2023-09-06 09:24:29 +00:00
|
|
|
# this custom script in addition to MODE=nfqws runs desync to DHT packets with udp payload length 101..399 , without ipset/hostlist filtering
|
2023-09-07 17:34:42 +00:00
|
|
|
# need to add to config : NFQWS_OPT_DESYNC_DHT="--dpi-desync=fake --dpi-desync-ttl=5"
|
2023-09-06 09:24:29 +00:00
|
|
|
|
|
|
|
QNUM2=$(($QNUM+20))
|
|
|
|
|
|
|
|
zapret_custom_daemons()
|
|
|
|
{
|
|
|
|
# stop logic is managed by procd
|
|
|
|
|
|
|
|
local MODE_OVERRIDE=nfqws
|
|
|
|
local opt
|
|
|
|
|
|
|
|
zapret_do_daemons $1
|
|
|
|
|
|
|
|
opt="--qnum=$QNUM2 $NFQWS_OPT_BASE $NFQWS_OPT_DESYNC_DHT"
|
|
|
|
do_nfqws $1 100 "$opt"
|
|
|
|
}
|
|
|
|
zapret_custom_firewall()
|
|
|
|
{
|
|
|
|
# $1 - 1 - run, 0 - stop
|
|
|
|
|
|
|
|
local MODE_OVERRIDE=nfqws
|
2023-09-06 10:50:41 +00:00
|
|
|
local f uf4 uf6
|
2023-09-06 09:31:42 +00:00
|
|
|
local first_packet_only="-m connbytes --connbytes-dir=original --connbytes-mode=packets --connbytes 1:1"
|
2023-09-06 09:24:29 +00:00
|
|
|
local desync="-m mark ! --mark $DESYNC_MARK/$DESYNC_MARK"
|
|
|
|
|
|
|
|
zapret_do_firewall_rules_ipt $1
|
|
|
|
|
2023-09-06 10:50:41 +00:00
|
|
|
f='-p udp -m length --length 109:407 -m u32 --u32'
|
|
|
|
uf4='0>>22&0x3C@8>>16=0x6431'
|
|
|
|
uf6='48>>16=0x6431'
|
|
|
|
fw_nfqws_post $1 "$f $uf4 $desync $first_packet_only" "$f $uf6 $desync $first_packet_only" $QNUM2
|
2023-09-06 09:24:29 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
zapret_custom_firewall_nft()
|
|
|
|
{
|
|
|
|
# stop logic is not required
|
|
|
|
|
|
|
|
local MODE_OVERRIDE=nfqws
|
|
|
|
local f
|
|
|
|
local first_packet_only="ct original packets 1"
|
|
|
|
local desync="mark and $DESYNC_MARK == 0"
|
|
|
|
|
|
|
|
zapret_apply_firewall_rules_nft
|
|
|
|
|
|
|
|
f="meta length 109-407 meta l4proto udp @th,64,16 0x6431"
|
|
|
|
nft_fw_nfqws_post "$f $desync $first_packet_only" "$f $desync $first_packet_only" $QNUM2
|
|
|
|
}
|
|
|
|
|