mirror of https://github.com/bol-van/zapret/
22 changed files with 216 additions and 222 deletions
@ -0,0 +1,35 @@ |
|||||
|
# this custom script demonstrates how to apply tpws to http and nfqws to https and quic |
||||
|
# it's desired that inherited basic rules are low priority to allow specializations and exceptions in other custom scripts |
||||
|
|
||||
|
nfqws_tpws_inheritor() |
||||
|
{ |
||||
|
# $1 - inherited function |
||||
|
# $2 - 1 - run, 0 - stop |
||||
|
|
||||
|
[ "$MODE_HTTP" = "1" ] && { |
||||
|
MODE_OVERRIDE=tpws MODE_HTTPS=0 MODE_QUIC=0 $1 $2 |
||||
|
} |
||||
|
|
||||
|
[ "$MODE_HTTPS" = "1" -o "$MODE_QUIC" = "1" ] && { |
||||
|
MODE_OVERRIDE=nfqws MODE_HTTP=0 $1 $2 |
||||
|
} |
||||
|
} |
||||
|
|
||||
|
zapret_custom_daemons() |
||||
|
{ |
||||
|
# stop logic is managed by procd |
||||
|
|
||||
|
nfqws_tpws_inheritor start_daemons_procd |
||||
|
} |
||||
|
zapret_custom_firewall() |
||||
|
{ |
||||
|
# $1 - 1 - run, 0 - stop |
||||
|
|
||||
|
nfqws_tpws_inheritor zapret_do_firewall_rules_ipt $1 |
||||
|
} |
||||
|
zapret_custom_firewall_nft() |
||||
|
{ |
||||
|
# stop logic is not required |
||||
|
|
||||
|
nfqws_tpws_inheritor zapret_apply_firewall_rules_nft |
||||
|
} |
File diff suppressed because one or more lines are too long
@ -1,71 +0,0 @@ |
|||||
# this custom script demonstrates how to apply tpws to http and nfqws to https |
|
||||
# it preserves config settings : MODE_HTTP, MODE_HTTPS, MODE_FILTER, TPWS_OPT, NFQWS_OPT_DESYNC, NFQWS_OPT_DESYNC_HTTPS |
|
||||
|
|
||||
zapret_custom_daemons() |
|
||||
{ |
|
||||
# $1 - 1 - run, 0 - stop |
|
||||
|
|
||||
local opt |
|
||||
|
|
||||
[ "$MODE_HTTP" = "1" ] && { |
|
||||
opt="--port=$TPPORT $TPWS_OPT" |
|
||||
filter_apply_hostlist_target opt |
|
||||
filter_apply_suffix opt "$TPWS_OPT_SUFFIX" |
|
||||
run_tpws 1 "$opt" |
|
||||
} |
|
||||
|
|
||||
[ "$MODE_HTTPS" = "1" ] && { |
|
||||
opt="--qnum=$QNUM $NFQWS_OPT_DESYNC_HTTPS" |
|
||||
filter_apply_hostlist_target opt |
|
||||
filter_apply_suffix opt "$NFQWS_OPT_DESYNC_HTTPS_SUFFIX" |
|
||||
run_daemon 2 $NFQWS "$opt" |
|
||||
} |
|
||||
} |
|
||||
zapret_custom_firewall() |
|
||||
{ |
|
||||
# $1 - 1 - run, 0 - stop |
|
||||
|
|
||||
local f4 f6 |
|
||||
local first_packet_only="$ipt_connbytes 1:$(first_packets_for_mode)" |
|
||||
local desync="-m mark ! --mark $DESYNC_MARK/$DESYNC_MARK" |
|
||||
|
|
||||
[ "$MODE_HTTP" = "1" ] && { |
|
||||
f4="-p tcp -m multiport --dports $HTTP_PORTS_IPT" |
