Guest User

forcewall.sh

a guest
May 30th, 2021
163
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 2.78 KB | None | 0 0
  1. #!/bin/bash
  2.  
  3. SPECIAL_ADDRS='255.255.255.255/32 240.0.0.0/4 233.252.0.0/24 224.0.0.0/4 203.0.113.0/24 198.51.100.0/24 198.18.0.0/15 192.168.0.0/16 192.88.99.0/24 192.0.2.0/24 192.0.0.0/24 172.16.0.0/12 169.254.0.0/16 127.0.0.0/8 100.64.0.0/10 10.0.0.0/8 0.0.0.0/8'
  4.  
  5. # ---
  6.  
  7. [ $EUID != 0 ] && echo run as root! && exit
  8.  
  9. # ---
  10.  
  11. if [ "$1" == "-F" ]; then
  12.   iptables -F; iptables -t nat -F; iptables -P INPUT ACCEPT; iptables -P FORWARD ACCEPT; iptables -P OUTPUT ACCEPT; iptables -nvL; iptables -t nat -nvL
  13.   chattr -f -i /etc/resolv.conf; echo nameserver 1.1.1.1 > /etc/resolv.conf; chattr -f +i /etc/resolv.conf
  14.   exit
  15. fi
  16.  
  17. # ---
  18.  
  19. apt update
  20. apt install tor
  21.  
  22. # ---
  23.  
  24. iptables -F; iptables -t nat -F
  25. iptables -P INPUT DROP; iptables -P FORWARD DROP; iptables -P OUTPUT DROP
  26.  
  27. # ---
  28.  
  29. iptables -A INPUT -m state --state INVALID -j DROP
  30. iptables -A INPUT -m state --state ESTABLISHED -j ACCEPT
  31. iptables -A INPUT -i lo -j ACCEPT
  32. iptables -A INPUT -j DROP
  33.  
  34. # ---
  35.  
  36. iptables -A FORWARD -j DROP
  37.  
  38. # ---
  39.  
  40. iptables -A OUTPUT -m state --state INVALID -j DROP
  41. iptables -A OUTPUT -m state --state ESTABLISHED -j ACCEPT
  42.  
  43. iptables -A OUTPUT -p udp -d 127.0.0.1 --dport 9053 -j ACCEPT
  44. iptables -A OUTPUT -p tcp -d 127.0.0.1 --dport 9040 --syn -j ACCEPT
  45.  
  46. iptables -A OUTPUT -p tcp -m owner --uid-owner debian-tor -m state --state NEW --syn -j ACCEPT
  47. iptables -A OUTPUT -o lo -j ACCEPT
  48.  
  49. for special_addr in $SPECIAL_ADDRS; do
  50.   iptables -A OUTPUT -d $special_addr -j DROP
  51. done
  52.  
  53. iptables -A OUTPUT -j DROP
  54.  
  55. # ---
  56.  
  57. iptables -t nat -A OUTPUT -p udp --dport 53 -j DNAT --to-destination='127.0.0.1:9053'
  58. iptables -t nat -A OUTPUT -p tcp -d 10.192.0.0/10 --syn -j DNAT --to-destination='127.0.0.1:9040'
  59.  
  60. iptables -t nat -A OUTPUT -p tcp -m owner --uid-owner debian-tor --syn -j RETURN
  61. iptables -t nat -A OUTPUT -o lo -j RETURN
  62.  
  63. for special_addr in $SPECIAL_ADDRS; do
  64.   iptables -t nat -A OUTPUT -d $special_addr -j RETURN
  65. done
  66.  
  67. iptables -t nat -A OUTPUT -p tcp --syn -j DNAT --to-destination='127.0.0.1:9040'
  68.  
  69. # ---
  70.  
  71. ip6tables -F; ip6tables -t nat -F
  72. ip6tables -P INPUT DROP; ip6tables -P FORWARD DROP; ip6tables -P OUTPUT DROP
  73. ip6tables -A INPUT -j DROP; ip6tables -A FORWARD -j DROP; ip6tables -A OUTPUT -j DROP
  74.  
  75. # ---
  76.  
  77. iptables -nvL; iptables -t nat -nvL
  78.  
  79. # ---
  80.  
  81. {
  82.   echo DNSPort 127.0.0.1:9053
  83.   echo AutomapHostsOnResolve 1
  84.   echo AutomapHostsSuffixes .onion
  85.   echo
  86.   echo TransPort 127.0.0.1:9040
  87.   echo VirtualAddrNetwork 10.192.0.0/10
  88. } > /etc/tor/torrc && systemctl restart tor
  89.  
  90. # ---
  91.  
  92. chattr -f -i /etc/hosts.allow && > /etc/hosts.allow && chattr -f +i /etc/hosts.allow
  93. chattr -f -i /etc/hosts.deny && echo ALL:ALL > /etc/hosts.deny && chattr -f +i /etc/hosts.deny
  94. chattr -f -i /etc/resolv.conf && echo nameserver 127.0.0.1 > /etc/resolv.conf && chattr -f +i /etc/resolv.conf
Add Comment
Please, Sign In to add comment