mirror of https://github.com/bol-van/zapret/
22 changed files with 216 additions and 222 deletions
@ -0,0 +1,35 @@ |
|||
# this custom script demonstrates how to apply tpws to http and nfqws to https and quic |
|||
# it's desired that inherited basic rules are low priority to allow specializations and exceptions in other custom scripts |
|||
|
|||
nfqws_tpws_inheritor() |
|||
{ |
|||
# $1 - inherited function |
|||
# $2 - 1 - run, 0 - stop |
|||
|
|||
[ "$MODE_HTTP" = "1" ] && { |
|||
MODE_OVERRIDE=tpws MODE_HTTPS=0 MODE_QUIC=0 $1 $2 |
|||
} |
|||
|
|||
[ "$MODE_HTTPS" = "1" -o "$MODE_QUIC" = "1" ] && { |
|||
MODE_OVERRIDE=nfqws MODE_HTTP=0 $1 $2 |
|||
} |
|||
} |
|||
|
|||
zapret_custom_daemons() |
|||
{ |
|||
# stop logic is managed by procd |
|||
|
|||
nfqws_tpws_inheritor start_daemons_procd |
|||
} |
|||
zapret_custom_firewall() |
|||
{ |
|||
# $1 - 1 - run, 0 - stop |
|||
|
|||
nfqws_tpws_inheritor zapret_do_firewall_rules_ipt $1 |
|||
} |
|||
zapret_custom_firewall_nft() |
|||
{ |
|||
# stop logic is not required |
|||
|
|||
nfqws_tpws_inheritor zapret_apply_firewall_rules_nft |
|||
} |
File diff suppressed because one or more lines are too long
@ -1,71 +0,0 @@ |
|||
# this custom script demonstrates how to apply tpws to http and nfqws to https |
|||
# it preserves config settings : MODE_HTTP, MODE_HTTPS, MODE_FILTER, TPWS_OPT, NFQWS_OPT_DESYNC, NFQWS_OPT_DESYNC_HTTPS |
|||
|
|||
zapret_custom_daemons() |
|||
{ |
|||
# $1 - 1 - run, 0 - stop |
|||
|
|||
local opt |
|||
|
|||
[ "$MODE_HTTP" = "1" ] && { |
|||
opt="--port=$TPPORT $TPWS_OPT" |
|||
filter_apply_hostlist_target opt |
|||
filter_apply_suffix opt "$TPWS_OPT_SUFFIX" |
|||
run_tpws 1 "$opt" |
|||
} |
|||
|
|||
[ "$MODE_HTTPS" = "1" ] && { |
|||
opt="--qnum=$QNUM $NFQWS_OPT_DESYNC_HTTPS" |
|||
filter_apply_hostlist_target opt |
|||
filter_apply_suffix opt "$NFQWS_OPT_DESYNC_HTTPS_SUFFIX" |
|||
run_daemon 2 $NFQWS "$opt" |
|||
} |
|||
} |
|||
zapret_custom_firewall() |
|||
{ |
|||
# $1 - 1 - run, 0 - stop |
|||
|
|||
local f4 f6 |
|||
local first_packet_only="$ipt_connbytes 1:$(first_packets_for_mode)" |
|||
local desync="-m mark ! --mark $DESYNC_MARK/$DESYNC_MARK" |
|||
|
|||
[ "$MODE_HTTP" = "1" ] && { |
|||
f4="-p tcp -m multiport --dports $HTTP_PORTS_IPT" |
|||
f6=$f4 |
|||
filter_apply_ipset_target f4 f6 |
|||
fw_tpws $1 "$f4" "$f6" $TPPORT |
|||
} |
|||
|
|||
[ "$MODE_HTTPS" = "1" ] && { |
|||
f4="-p tcp -m multiport --dports $HTTPS_PORTS_IPT $first_packet_only" |
|||
f6=$f4 |
|||
filter_apply_ipset_target f4 f6 |
|||
fw_nfqws_post $1 "$f4 $desync" "$f6 $desync" $QNUM |
|||
# for modes that require incoming traffic |
|||
fw_reverse_nfqws_rule $1 "$f4" "$f6" $QNUM |
|||
} |
|||
} |
|||
zapret_custom_firewall_nft() |
|||
{ |
|||
# stop logic is not required |
|||
|
|||
local f4 f6 |
|||
local first_packet_only="$nft_connbytes 1-$(first_packets_for_mode)" |
|||
local desync="mark and $DESYNC_MARK == 0" |
|||
|
|||
[ "$MODE_HTTP" = "1" ] && { |
|||
f4="tcp dport {$HTTP_PORTS}" |
|||
f6=$f4 |
|||
nft_filter_apply_ipset_target f4 f6 |
|||
nft_fw_tpws "$f4" "$f6" $TPPORT |
|||
} |
|||
|
|||
[ "$MODE_HTTPS" = "1" ] && { |
|||
f4="tcp dport {$HTTPS_PORTS} $first_packet_only" |
|||
f6=$f4 |
|||
nft_filter_apply_ipset_target f4 f6 |
|||
nft_fw_nfqws_post "$f4 $desync" "$f6 $desync" $QNUM |
|||
# for modes that require incoming traffic |
|||
