Last active
August 29, 2015 14:02
-
-
Save evianzhow/d0a353634332c7885287 to your computer and use it in GitHub Desktop.
bestroutetb for iptables on OpenWRT
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# For Linix users, just iptables.shadow under root | |
# For OpenWRT users, copy iptables.shadow to /etc/firewall.user | |
# For OpenWRT users, remember to change OUTPUT to PREROUTING in iptables.footer | |
./generate.sh route_table > analysis_result | |
node minifier.js|node formatter.js --profile=custom --format="iptables -t nat -A SHADOWSOCKS -d %prefix/%mask -j %gw" --netgw RETURN --vpngw ACCEPT > iptables.rules | |
echo "#!/bin/bash" > iptables.shadow && cat iptables.header >> iptables.shadow && cat iptables.rules | grep RETURN >> iptables.shadow && cat iptables.footer >> iptables.shadow | |
rm iptables.rules route_table analysis_result | |
chmod 0755 iptables.shadow |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
############## HEADER HERE | |
# Create new chain | |
iptables -t nat -N SHADOWSOCKS | |
# Ignore your shadowsocks server's addresses | |
# It's very IMPORTANT, just be careful. | |
iptables -t nat -A SHADOWSOCKS -d REPLACE_YOUR_VPS_ADDRESS_HERE -j RETURN | |
# Ignore LANs and any other addresses you'd like to bypass the proxy | |
# See Wikipedia and RFC5735 for full list of reserved networks. | |
# See ashi009/bestroutetb for a highly optimized CHN route list. | |
iptables -t nat -A SHADOWSOCKS -d 0.0.0.0/8 -j RETURN | |
iptables -t nat -A SHADOWSOCKS -d 10.0.0.0/8 -j RETURN | |
iptables -t nat -A SHADOWSOCKS -d 127.0.0.0/8 -j RETURN | |
iptables -t nat -A SHADOWSOCKS -d 169.254.0.0/16 -j RETURN | |
iptables -t nat -A SHADOWSOCKS -d 172.16.0.0/12 -j RETURN | |
iptables -t nat -A SHADOWSOCKS -d 192.168.0.0/16 -j RETURN | |
iptables -t nat -A SHADOWSOCKS -d 224.0.0.0/4 -j RETURN | |
iptables -t nat -A SHADOWSOCKS -d 240.0.0.0/4 -j RETURN |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment