]"
|
|
|
|
|
else
|
|
|
|
|
unset LOCALHOST_UDP_PROXY_MODE
|
|
|
|
|
echolog " - ${msg}不代理所有 UDP 端口"
|
|
|
|
|
fi
|
|
|
|
|
}
|
2024-12-13 00:27:41 +08:00
|
|
|
|
|
2024-12-19 16:28:00 +08:00
|
|
|
|
if ([ -n "$TCP_NODE" ] && [ -n "${LOCALHOST_TCP_PROXY_MODE}" ]) || ([ -n "$UDP_NODE" ] && [ -n "${LOCALHOST_UDP_PROXY_MODE}" ]); then
|
2024-12-13 00:27:41 +08:00
|
|
|
|
[ -n "$DNS_REDIRECT_PORT" ] && {
|
2024-12-21 04:21:05 +08:00
|
|
|
|
$ipt_n -A OUTPUT $(comment "PSW_DNS") -p udp -o lo --dport 53 -j REDIRECT --to-ports $DNS_REDIRECT_PORT
|
|
|
|
|
$ip6t_n -A OUTPUT $(comment "PSW_DNS") -p udp -o lo --dport 53 -j REDIRECT --to-ports $DNS_REDIRECT_PORT 2>/dev/null
|
|
|
|
|
$ipt_n -A OUTPUT $(comment "PSW_DNS") -p tcp -o lo --dport 53 -j REDIRECT --to-ports $DNS_REDIRECT_PORT
|
|
|
|
|
$ip6t_n -A OUTPUT $(comment "PSW_DNS") -p tcp -o lo --dport 53 -j REDIRECT --to-ports $DNS_REDIRECT_PORT 2>/dev/null
|
2024-12-13 00:27:41 +08:00
|
|
|
|
}
|
|
|
|
|
fi
|
|
|
|
|
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ -n "${LOCALHOST_TCP_PROXY_MODE}" -o -n "${LOCALHOST_UDP_PROXY_MODE}" ] && {
|
|
|
|
|
[ "$TCP_PROXY_DROP_PORTS" != "disable" ] && {
|
|
|
|
|
$ipt_m -A PSW_OUTPUT -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") -d $FAKE_IP -j DROP
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_m -A PSW_OUTPUT -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_BLACK) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_m -A PSW_OUTPUT -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_GFW) -j DROP
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_m -A PSW_OUTPUT -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST} "-j DROP")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ipt_m -A PSW_OUTPUT -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${LOCALHOST_TCP_PROXY_MODE}" != "disable" ] && $ipt_m -A PSW_OUTPUT -p tcp $(factor $TCP_PROXY_DROP_PORTS "-m multiport --dport") -j DROP
|
|
|
|
|
echolog " - ${msg}屏蔽代理 TCP 端口[${TCP_PROXY_DROP_PORTS}]"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ "$UDP_PROXY_DROP_PORTS" != "disable" ] && {
|
|
|
|
|
$ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") -d $FAKE_IP -j DROP
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_BLACK) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_GFW) -j DROP
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST} "-j DROP")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_UDP}" = "1" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT) -j DROP
|
2024-03-12 04:20:49 +08:00
|
|
|
|
[ "${LOCALHOST_UDP_PROXY_MODE}" != "disable" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_PROXY_DROP_PORTS "-m multiport --dport") -j DROP
|
|
|
|
|
