|
@ -20,10 +20,10 @@ zapret_do_firewall() |
|
|
|
|
|
|
|
|
# russian DPI sends RST,ACK with wrong ACK. |
|
|
# russian DPI sends RST,ACK with wrong ACK. |
|
|
# this is sometimes treated by conntrack as invalid and connbytes fw rules do not pass RST packet to nfqws. |
|
|
# this is sometimes treated by conntrack as invalid and connbytes fw rules do not pass RST packet to nfqws. |
|
|
# swith on liberal mode on zapret firewall start and switch off on zapret firewall stop |
|
|
# switch on liberal mode on zapret firewall start and switch off on zapret firewall stop |
|
|
# this is only required for processing incoming bad RSTs. incoming rules are only applied in autohostlist mode |
|
|
# this is only required for processing incoming bad RSTs. incoming rules are only applied in autohostlist mode |
|
|
# calling this after firewall because conntrack module can be not loaded before applying conntrack firewall rules |
|
|
# calling this after firewall because conntrack module can be not loaded before applying conntrack firewall rules |
|
|
[ "$MODE_FILTER" = "autohostlist" -a "$MODE" != tpws-socks ] && set_conntrack_liberal_mode $1 |
|
|
[ "$MODE_FILTER" = "autohostlist" -a "$MODE" != tpws -a "$MODE" != tpws-socks ] && set_conntrack_liberal_mode $1 |
|
|
|
|
|
|
|
|
[ "$1" = 1 -a -n "$INIT_FW_POST_UP_HOOK" ] && $INIT_FW_POST_UP_HOOK |
|
|
[ "$1" = 1 -a -n "$INIT_FW_POST_UP_HOOK" ] && $INIT_FW_POST_UP_HOOK |
|
|
[ "$1" = 0 -a -n "$INIT_FW_POST_DOWN_HOOK" ] && $INIT_FW_POST_DOWN_HOOK |
|
|
[ "$1" = 0 -a -n "$INIT_FW_POST_DOWN_HOOK" ] && $INIT_FW_POST_DOWN_HOOK |
|
|