nft_fw_reverse_nfqws_rule "$f4" "$f6" $QNUM |
|||
} |
|||
} |
@ -0,0 +1,35 @@ |
|||
# this custom script demonstrates how to apply tpws to http and nfqws to https and quic |
|||
# it's desired that inherited basic rules are low priority to allow specializations and exceptions in other custom scripts |
|||
|
|||
nfqws_tpws_inheritor() |
|||
{ |
|||
# $1 - inherited function |
|||
# $2 - 1 - run, 0 - stop |
|||
|
|||
[ "$MODE_HTTP" = "1" ] && { |
|||
MODE_OVERRIDE=tpws MODE_HTTPS=0 MODE_QUIC=0 $1 $2 |
|||
} |
|||
|
|||
[ "$MODE_HTTPS" = "1" -o "$MODE_QUIC" = "1" ] && { |
|||
MODE_OVERRIDE=nfqws MODE_HTTP=0 $1 $2 |
|||
} |
|||
} |
|||
|
|||
zapret_custom_daemons() |
|||
{ |
|||
# $1 - 1 - run, 0 - stop |
|||
|
|||
nfqws_tpws_inheritor zapret_do_daemons $1 |
|||
} |
|||
zapret_custom_firewall() |
|||
{ |
|||
# $1 - 1 - run, 0 - stop |
|||
|
|||
nfqws_tpws_inheritor zapret_do_firewall_rules_ipt $1 |
|||
} |
|||
zapret_custom_firewall_nft() |
|||
{ |
|||
# stop logic is not required |
|||
|
|||
nfqws_tpws_inheritor zapret_apply_firewall_rules_nft |
|||
} |
File diff suppressed because one or more lines are too long
@ -1,71 +0,0 @@ |
|||
# this custom script demonstrates how to apply tpws to http and nfqws to https |
|||
# it preserves config settings : MODE_HTTP, MODE_HTTPS, MODE_FILTER, TPWS_OPT, NFQWS_OPT_DESYNC, NFQWS_OPT_DESYNC_HTTPS |
|||
|
|||
zapret_custom_daemons() |
|||
{ |
|||
# $1 - 1 - run, 0 - stop |
|||
|
|||
local opt |
|||
|
|||
[ "$MODE_HTTP" = "1" ] && { |
|||
opt="--port=$TPPORT $TPWS_OPT" |
|||
filter_apply_hostlist_target opt |
|||
filter_apply_suffix opt "$TPWS_OPT_SUFFIX" |
|||
do_tpws $1 1 "$opt" |
|||
} |
|||
|
|||
[ "$MODE_HTTPS" = "1" ] && { |
|||
opt="--qnum=$QNUM $NFQWS_OPT_DESYNC_HTTPS" |
|||
filter_apply_hostlist_target opt |
|||
filter_apply_suffix opt "$NFQWS_OPT_DESYNC_HTTPS_SUFFIX" |
|||
do_nfqws $1 2 "$opt" |
|||
} |
|||
} |
|||
zapret_custom_firewall() |
|||
{ |
|||
# $1 - 1 - run, 0 - stop |
|||
|
|||
local f4 f6 |
|||
local first_packet_only="$ipt_connbytes 1:$(first_packets_for_mode)" |
|||
local desync="-m mark ! --mark $DESYNC_MARK/$DESYNC_MARK" |
|||
|
|||
[ "$MODE_HTTP" = "1" ] && { |
|||
f4="-p tcp -m multiport --dports $HTTP_PORTS_IPT" |
|||
f6=$f4 |
|||
filter_apply_ipset_target f4 f6 |
|||
fw_tpws $1 "$f4" "$f6" $TPPORT |
|||
} |
|||
|
|||
[ "$MODE_HTTPS" = "1" ] && { |
|||
f4="-p tcp -m multiport --dports $HTTPS_PORTS_IPT $first_packet_only" |
|||
f6=$f4 |
|||
filter_apply_ipset_target f4 f6 |
|||
fw_nfqws_post $1 "$f4 $desync" "$f6 $desync" $QNUM |
|||
# for modes that require incoming traffic |
|||
fw_reverse_nfqws_rule $1 "$f4" "$f6" $QNUM |
|||
} |
|||
} |
|||
zapret_custom_firewall_nft() |
|||
{ |
|||
# stop logic is not required |
|||
|
|||
local f4 f6 |
|||
local first_packet_only="$nft_connbytes 1-$(first_packets_for_mode)" |
|||
local desync="mark and $DESYNC_MARK == 0" |
|||
|
|||
[ "$MODE_HTTP" = "1" ] && { |
|||
f4="tcp dport {$HTTP_PORTS}" |
|||
f6=$f4 |
|||
nft_filter_apply_ipset_target f4 f6 |
|||
nft_fw_tpws "$f4" "$f6" $TPPORT |
|||
} |
|||
|
|||
[ "$MODE_HTTPS" = "1" ] && { |
|||
f4="tcp dport {$HTTPS_PORTS} $first_packet_only" |
|||
f6=$f4 |
|||
nft_filter_apply_ipset_target f4 f6 |
|||
nft_fw_nfqws_post "$f4 $desync" "$f6 $desync" $QNUM |
|||
# for modes that require incoming traffic |
|||
nft_fw_reverse_nfqws_rule "$f4" "$f6" $QNUM |
|||
} |
|||
} |
Loading…
Reference in new issue