@@ -32344,6 +32344,7 @@ nft replace rule inet fw4 ${TOR_CHAIN} \
32344
32344
handle ${TOR_RULE##* } \
32345
32345
fib daddr type != { local, broadcast } ${TOR_RULE}
32346
32346
EOF
32347
+
32347
32348
uci -q delete firewall.tor_nft
32348
32349
uci set firewall.tor_nft="include"
32349
32350
uci set firewall.tor_nft.path="/etc/nftables.d/tor.sh"
@@ -32376,10 +32377,10 @@ service firewall restart
32376
32377
}
32377
32378
32378
32379
setup_tor_routing() {
32379
- iptables -t nat -A PREROUTING -i inet -p tcp --syn -j REDIRECT --to-ports $TOR_TRANS_port
32380
- iptables -A FORWARD -i inet -o wan -j ACCEPT
32381
- iptables -A FORWARD -i wan -o inet -j ACCEPT
32382
- iptables -t nat -A POSTROUTING -o wan -j MASQUERADE
32380
+ iptables -t nat -A PREROUTING -i inet -p tcp --syn -j REDIRECT --to-ports $TOR_TRANS_port
32381
+ iptables -A FORWARD -i inet -o wan -j ACCEPT
32382
+ iptables -A FORWARD -i wan -o inet -j ACCEPT
32383
+ iptables -t nat -A POSTROUTING -o wan -j MASQUERADE
32383
32384
}
32384
32385
32385
32386
set_HS_Firewall() {
@@ -32477,16 +32478,16 @@ processes=$(uci commit && reload_config)
32477
32478
wait $processes >> /root/install.log
32478
32479
/etc/init.d/firewall restart >> /root/install.log
32479
32480
if [ "$SECURE_RULES" = "" ]
32480
- then
32481
- FW_HSactive='1'
32482
- set_HS_Firewall
32483
- elif [ "$SECURE_RULES" = "y" ]
32484
- then
32481
+ then
32485
32482
FW_HSactive='1'
32486
- set_HS_Firewall
32487
- else
32488
- FW_HSactive='0'
32489
- set_HS_Firewall_disable
32483
+ set_HS_Firewall
32484
+ elif [ "$SECURE_RULES" = "y" ]
32485
+ then
32486
+ FW_HSactive='1'
32487
+ set_HS_Firewall
32488
+ else
32489
+ FW_HSactive='0'
32490
+ set_HS_Firewall_disable
32490
32491
fi
32491
32492
32492
32493
view_config
@@ -34812,22 +34813,22 @@ uci set firewall.blockIncoming.target="REJECT"
34812
34813
uci set firewall.blockIncoming.enabled="1"
34813
34814
if [ "$TOR_ONION" = "1" ]
34814
34815
then
34815
- setup_tor_routing
34816
+ setup_tor_routing
34816
34817
fi
34817
34818
echo
34818
34819
echo 'Firewall active: ' $SECURE_RULES
34819
34820
echo
34820
34821
if [ "$SECURE_RULES" = "" ]
34821
- then
34822
- FW_HSactive='1'
34823
- set_HS_Firewall
34824
- elif [ "$SECURE_RULES" = "y" ]
34825
- then
34822
+ then
34826
34823
FW_HSactive='1'
34827
- set_HS_Firewall
34828
- else
34829
- FW_HSactive='0'
34830
- set_HS_Firewall_disable
34824
+ set_HS_Firewall
34825
+ elif [ "$SECURE_RULES" = "y" ]
34826
+ then
34827
+ FW_HSactive='1'
34828
+ set_HS_Firewall
34829
+ else
34830
+ FW_HSactive='0'
34831
+ set_HS_Firewall_disable
34831
34832
fi
34832
34833
34833
34834
processes=$(uci commit && reload_config)
@@ -35029,11 +35030,14 @@ if [ "$TOR_ONION" = "1" ]
35029
35030
echo
35030
35031
echo $(date +%d'.'%m'.'%y' '%H':'%M':'%S) ' Set Firewall-Intercept'
35031
35032
echo $(date +%d'.'%m'.'%y' '%H':'%M':'%S) ' Set Firewall-Intercept' >> /root/install.log
35032
- set_firewall_intercept >> /root/install.log
35033
+ # set_firewall_intercept >> /root/install.log
35034
+ test_tor_dns_intercept >> /root/install.log
35035
+ test_Intercept_TCP >> /root/install.log
35036
+
35033
35037
echo $(date +%d'.'%m'.'%y' '%H':'%M':'%S) ' Routing über Tor Onion einrichten'
35034
- echo $(date +%d'.'%m'.'%y' '%H':'%M':'%S) ' Routing über Tor Onion einrichten' >> /root/install.log
35035
- setup_tor_routing >> /root/install.log
35036
- fi
35038
+ echo $(date +%d'.'%m'.'%y' '%H':'%M':'%S) ' Routing über Tor Onion einrichten' >> /root/install.log
35039
+ # setup_tor_routing >> /root/install.log
35040
+ # fi
35037
35041
35038
35042
#echo
35039
35043
#echo >> /root/install.log
0 commit comments