Advertisement
Guest User

Untitled

a guest
Feb 20th, 2019
66
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.06 KB | None | 0 0
  1. haproxy -D -f /etc/haproxy/haproxy.cfg -p /var/run/haproxy.pid -sf $(cat /var/run/haproxy.pid)
  2.  
  3. iptables -I INPUT -p tcp --dport $PORT --syn -j DROP
  4. sleep 1
  5. service haproxy restart
  6. iptables -D INPUT -p tcp --dport $PORT --syn -j DROP
  7.  
  8. # plug_manipulation.sh
  9. nl-qdisc-add --dev=lo --parent=1:4 --id=40: --update plug --buffer
  10. service haproxy reload
  11. nl-qdisc-add --dev=lo --parent=1:4 --id=40: --update plug --release-indefinite
  12.  
  13. # setup_iptables.sh
  14. iptables -t mangle -I OUTPUT -p tcp -s 169.254.255.254 --syn -j MARK --set-mark 1
  15.  
  16. # setup_qdisc.sh
  17. ## Set up the queuing discipline
  18. tc qdisc add dev lo root handle 1: prio bands 4
  19. tc qdisc add dev lo parent 1:1 handle 10: pfifo limit 1000
  20. tc qdisc add dev lo parent 1:2 handle 20: pfifo limit 1000
  21. tc qdisc add dev lo parent 1:3 handle 30: pfifo limit 1000
  22.  
  23. ## Create a plug qdisc with 1 meg of buffer
  24. nl-qdisc-add --dev=lo --parent=1:4 --id=40: plug --limit 1048576
  25. ## Release the plug
  26. nl-qdisc-add --dev=lo --parent=1:4 --id=40: --update plug --release-indefinite
  27.  
  28. ## Set up the filter, any packet marked with “1” will be
  29. ## directed to the plug
  30. tc filter add dev lo protocol ip parent 1:0 prio 1 handle 1 fw classid 1:4
  31.  
  32. iptables -t mangle -A PREROUTING -i eth1 -d 123.123.123.123/32 -m conntrack --ctstate NEW -j CONNMARK --set-mark 1
  33. iptables -t mangle -A PREROUTING -j CONNMARK --restore-mark
  34. iptables -t mangle -A PREROUTING -i eth1 -p tcp --tcp-flags FIN FIN -j MARK --set-mark 2
  35. iptables -t mangle -A PREROUTING -i eth1 -p tcp --tcp-flags RST RST -j MARK --set-mark 2
  36. iptables -t mangle -A PREROUTING -i eth1 -m mark ! --mark 0 -j TEE --gateway 192.168.0.2
  37. iptables -t mangle -A PREROUTING -i eth1 -m mark --mark 1 -j DROP
  38.  
  39. #!/bin/sh
  40.  
  41. case $1 in
  42. start)
  43. echo Redirection for new sessions is enabled
  44.  
  45. # echo 0 > /proc/sys/net/ipv4/tcp_fwmark_accept
  46. for f in /proc/sys/net/ipv4/conf/*/rp_filter; do echo 0 > $f; done
  47. iptables -t mangle -A PREROUTING -i eth1 ! -d 123.123.123.123 -m conntrack --ctstate NEW -j CONNMARK --set-mark 1
  48. iptables -t mangle -A PREROUTING -j CONNMARK --restore-mark
  49. iptables -t mangle -A PREROUTING -i eth1 -p tcp --tcp-flags FIN FIN -j MARK --set-mark 2
  50. iptables -t mangle -A PREROUTING -i eth1 -p tcp --tcp-flags RST RST -j MARK --set-mark 2
  51. iptables -t mangle -A PREROUTING -i eth1 -m mark ! --mark 0 -j TEE --gateway 192.168.0.2
  52. iptables -t mangle -A PREROUTING -i eth1 -m mark --mark 1 -j DROP
  53. ;;
  54. stop)
  55. iptables -t mangle -D PREROUTING -i eth1 -m mark --mark 1 -j DROP
  56. iptables -t mangle -D PREROUTING -i eth1 -m mark ! --mark 0 -j TEE --gateway 192.168.0.2
  57. iptables -t mangle -D PREROUTING -i eth1 -p tcp --tcp-flags RST RST -j MARK --set-mark 2
  58. iptables -t mangle -D PREROUTING -i eth1 -p tcp --tcp-flags FIN FIN -j MARK --set-mark 2
  59. iptables -t mangle -D PREROUTING -j CONNMARK --restore-mark
  60. iptables -t mangle -D PREROUTING -i eth1 ! -d 123.123.123.123 -m conntrack --ctstate NEW -j CONNMARK --set-mark 1
  61.  
  62. echo Redirection for new sessions is disabled
  63. ;;
  64. esac
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement