mirror of
https://github.com/routerich/RouterichAX3000_configs.git
synced 2025-12-29 18:28:07 +03:00
Compare commits
4 Commits
new_awg_po
...
test_main
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
6bf92c9c58 | ||
|
|
a51c9f8b77 | ||
|
|
4c7bc4b3c1 | ||
|
|
85663170f8 |
@@ -318,7 +318,7 @@ config_files="network
|
||||
firewall
|
||||
https-dns-proxy
|
||||
dhcp"
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/main"
|
||||
|
||||
checkPackageAndInstall "https-dns-proxy" "0"
|
||||
|
||||
@@ -575,7 +575,7 @@ fi
|
||||
|
||||
path_podkop_config="/etc/config/podkop"
|
||||
path_podkop_config_backup="/root/podkop"
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/main"
|
||||
|
||||
if [ -f "/etc/init.d/podkop" ]; then
|
||||
printf "Podkop installed. Reconfigured on AWG WARP and Opera Proxy? (y/n): \n"
|
||||
|
||||
@@ -1,36 +0,0 @@
|
||||
# this custom script runs desync to all discord media packets
|
||||
# NOTE: @ih requires nft 1.0.1+ and updated kernel version. it's confirmed to work on 5.15 (openwrt 23) and not work on 5.10 (openwrt 22)
|
||||
|
||||
# can override in config :
|
||||
NFQWS_OPT_DESYNC_DISCORD_MEDIA="${NFQWS_OPT_DESYNC_DISCORD_MEDIA:---dpi-desync=fake --dpi-desync-repeats=2}"
|
||||
DISCORD_MEDIA_PORT_RANGE="${DISCORD_MEDIA_PORT_RANGE:-50000-50099}"
|
||||
|
||||
alloc_dnum DNUM_DISCORD_MEDIA
|
||||
alloc_qnum QNUM_DISCORD_MEDIA
|
||||
|
||||
zapret_custom_daemons()
|
||||
{
|
||||
# $1 - 1 - add, 0 - stop
|
||||
|
||||
local opt="--qnum=$QNUM_DISCORD_MEDIA $NFQWS_OPT_DESYNC_DISCORD_MEDIA"
|
||||
do_nfqws $1 $DNUM_DISCORD_MEDIA "$opt"
|
||||
}
|
||||
# size = 156 (8 udp header + 148 payload) && payload starts with 0x01000000
|
||||
zapret_custom_firewall()
|
||||
{
|
||||
# $1 - 1 - run, 0 - stop
|
||||
|
||||
local DISABLE_IPV6=1
|
||||
local port_range=$(replace_char - : $DISCORD_MEDIA_PORT_RANGE)
|
||||
local f="-p udp --dport $port_range -m u32 --u32"
|
||||
# this is simplified test to skip writing monstrous rule. instead of checking 64 bytes for zeroes only check 2 dwords for zero
|
||||
fw_nfqws_post $1 "$f 0>>22&0x3C@4>>16=0x52&&0>>22&0x3C@8=0x00010046&&0>>22&0x3C@16=0&&0>>22&0x3C@76=0" '' $QNUM_DISCORD_MEDIA
|
||||
}
|
||||
zapret_custom_firewall_nft()
|
||||
{
|
||||
# stop logic is not required
|
||||
|
||||
local DISABLE_IPV6=1
|
||||
local f="udp dport $DISCORD_MEDIA_PORT_RANGE udp length == 82 @ih,0,32 0x00010046 @ih,64,128 0x00000000000000000000000000000000 @ih,192,128 0x00000000000000000000000000000000 @ih,320,128 0x00000000000000000000000000000000 @ih,448,128 0x00000000000000000000000000000000"
|
||||
nft_fw_nfqws_post "$f" '' $QNUM_DISCORD_MEDIA