echolog " - ${msg}屏蔽代理 UDP 端口[${UDP_PROXY_DROP_PORTS}]"
|
|
|
|
|
}
|
2024-03-06 05:32:52 +08:00
|
|
|
|
}
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
# 加载路由器自身代理 TCP
|
2024-12-19 16:28:00 +08:00
|
|
|
|
if [ -n "$TCP_NODE" ]; then
|
2024-03-06 05:32:52 +08:00
|
|
|
|
_proxy_tcp_access() {
|
|
|
|
|
[ -n "${2}" ] || return 0
|
2024-09-03 04:20:25 +08:00
|
|
|
|
if echo "${2}" | grep -q -v ':'; then
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -q test $IPSET_LAN ${2}
|
2024-09-03 04:20:25 +08:00
|
|
|
|
[ $? -eq 0 ] && {
|
|
|
|
|
echolog " - 上游 DNS 服务器 ${2} 已在直接访问的列表中,不强制向 TCP 代理转发对该服务器 TCP/${3} 端口的访问"
|
|
|
|
|
return 0
|
|
|
|
|
}
|
|
|
|
|
if [ -z "${is_tproxy}" ]; then
|
|
|
|
|
$ipt_n -I PSW_OUTPUT -p tcp -d ${2} --dport ${3} $(REDIRECT $TCP_REDIR_PORT)
|
|
|
|
|
else
|
|
|
|
|
$ipt_m -I PSW_OUTPUT -p tcp -d ${2} --dport ${3} -j PSW_RULE
|
|
|
|
|
$ipt_m -I PSW $(comment "本机") -p tcp -i lo -d ${2} --dport ${3} $(REDIRECT $TCP_REDIR_PORT TPROXY)
|
|
|
|
|
fi
|
|
|
|
|
echolog " - [$?]将上游 DNS 服务器 ${2}:${3} 加入到路由器自身代理的 TCP 转发链"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
else
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -q test $IPSET_LAN6 ${2}
|
2024-09-03 04:20:25 +08:00
|
|
|
|
[ $? -eq 0 ] && {
|
|
|
|
|
echolog " - 上游 DNS 服务器 ${2} 已在直接访问的列表中,不强制向 TCP 代理转发对该服务器 TCP/${3} 端口的访问"
|
|
|
|
|
return 0
|
|
|
|
|
}
|
|
|
|
|
$ip6t_m -I PSW_OUTPUT -p tcp -d ${2} --dport ${3} -j PSW_RULE
|
|
|
|
|
$ip6t_m -I PSW $(comment "本机") -p tcp -i lo -d ${2} --dport ${3} $(REDIRECT $TCP_REDIR_PORT TPROXY)
|
|
|
|
|
echolog " - [$?]将上游 DNS 服务器 [${2}]:${3} 加入到路由器自身代理的 TCP 转发链,请确保您的节点支持IPv6,并开启IPv6透明代理!"
|
2024-03-06 05:32:52 +08:00
|
|
|
|
fi
|
|
|
|
|
}
|
2025-01-02 04:20:24 +08:00
|
|
|
|
[ -n "${TCP_PROXY_DNS}" ] && hosts_foreach REMOTE_DNS _proxy_tcp_access 53
|
2024-03-06 05:32:52 +08:00
|
|
|
|
|
2023-09-15 09:42:16 +08:00
|
|
|
|
[ "$accept_icmp" = "1" ] && {
|
|
|
|
|
$ipt_n -A OUTPUT -p icmp -j PSW_OUTPUT
|
|
|
|
|
$ipt_n -A PSW_OUTPUT -p icmp -d $FAKE_IP $(REDIRECT)
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_n -A PSW_OUTPUT -p icmp $(dst $IPSET_BLACK) $(REDIRECT)
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_n -A PSW_OUTPUT -p icmp $(dst $IPSET_GFW) $(REDIRECT)
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_n -A PSW_OUTPUT -p icmp $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST})
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ipt_n -A PSW_OUTPUT -p icmp $(dst $IPSET_SHUNT) $(REDIRECT)
|
2024-03-06 05:32:52 +08:00
|
|
|
|
[ -n "${LOCALHOST_TCP_PROXY_MODE}" ] && [ "${LOCALHOST_TCP_PROXY_MODE}" != "disable" ] && $ipt_n -A PSW_OUTPUT -p icmp $(REDIRECT)
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
[ "$accept_icmpv6" = "1" ] && {