|
||||
f6=$f4 |
|
||||
filter_apply_ipset_target f4 f6 |
|
||||
fw_tpws $1 "$f4" "$f6" $TPPORT |
|
||||
} |
|
||||
|
|
||||
[ "$MODE_HTTPS" = "1" ] && { |
|
||||
f4="-p tcp -m multiport --dports $HTTPS_PORTS_IPT $first_packet_only" |
|
||||
f6=$f4 |
|
||||
filter_apply_ipset_target f4 f6 |
|
||||
fw_nfqws_post $1 "$f4 $desync" "$f6 $desync" $QNUM |
|
||||
# for modes that require incoming traffic |
|
||||
fw_reverse_nfqws_rule $1 "$f4" "$f6" $QNUM |
|
||||
} |
|
||||
} |
|
||||
zapret_custom_firewall_nft() |
|
||||
{ |
|
||||
# stop logic is not required |
|
||||
|
|
||||
local f4 f6 |
|
||||
local first_packet_only="$nft_connbytes 1-$(first_packets_for_mode)" |
|
||||
local desync="mark and $DESYNC_MARK == 0" |
|
||||
|
|
||||
[ "$MODE_HTTP" = "1" ] && { |
|
||||
f4="tcp dport {$HTTP_PORTS}" |
|
||||
f6=$f4 |
|
||||
nft_filter_apply_ipset_target f4 f6 |
|
||||
nft_fw_tpws "$f4" "$f6" $TPPORT |
|
||||
} |
|
||||
|
|
||||
[ "$MODE_HTTPS" = "1" ] && { |
|
||||
f4="tcp dport {$HTTPS_PORTS} $first_packet_only" |
|
||||
f6=$f4 |
|
||||
nft_filter_apply_ipset_target f4 f6 |
|
||||
nft_fw_nfqws_post "$f4 $desync" "$f6 $desync" $QNUM |
|
||||
# for modes that require incoming traffic |
|
||||
nft_fw_reverse_nfqws_rule "$f4" "$f6" $QNUM |
|
||||
} |
|
||||
} |
|
@ -0,0 +1,35 @@ |
|||||
|
# this custom script demonstrates how to apply tpws to http and nfqws to https and quic |
||||
|
# it's desired that inherited basic rules are low priority to allow specializations and exceptions in other custom scripts |
||||
|
|
||||
|
nfqws_tpws_inheritor() |
||||
|
{ |
||||
|
# $1 - inherited function |
||||
|
# $2 - 1 - run, 0 - stop |
||||
|
|
||||
|
[ "$MODE_HTTP" = "1" ] && { |
||||
|
MODE_OVERRIDE=tpws MODE_HTTPS=0 MODE_QUIC=0 $1 $2 |
||||
|
} |
||||
|
|
||||
|
[ "$MODE_HTTPS" = "1" -o "$MODE_QUIC" = "1" ] && { |
||||
|
MODE_OVERRIDE=nfqws MODE_HTTP=0 $1 $2 |
||||
|
} |
||||
|
} |
||||
|
|
||||
|
zapret_custom_daemons() |
||||
|
{ |
||||
|
# $1 - 1 - run, 0 - stop |
||||
|
|
||||
|
nfqws_tpws_inheritor zapret_do_daemons $1 |
||||
|
} |
||||
|
zapret_custom_firewall() |
||||
|
{ |
||||
|
# $1 - 1 - run, 0 - stop |
||||
|
|
||||
|
nfqws_tpws_inheritor zapret_do_firewall_rules_ipt $1 |
||||
|
} |
||||
|
zapret_custom_firewall_nft() |
||||
|
{ |
||||
|
# stop logic is not required |
||||
|
|
||||
|
nfqws_tpws_inheritor zapret_apply_firewall_rules_nft |
||||
|
} |
File diff suppressed because one or more lines are too long
@ -1,71 +0,0 @@ |
|||||
