Guest User

firewall.sh version 0.3.0

a guest
Sep 14th, 2021
134
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.04 KB | None | 0 0
  1. #!/bin/bash
  2.  
  3. # The Unlicense
  4.  
  5. > /etc/hosts.allow
  6. echo ALL:ALL > /etc/hosts.deny
  7.  
  8. SP='255.255.255.255/32 240.0.0.0/4 233.252.0.0/24 224.0.0.0/4 203.0.113.0/24 198.51.100.0/24 198.18.0.0/15 192.168.0.0/16 192.88.99.0/24 192.0.2.0/24 192.0.0.0/24 172.16.0.0/12 169.254.0.0/16 127.0.0.0/8 100.64.0.0/10 10.0.0.0/8 0.0.0.0/8'
  9.  
  10. iptables -t nat -F
  11.  
  12. iptables -t nat -A OUTPUT -p udp --dport 53 -j REDIRECT --to-port 9053
  13. iptables -t nat -A OUTPUT -p tcp -d 10.192.0.0/10 --syn -j REDIRECT --to-port 9040
  14.  
  15. iptables -t nat -A OUTPUT -p tcp -m owner --uid-owner debian-tor --syn -j RETURN
  16. iptables -t nat -A OUTPUT -o lo -j RETURN
  17.  
  18. for sp in $SP; do
  19.     iptables -t nat -A OUTPUT -d $sp -j RETURN
  20. done
  21.  
  22. iptables -t nat -A OUTPUT -p tcp --syn -j REDIRECT --to-port 9040
  23.  
  24. iptables -t nat -nvL
  25.  
  26. {
  27.         echo DNSPort 127.0.0.1:9053
  28.         echo AutomapHostsOnResolve 1
  29.         echo AutomapHostsSuffixes .onion
  30.         echo
  31.         echo TransPort 127.0.0.1:9040
  32.         echo VirtualAddrNetwork 10.192.0.0/10
  33. } > /etc/tor/torrc
  34.  
  35. systemctl restart tor
  36.  
Add Comment
Please, Sign In to add comment