|
|
|
|
|
$ip6t_n -A OUTPUT -p ipv6-icmp -j PSW_OUTPUT
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ip6t_n -A PSW_OUTPUT -p ipv6-icmp $(dst $IPSET_BLACK6) $(REDIRECT)
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ip6t_n -A PSW_OUTPUT -p ipv6-icmp $(dst $IPSET_GFW6) $(REDIRECT)
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ip6t_n -A PSW_OUTPUT -p ipv6-icmp $(dst $IPSET_CHN6) $(get_jump_ipt ${CHN_LIST})
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ip6t_n -A PSW_OUTPUT -p ipv6-icmp $(dst $IPSET_SHUNT6) $(REDIRECT)
|
2024-03-06 05:32:52 +08:00
|
|
|
|
[ -n "${LOCALHOST_TCP_PROXY_MODE}" ] && [ "${LOCALHOST_TCP_PROXY_MODE}" != "disable" ] && $ip6t_n -A PSW_OUTPUT -p ipv6-icmp $(REDIRECT)
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
|
2024-12-05 14:17:25 +08:00
|
|
|
|
[ -n "${LOCALHOST_TCP_PROXY_MODE}" ] && {
|
|
|
|
|
$ipt_tmp -A PSW_OUTPUT -p tcp -d $FAKE_IP ${ipt_j}
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_tmp -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_BLACK) ${ipt_j}
|
2024-12-05 14:17:25 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_tmp -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_GFW) ${ipt_j}
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_tmp -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST} "${ipt_j}")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ipt_tmp -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT) ${ipt_j}
|
2024-12-05 14:17:25 +08:00
|
|
|
|
[ "${LOCALHOST_TCP_PROXY_MODE}" != "disable" ] && $ipt_tmp -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") ${ipt_j}
|
|
|
|
|
[ -n "${is_tproxy}" ] && $ipt_m -A PSW $(comment "本机") -p tcp -i lo $(REDIRECT $TCP_REDIR_PORT TPROXY)
|
|
|
|
|
}
|
|
|
|
|
[ -z "${is_tproxy}" ] && $ipt_n -A OUTPUT -p tcp -j PSW_OUTPUT
|
|
|
|
|
[ -n "${is_tproxy}" ] && {
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ipt_m -A PSW $(comment "本机") -p tcp -i lo -j RETURN
|
|
|
|
|
insert_rule_before "$ipt_m" "OUTPUT" "mwan3" "$(comment mangle-OUTPUT-PSW) -p tcp -j PSW_OUTPUT"
|
2024-12-05 14:17:25 +08:00
|
|
|
|
}
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ -n "${LOCALHOST_TCP_PROXY_MODE}" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ip6t_m -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_BLACK6) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ip6t_m -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_GFW6) -j PSW_RULE
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ip6t_m -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${CHN_LIST} "-j PSW_RULE")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_TCP}" = "1" ] && $ip6t_m -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT6) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${LOCALHOST_TCP_PROXY_MODE}" != "disable" ] && $ip6t_m -A PSW_OUTPUT -p tcp $(factor $TCP_REDIR_PORTS "-m multiport --dport") -j PSW_RULE