# this custom script demonstrates how to apply tpws to http and nfqws to https |
|
||||
# it preserves config settings : MODE_HTTP, MODE_HTTPS, MODE_FILTER, TPWS_OPT, NFQWS_OPT_DESYNC, NFQWS_OPT_DESYNC_HTTPS |
|
||||
|
|
||||
zapret_custom_daemons() |
|
||||
{ |
|
||||
# $1 - 1 - run, 0 - stop |
|
||||
|
|
||||
local opt |
|
||||
|
|
||||
[ "$MODE_HTTP" = "1" ] && { |
|
||||
opt="--port=$TPPORT $TPWS_OPT" |
|
||||
filter_apply_hostlist_target opt |
|
||||
filter_apply_suffix opt "$TPWS_OPT_SUFFIX" |
|
||||
do_tpws $1 1 "$opt" |
|
||||
} |
|
||||
|
|
||||
[ "$MODE_HTTPS" = "1" ] && { |
|
||||
opt="--qnum=$QNUM $NFQWS_OPT_DESYNC_HTTPS" |
|
||||
filter_apply_hostlist_target opt |
|
||||
filter_apply_suffix opt "$NFQWS_OPT_DESYNC_HTTPS_SUFFIX" |
|
||||
do_nfqws $1 2 "$opt" |
|
||||
} |
|
||||
} |
|
||||
zapret_custom_firewall() |
|
||||
{ |
|
||||
# $1 - 1 - run, 0 - stop |
|
||||
|
|
||||
local f4 f6 |
|
||||
local first_packet_only="$ipt_connbytes 1:$(first_packets_for_mode)" |
|
||||
local desync="-m mark ! --mark $DESYNC_MARK/$DESYNC_MARK" |
|
||||
|
|
||||
[ "$MODE_HTTP" = "1" ] && { |
|
||||
f4="-p tcp -m multiport --dports $HTTP_PORTS_IPT" |
|
||||
f6=$f4 |
|
||||
filter_apply_ipset_target f4 f6 |
|
||||
fw_tpws $1 "$f4" "$f6" $TPPORT |
|
||||
} |
|
||||
|
|
||||
[ "$MODE_HTTPS" = "1" ] && { |
|
||||
f4="-p tcp -m multiport --dports $HTTPS_PORTS_IPT $first_packet_only" |
|
||||
f6=$f4 |
|
||||
filter_apply_ipset_target f4 f6 |
|
||||
fw_nfqws_post $1 "$f4 $desync" "$f6 $desync" $QNUM |
|
||||
# for modes that require incoming traffic |
|
||||
fw_reverse_nfqws_rule $1 "$f4" "$f6" $QNUM |
|
||||
} |
|
||||
} |
|
||||
zapret_custom_firewall_nft() |
|
||||
{ |
|
||||
# stop logic is not required |
|
||||
|
|
||||
local f4 f6 |
|
||||
local first_packet_only="$nft_connbytes 1-$(first_packets_for_mode)" |
|
||||
local desync="mark and $DESYNC_MARK == 0" |
|
||||
|
|
||||
[ "$MODE_HTTP" = "1" ] && { |
|
||||
f4="tcp dport {$HTTP_PORTS}" |
|
||||
f6=$f4 |
|
||||
nft_filter_apply_ipset_target f4 f6 |
|
||||
nft_fw_tpws "$f4" "$f6" $TPPORT |
|
||||
} |
|
||||
|
|
||||
[ "$MODE_HTTPS" = "1" ] && { |
|
||||
f4="tcp dport {$HTTPS_PORTS} $first_packet_only" |
|
||||
f6=$f4 |
|
||||
nft_filter_apply_ipset_target f4 f6 |
|
||||
nft_fw_nfqws_post "$f4 $desync" "$f6 $desync" $QNUM |
|
||||
# for modes that require incoming traffic |
|
||||
nft_fw_reverse_nfqws_rule "$f4" "$f6" $QNUM |
|
||||
} |
|
||||
} |
|
Loading…
Reference in new issue