@@ -580,8 +580,8 @@ load_acl() {
}
[ " $UDP_NO_REDIR_PORTS " != "disable" ] && {
nft " add $NFTABLE_NAME PSW_MANGLE ip protocol udp $( factor $UDP_NO_REDIR_PORTS "udp dport" ) counter return comment \"默认\" "
nft " add $NFTABLE_NAME PSW_MANGLE_V6 counter meta l4proto udp $( factor $UDP_NO_REDIR_PORTS "udp dport" ) counter return comment \"默认\" "
nft " add rule $NFTABLE_NAME PSW_MANGLE ip protocol udp $( factor $UDP_NO_REDIR_PORTS "udp dport" ) counter return comment \"默认\" "
nft " add rule $NFTABLE_NAME PSW_MANGLE_V6 counter meta l4proto udp $( factor $UDP_NO_REDIR_PORTS "udp dport" ) counter return comment \"默认\" "
if ! has_1_65535 " $UDP_NO_REDIR_PORTS " ; then
echolog " - ${ msg } 不代理 UDP 端口[ ${ UDP_NO_REDIR_PORTS } ] "
else
@@ -629,12 +629,12 @@ load_acl() {
[ " ${ TCP_PROXY_MODE } " != "disable" ] && nft " add rule $NFTABLE_NAME PSW_MANGLE_V6 meta l4proto tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) counter drop comment \"默认\" "
}
nft " add $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr $FAKE_IP counter drop comment \"默认\" "
[ " ${ USE_PROXY_LIST } " = "1" ] && nft " add $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr @ $NFTSET_BLACK counter drop comment \"默认\" "
[ " ${ USE_GFW_LIST } " = "1" ] && nft " add $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr @ $NFTSET_GFW counter drop comment \"默认\" "
[ " ${ CHN_LIST } " != "0" ] && nft " add $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr @ $NFTSET_CHN $( get_jump_ipt ${ CHN_LIST } "counter drop" ) comment \"默认\" "
[ " ${ USE_SHUNT_TCP } " = "1" ] && nft " add $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr @ $NFTSET_SHUNT counter drop comment \"默认\" "
[ " ${ TCP_PROXY_MODE } " != "disable" ] && nft " add $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) counter drop comment \"默认\" "
nft " add rule $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr $FAKE_IP counter drop comment \"默认\" "
[ " ${ USE_PROXY_LIST } " = "1" ] && nft " add rule $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr @ $NFTSET_BLACK counter drop comment \"默认\" "
[ " ${ USE_GFW_LIST } " = "1" ] && nft " add rule $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr @ $NFTSET_GFW counter drop comment \"默认\" "
[ " ${ CHN_LIST } " != "0" ] && nft " add rule $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr @ $NFTSET_CHN $( get_jump_ipt ${ CHN_LIST } "counter drop" ) comment \"默认\" "
[ " ${ USE_SHUNT_TCP } " = "1" ] && nft " add rule $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) ip daddr @ $NFTSET_SHUNT counter drop comment \"默认\" "
[ " ${ TCP_PROXY_MODE } " != "disable" ] && nft " add rule $NFTABLE_NAME $nft_prerouting_chain ip protocol tcp $( factor $TCP_PROXY_DROP_PORTS "tcp dport" ) counter drop comment \"默认\" "
echolog " - ${ msg } 屏蔽代理 TCP 端口[ ${ TCP_PROXY_DROP_PORTS } ] "
}
@@ -652,7 +652,7 @@ load_acl() {
[ " ${ USE_GFW_LIST } " = "1" ] && nft " add rule $NFTABLE_NAME PSW_MANGLE ip protocol udp $( factor $UDP_PROXY_DROP_PORTS "udp dport" ) ip daddr @ $NFTSET_GFW counter drop comment \"默认\" "
[ " ${ CHN_LIST } " != "0" ] && nft " add rule $NFTABLE_NAME PSW_MANGLE ip protocol udp $( factor $UDP_PROXY_DROP_PORTS "udp dport" ) ip daddr @ $NFTSET_CHN $( get_jump_ipt ${ CHN_LIST } "counter drop" ) comment \"默认\" "
[ " ${ USE_SHUNT_UDP } " = "1" ] && nft " add rule $NFTABLE_NAME PSW_MANGLE ip protocol udp $( factor $UDP_PROXY_DROP_PORTS "udp dport" ) ip daddr @ $NFTSET_SHUNT counter drop comment \"默认\" "
[ " ${ UDP_PROXY_MODE } " != "disable" ] && nft " add $NFTABLE_NAME PSW_MANGLE ip protocol udp $( factor $UDP_PROXY_DROP_PORTS "udp dport" ) counter drop comment \"默认\" "
[ " ${ UDP_PROXY_MODE } " != "disable" ] && nft " add rule $NFTABLE_NAME PSW_MANGLE ip protocol udp $( factor $UDP_PROXY_DROP_PORTS "udp dport" ) counter drop comment \"默认\" "
echolog " - ${ msg } 屏蔽代理 UDP 端口[ ${ UDP_PROXY_DROP_PORTS } ] "
}
}
@@ -1279,7 +1279,7 @@ add_firewall_rule() {
return 0
}
nft " insert rule $NFTABLE_NAME PSW_OUTPUT_MANGLE_V6 meta l4proto udp ip6 daddr ${ 2 } udp dport ${ 3 } counter jump PSW_RULE "
nft " insert rule $NFTABLE_NAME PSW_MANGLE_V6 meta l4proto tc p iif lo ip6 daddr ${ 2 } $( REDIRECT $UDP_REDIR_PORT TPROXY6) comment \"本机\" "
nft " insert rule $NFTABLE_NAME PSW_MANGLE_V6 meta l4proto ud p iif lo ip6 daddr ${ 2 } $( REDIRECT $UDP_REDIR_PORT TPROXY6) comment \"本机\" "
echolog " - [ $? ]将上游 DNS 服务器 [ ${ 2 } ]: ${ 3 } 加入到路由器自身代理的 UDP 转发链, 请确保您的节点支持IPv6, 并开启IPv6透明代理! "
fi
}
@@ -1416,7 +1416,7 @@ gen_include() {
PR_INDEX=\$(sh ${MY_PATH} RULE_LAST_INDEX "$NFTABLE_NAME" PSW_MANGLE_V6 WAN6_IP_RETURN -1)
if [ \$PR_INDEX -ge 0 ]; then
WAN6_IP=\$(sh ${MY_PATH} get_wan6_ip)
[ ! -z "\${WAN_IP}" ] && nft "replace rule $NFTABLE_NAME PSW_MANGLE_V6 handle \$PR_INDEX ip6 daddr "\${WAN6_IP}" counter return comment \"WAN6_IP_RETURN\""
[ ! -z "\${WAN6 _IP}" ] && nft "replace rule $NFTABLE_NAME PSW_MANGLE_V6 handle \$PR_INDEX ip6 daddr "\${WAN6_IP}" counter return comment \"WAN6_IP_RETURN\""
fi
}
EOF