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ip6t_m -A PSW $(comment "本机") -p tcp -i lo $(REDIRECT $TCP_REDIR_PORT TPROXY)
|
|
|
|
|
}
|
|
|
|
|
$ip6t_m -A PSW $(comment "本机") -p tcp -i lo -j RETURN
|
|
|
|
|
insert_rule_before "$ip6t_m" "OUTPUT" "mwan3" "$(comment mangle-OUTPUT-PSW) -p tcp -j PSW_OUTPUT"
|
|
|
|
|
}
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
# 加载路由器自身代理 UDP
|
2024-12-19 16:28:00 +08:00
|
|
|
|
if [ -n "$UDP_NODE" -o "$TCP_UDP" = "1" ]; then
|
2023-09-15 09:42:16 +08:00
|
|
|
|
_proxy_udp_access() {
|
|
|
|
|
[ -n "${2}" ] || return 0
|
2024-09-03 04:20:25 +08:00
|
|
|
|
if echo "${2}" | grep -q -v ':'; then
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -q test $IPSET_LAN ${2}
|
2024-09-03 04:20:25 +08:00
|
|
|
|
[ $? == 0 ] && {
|
|
|
|
|
echolog " - 上游 DNS 服务器 ${2} 已在直接访问的列表中,不强制向 UDP 代理转发对该服务器 UDP/${3} 端口的访问"
|
|
|
|
|
return 0
|
|
|
|
|
}
|
|
|
|
|
$ipt_m -I PSW_OUTPUT -p udp -d ${2} --dport ${3} -j PSW_RULE
|
|
|
|
|
$ipt_m -I PSW $(comment "本机") -p udp -i lo -d ${2} --dport ${3} $(REDIRECT $UDP_REDIR_PORT TPROXY)
|
|
|
|
|
echolog " - [$?]将上游 DNS 服务器 ${2}:${3} 加入到路由器自身代理的 UDP 转发链"
|
|
|
|
|
else
|
2024-12-23 20:38:23 +08:00
|
|
|
|
ipset -q test $IPSET_LAN6 ${2}
|
2024-09-03 04:20:25 +08:00
|
|
|
|
[ $? == 0 ] && {
|
|
|
|
|
echolog " - 上游 DNS 服务器 ${2} 已在直接访问的列表中,不强制向 UDP 代理转发对该服务器 UDP/${3} 端口的访问"
|
|
|
|
|
return 0
|
|
|
|
|
}
|
|
|
|
|
$ip6t_m -I PSW_OUTPUT -p udp -d ${2} --dport ${3} -j PSW_RULE
|
|
|
|
|
$ip6t_m -I PSW $(comment "本机") -p udp -i lo -d ${2} --dport ${3} $(REDIRECT $UDP_REDIR_PORT TPROXY)
|
|
|
|
|
echolog " - [$?]将上游 DNS 服务器 [${2}]:${3} 加入到路由器自身代理的 UDP 转发链,请确保您的节点支持IPv6,并开启IPv6透明代理!"
|
|
|
|
|
fi
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
2025-01-02 04:20:24 +08:00
|
|
|
|
[ -n "${UDP_PROXY_DNS}" ] && hosts_foreach REMOTE_DNS _proxy_udp_access 53
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ -n "${LOCALHOST_UDP_PROXY_MODE}" ] && {
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ipt_m -A PSW_OUTPUT -p udp -d $FAKE_IP -j PSW_RULE
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_BLACK) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_GFW) -j PSW_RULE
|
2024-02-24 00:20:21 +08:00
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_CHN) $(get_jump_ipt ${CHN_LIST} "-j PSW_RULE")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_UDP}" = "1" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${LOCALHOST_UDP_PROXY_MODE}" != "disable" ] && $ipt_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") -j PSW_RULE
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ipt_m -A PSW $(comment "本机") -p udp -i lo $(REDIRECT $UDP_REDIR_PORT TPROXY)
|
|
|
|
|
}
|
|
|
|
|
$ipt_m -A PSW $(comment "本机") -p udp -i lo -j RETURN
|
|
|
|
|
insert_rule_before "$ipt_m" "OUTPUT" "mwan3" "$(comment mangle-OUTPUT-PSW) -p udp -j PSW_OUTPUT"
|
|
|
|
|
|
2025-01-02 04:20:24 +08:00
|
|
|
|
[ "$PROXY_IPV6" == "1" ] && {
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ -n "$LOCALHOST_UDP_PROXY_MODE" ] && {
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_PROXY_LIST}" = "1" ] && $ip6t_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_BLACK6) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${USE_GFW_LIST}" = "1" ] && $ip6t_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_GFW6) -j PSW_RULE
|
|
|
|
|
[ "${CHN_LIST}" != "0" ] && $ip6t_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_CHN6) $(get_jump_ipt ${CHN_LIST} "-j PSW_RULE")
|
2024-12-23 20:38:23 +08:00
|
|
|
|
[ "${USE_SHUNT_UDP}" = "1" ] && $ip6t_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") $(dst $IPSET_SHUNT6) -j PSW_RULE
|
2024-02-19 16:13:47 +08:00
|
|
|
|
[ "${LOCALHOST_UDP_PROXY_MODE}" != "disable" ] && $ip6t_m -A PSW_OUTPUT -p udp $(factor $UDP_REDIR_PORTS "-m multiport --dport") -j PSW_RULE
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ip6t_m -A PSW $(comment "本机") -p udp -i lo $(REDIRECT $UDP_REDIR_PORT TPROXY)
|
|
|
|
|
}
|
|
|
|
|
$ip6t_m -A PSW $(comment "本机") -p udp -i lo -j RETURN
|
|
|
|
|
insert_rule_before "$ip6t_m" "OUTPUT" "mwan3" "$(comment mangle-OUTPUT-PSW) -p udp -j PSW_OUTPUT"
|
|
|
|
|
}
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
$ipt_m -I OUTPUT $(comment "mangle-OUTPUT-PSW") -o lo -j RETURN
|
|
|
|
|
insert_rule_before "$ipt_m" "OUTPUT" "mwan3" "$(comment mangle-OUTPUT-PSW) -m mark --mark 1 -j RETURN"
|
|
|
|
|
|
|
|
|
|
$ip6t_m -I OUTPUT $(comment "mangle-OUTPUT-PSW") -o lo -j RETURN
|
|
|
|
|
insert_rule_before "$ip6t_m" "OUTPUT" "mwan3" "$(comment mangle-OUTPUT-PSW) -m mark --mark 1 -j RETURN"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
# 加载ACLS
|
|
|
|
|
load_acl
|
2024-04-25 04:16:58 +08:00
|
|
|
|
|
2024-12-16 20:42:33 +08:00
|
|
|
|
[ -d "${TMP_IFACE_PATH}" ] && {
|
|
|
|
|
for iface in $(ls ${TMP_IFACE_PATH}); do
|
|
|
|
|
$ipt_n -I PSW_OUTPUT -o $iface -j RETURN
|
|
|
|
|
$ipt_m -I PSW_OUTPUT -o $iface -j RETURN
|
|
|
|
|
done
|
|
|
|
|
}
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
2024-04-25 04:16:58 +08:00
|
|
|
|
$ipt_n -I PREROUTING $(comment "PSW") -m mark --mark 1 -j RETURN
|
|
|
|
|
$ip6t_n -I PREROUTING $(comment "PSW") -m mark --mark 1 -j RETURN
|
|
|
|
|
|
2024-12-25 00:23:28 +08:00
|
|
|
|
filter_direct_node_list > /dev/null 2>&1 &
|
|
|
|
|
|
2023-09-15 09:42:16 +08:00
|
|
|
|
echolog "防火墙规则加载完成!"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
del_firewall_rule() {
|
2025-01-07 12:23:27 +08:00
|
|
|
|
# 10秒内禁止重复运行
|
|
|
|
|
local time_file="/tmp/etc/passwall_tmp/del_fw_rule_time"
|
|
|
|
|
local current_time=$(date +%s)
|
|
|
|
|
if [ -f "$time_file" ]; then
|
|
|
|
|
local last_time=$(head -n 1 "$time_file" 2>/dev/null | tr -d ' \t' | grep -E '^[0-9]+$' || echo 0)
|
|
|
|
|
[ $((current_time - last_time)) -le 10 ] && return 0
|
|
|
|
|
fi
|
|
|
|
|
echo "$current_time" > "$time_file"
|
|
|
|
|
|
2023-09-15 09:42:16 +08:00
|
|
|
|
for ipt in "$ipt_n" "$ipt_m" "$ip6t_n" "$ip6t_m"; do
|
|
|
|
|
for chain in "PREROUTING" "OUTPUT"; do
|
|
|
|
|
for i in $(seq 1 $($ipt -nL $chain | grep -c PSW)); do
|
|
|
|
|
local index=$($ipt --line-number -nL $chain | grep PSW | head -1 | awk '{print $1}')
|
|
|
|
|
$ipt -D $chain $index 2>/dev/null
|
|
|
|
|
done
|
|
|
|
|
done
|
2024-12-15 00:23:58 +08:00
|
|
|
|
for chain in "PSW" "PSW_OUTPUT" "PSW_DIVERT" "PSW_DNS" "PSW_RULE"; do
|
2023-09-15 09:42:16 +08:00
|
|
|
|
$ipt -F $chain 2>/dev/null
|
|
|
|
|
$ipt -X $chain 2>/dev/null
|
|
|
|
|
done
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
ip rule del fwmark 1 lookup 100 2>/dev/null
|
|
|
|
|
ip route del local 0.0.0.0/0 dev lo table 100 2>/dev/null
|
|
|
|
|
|
|
|
|
|
ip -6 rule del fwmark 1 table 100 2>/dev/null
|
|
|
|
|
ip -6 route del local ::/0 dev lo table 100 2>/dev/null
|
|
|
|
|
|
2024-12-23 20:38:23 +08:00
|
|
|
|
destroy_ipset $IPSET_LOCAL
|
|
|
|
|
destroy_ipset $IPSET_LAN
|
|
|
|
|
destroy_ipset $IPSET_VPS
|
|
|
|
|
destroy_ipset $IPSET_SHUNT
|
2023-09-15 09:42:16 +08:00
|
|
|
|
#destroy_ipset $IPSET_GFW
|
|
|
|
|
#destroy_ipset $IPSET_CHN
|
2024-12-23 20:38:23 +08:00
|
|
|
|
#destroy_ipset $IPSET_BLACK
|
|
|
|
|
destroy_ipset $IPSET_BLOCK
|
|
|
|
|
destroy_ipset $IPSET_WHITE
|
|
|
|
|
|
|
|
|
|
destroy_ipset $IPSET_LOCAL6
|
|
|
|
|
destroy_ipset $IPSET_LAN6
|
|
|
|
|
destroy_ipset $IPSET_VPS6
|
|
|
|
|
destroy_ipset $IPSET_SHUNT6
|
2023-09-15 09:42:16 +08:00
|
|
|
|
#destroy_ipset $IPSET_GFW6
|
|
|
|
|
#destroy_ipset $IPSET_CHN6
|
2024-12-23 20:38:23 +08:00
|
|
|
|
#destroy_ipset $IPSET_BLACK6
|
|
|
|
|
destroy_ipset $IPSET_BLOCK6
|
|
|
|
|
destroy_ipset $IPSET_WHITE6
|
2023-09-15 09:42:16 +08:00
|
|
|
|
|
2024-04-08 04:15:29 +08:00
|
|
|
|
$DIR/app.sh echolog "删除iptables防火墙规则完成。"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
flush_ipset() {
|
2024-04-01 20:31:43 +08:00
|
|
|
|
$DIR/app.sh echolog "清空 IPSET。"
|
2023-09-15 09:42:16 +08:00
|
|
|
|
for _name in $(ipset list | grep "Name: " | grep "passwall_" | awk '{print $2}'); do
|
|
|
|
|
destroy_ipset ${_name}
|
|
|
|
|
done
|
2024-04-01 20:31:43 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
flush_ipset_reload() {
|
|
|
|
|
del_firewall_rule
|
|
|
|
|
flush_ipset
|
2024-12-23 04:19:39 +08:00
|
|
|
|
rm -rf /tmp/etc/passwall_tmp/singbox*
|
2024-11-20 14:16:06 +08:00
|
|
|
|
rm -rf /tmp/etc/passwall_tmp/smartdns*
|
2023-09-15 09:42:16 +08:00
|
|
|
|
rm -rf /tmp/etc/passwall_tmp/dnsmasq*
|
|
|
|
|
/etc/init.d/passwall reload
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
flush_include() {
|
|
|
|
|
echo '#!/bin/sh' >$FWI
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
gen_include() {
|
|
|
|
|
flush_include
|
|
|
|
|
extract_rules() {
|
|
|
|
|
local _ipt="${ipt}"
|
|
|
|
|
[ "$1" == "6" ] && _ipt="${ip6t}"
|
|
|
|
|
[ -z "${_ipt}" ] && return
|
|
|
|
|
|
|
|
|
|
echo "*$2"
|
|
|
|
|
${_ipt}-save -t $2 | grep "PSW" | grep -v "\-j PSW$" | grep -v "mangle\-OUTPUT\-PSW" | grep -v "socket \-j PSW_DIVERT$" | sed -e "s/^-A \(OUTPUT\|PREROUTING\)/-I \1 1/"
|
|
|
|
|
echo 'COMMIT'
|
|
|
|
|
}
|
|
|
|
|
local __ipt=""
|
|
|
|
|
[ -n "${ipt}" ] && {
|
|
|
|
|
__ipt=$(cat <<- EOF
|
|
|
|
|
mangle_output_psw=\$(${ipt}-save -t mangle | grep "PSW" | grep "mangle\-OUTPUT\-PSW" | sed "s#-A OUTPUT ##g")
|
|
|
|
|
$ipt-save -c | grep -v "PSW" | $ipt-restore -c
|
|
|
|
|
$ipt-restore -n <<-EOT
|
|
|
|
|
$(extract_rules 4 nat)
|
|
|
|
|
$(extract_rules 4 mangle)
|
|
|
|
|
EOT
|
|
|
|
|
|
|
|
|
|
echo "\${mangle_output_psw}" | while read line; do
|
|
|
|
|
\$(${MY_PATH} insert_rule_before "$ipt_m" "OUTPUT" "mwan3" "\${line}")
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
[ "$accept_icmp" = "1" ] && \$(${MY_PATH} insert_rule_after "$ipt_n" "PREROUTING" "prerouting_rule" "-p icmp -j PSW")
|
|
|
|
|
[ -z "${is_tproxy}" ] && \$(${MY_PATH} insert_rule_after "$ipt_n" "PREROUTING" "prerouting_rule" "-p tcp -j PSW")
|
|
|
|
|
|
|
|
|
|
\$(${MY_PATH} insert_rule_before "$ipt_m" "PREROUTING" "mwan3" "-j PSW")
|
|
|
|
|
\$(${MY_PATH} insert_rule_before "$ipt_m" "PREROUTING" "PSW" "-p tcp -m socket -j PSW_DIVERT")
|
|
|
|
|
|
|
|
|
|
WAN_IP=\$(${MY_PATH} get_wan_ip)
|
|
|
|
|
|
|
|
|
|
PR_INDEX=\$(${MY_PATH} RULE_LAST_INDEX "$ipt_n" PSW WAN_IP_RETURN -1)
|
|
|
|
|
if [ \$PR_INDEX -ge 0 ]; then
|
|
|
|
|
[ ! -z "\${WAN_IP}" ] && $ipt_n -R PSW \$PR_INDEX $(comment "WAN_IP_RETURN") -d "\${WAN_IP}" -j RETURN
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
PR_INDEX=\$(${MY_PATH} RULE_LAST_INDEX "$ipt_m" PSW WAN_IP_RETURN -1)
|
|
|
|
|
if [ \$PR_INDEX -ge 0 ]; then
|
|
|
|
|
[ ! -z "\${WAN_IP}" ] && $ipt_m -R PSW \$PR_INDEX $(comment "WAN_IP_RETURN") -d "\${WAN_IP}" -j RETURN
|
|
|
|
|
fi
|
|
|
|
|
EOF
|
|
|
|
|
)
|
|
|
|
|
}
|
|
|
|
|
local __ip6t=""
|
|
|
|
|
[ -n "${ip6t}" ] && {
|
|
|
|
|
__ip6t=$(cat <<- EOF
|
|
|
|
|
mangle_output_psw=\$(${ip6t}-save -t mangle | grep "PSW" | grep "mangle\-OUTPUT\-PSW" | sed "s#-A OUTPUT ##g")
|
|
|
|
|
$ip6t-save -c | grep -v "PSW" | $ip6t-restore -c
|
|
|
|
|
$ip6t-restore -n <<-EOT
|
|
|
|
|
$(extract_rules 6 nat)
|
|
|
|
|
$(extract_rules 6 mangle)
|
|
|
|
|
EOT
|
|
|
|
|
|
|
|
|
|
echo "\${mangle_output_psw}" | while read line; do
|
|
|
|
|
\$(${MY_PATH} insert_rule_before "$ip6t_m" "OUTPUT" "mwan3" "\${line}")
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
[ "$accept_icmpv6" = "1" ] && $ip6t_n -A PREROUTING -p ipv6-icmp -j PSW
|
|
|
|
|
|
|
|
|
|
\$(${MY_PATH} insert_rule_before "$ip6t_m" "PREROUTING" "mwan3" "-j PSW")
|
|
|
|
|
\$(${MY_PATH} insert_rule_before "$ip6t_m" "PREROUTING" "PSW" "-p tcp -m socket -j PSW_DIVERT")
|
|
|
|
|
|
|
|
|
|
PR_INDEX=\$(${MY_PATH} RULE_LAST_INDEX "$ip6t_m" PSW WAN6_IP_RETURN -1)
|
|
|
|
|
if [ \$PR_INDEX -ge 0 ]; then
|
|
|
|
|
WAN6_IP=\$(${MY_PATH} get_wan6_ip)
|
|
|
|
|
[ ! -z "\${WAN6_IP}" ] && $ip6t_m -R PSW \$PR_INDEX $(comment "WAN6_IP_RETURN") -d "\${WAN6_IP}" -j RETURN
|
|
|
|
|
fi
|
|
|
|
|
EOF
|
|
|
|
|
)
|
|
|
|
|
}
|
|
|
|
|
cat <<-EOF >> $FWI
|
|
|
|
|
${__ipt}
|
|
|
|
|
|
|
|
|
|
${__ip6t}
|
|
|
|
|
EOF
|
|
|
|
|
return 0
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
get_ipt_bin() {
|
|
|
|
|
echo $ipt
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
get_ip6t_bin() {
|
|
|
|
|
echo $ip6t
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
start() {
|
|
|
|
|
[ "$ENABLED_DEFAULT_ACL" == 0 -a "$ENABLED_ACLS" == 0 ] && return
|
|
|
|
|
add_firewall_rule
|
|
|
|
|
gen_include
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
stop() {
|
|
|
|
|
del_firewall_rule
|
|
|
|
|
flush_include
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
arg1=$1
|
|
|
|
|
shift
|
|
|
|
|
case $arg1 in
|
|
|
|
|
RULE_LAST_INDEX)
|
|
|
|
|
RULE_LAST_INDEX "$@"
|
|
|
|
|
;;
|
|
|
|
|
insert_rule_before)
|
|
|
|
|
insert_rule_before "$@"
|
|
|
|
|
;;
|
|
|
|
|
insert_rule_after)
|
|
|
|
|
insert_rule_after "$@"
|
|
|
|
|
;;
|
|
|
|
|
flush_ipset)
|
|
|
|
|
flush_ipset
|
|
|
|
|
;;
|
2024-04-01 20:31:43 +08:00
|
|
|
|
flush_ipset_reload)
|
|
|
|
|
flush_ipset_reload
|
|
|
|
|
;;
|
2023-09-15 09:42:16 +08:00
|
|
|
|
get_ipt_bin)
|
|
|
|
|
get_ipt_bin
|
|
|
|
|
;;
|
|
|
|
|
get_ip6t_bin)
|
|
|
|
|
get_ip6t_bin
|
|
|
|
|
;;
|
|
|
|
|
get_wan_ip)
|
|
|
|
|
get_wan_ip
|
|
|
|
|
;;
|
|
|
|
|
get_wan6_ip)
|
|
|
|
|
get_wan6_ip
|
|
|
|
|
;;
|
2024-12-16 20:42:33 +08:00
|
|
|
|
filter_direct_node_list)
|
|
|
|
|
filter_direct_node_list
|
|
|
|
|
;;
|
2023-09-15 09:42:16 +08:00
|
|
|
|
stop)
|
|
|
|
|
stop
|
|
|
|
|
;;
|
|
|
|
|
start)
|
|
|
|
|
start
|
|
|
|
|
;;
|
|
|
|
|
*) ;;
|
|
|
|
|
esac
|