|
||||
}
|
||||
@@ -1,31 +0,0 @@
|
||||
# this custom script runs desync to all stun packets
|
||||
# NOTE: @ih requires nft 1.0.1+ and updated kernel version. it's confirmed to work on 5.15 (openwrt 23) and not work on 5.10 (openwrt 22)
|
||||
|
||||
# can override in config :
|
||||
NFQWS_OPT_DESYNC_STUN="${NFQWS_OPT_DESYNC_STUN:---dpi-desync=fake --dpi-desync-repeats=2}"
|
||||
|
||||
alloc_dnum DNUM_STUN4ALL
|
||||
alloc_qnum QNUM_STUN4ALL
|
||||
|
||||
zapret_custom_daemons()
|
||||
{
|
||||
# $1 - 1 - add, 0 - stop
|
||||
|
||||
local opt="--qnum=$QNUM_STUN4ALL $NFQWS_OPT_DESYNC_STUN"
|
||||
do_nfqws $1 $DNUM_STUN4ALL "$opt"
|
||||
}
|
||||
# size = 156 (8 udp header + 148 payload) && payload starts with 0x01000000
|
||||
zapret_custom_firewall()
|
||||
{
|
||||
# $1 - 1 - run, 0 - stop
|
||||
|
||||
local f='-p udp -m u32 --u32'
|
||||
fw_nfqws_post $1 "$f 0>>22&0x3C@4>>16=28:65535&&0>>22&0x3C@12=0x2112A442&&0>>22&0x3C@8&0xC0000003=0" "$f 44>>16=28:65535&&52=0x2112A442&&48&0xC0000003=0" $QNUM_STUN4ALL
|
||||
}
|
||||
zapret_custom_firewall_nft()
|
||||
{
|
||||
# stop logic is not required
|
||||
|
||||
local f="udp length >= 28 @ih,32,32 0x2112A442 @ih,0,2 0 @ih,30,2 0"
|
||||
nft_fw_nfqws_post "$f" "$f" $QNUM_STUN4ALL
|
||||
}
|
||||
@@ -1,32 +0,0 @@
|
||||
# this custom script runs desync to all wireguard handshake initiation packets
|
||||
# NOTE: this works for original wireguard and may not work for 3rd party implementations such as xray
|
||||
# NOTE: @ih requires nft 1.0.1+ and updated kernel version. it's confirmed to work on 5.15 (openwrt 23) and not work on 5.10 (openwrt 22)
|
||||
|
||||
# can override in config :
|
||||
NFQWS_OPT_DESYNC_WG="${NFQWS_OPT_DESYNC_WG:---dpi-desync=fake --dpi-desync-fake-wireguard=/opt/zapret/files/fake/quic_initial_vk_com.bin --dpi-desync-repeats=5}"
|
||||
|
||||
alloc_dnum DNUM_WG4ALL
|
||||
alloc_qnum QNUM_WG4ALL
|
||||
|
||||
zapret_custom_daemons()
|
||||
{
|
||||
# $1 - 1 - add, 0 - stop
|
||||
|
||||
local opt="--qnum=$QNUM_WG4ALL $NFQWS_OPT_DESYNC_WG"
|
||||
do_nfqws $1 $DNUM_WG4ALL "$opt"
|
||||
}
|
||||
# size = 156 (8 udp header + 148 payload) && payload starts with 0x01000000
|
||||
zapret_custom_firewall()
|
||||
{
|
||||
# $1 - 1 - run, 0 - stop
|
||||
|
||||
local f='-p udp -m u32 --u32'
|
||||
fw_nfqws_post $1 "$f 0>>22&0x3C@4>>16=0x9c&&0>>22&0x3C@8=0x01000000" "$f 44>>16=0x9c&&48=0x01000000" $QNUM_WG4ALL
|
||||
}
|
||||
zapret_custom_firewall_nft()
|
||||
{
|
||||
# stop logic is not required
|
||||
|
||||
local f="udp length 156 @ih,0,32 0x01000000"
|
||||
nft_fw_nfqws_post "$f" "$f" $QNUM_WG4ALL
|
||||
}
|
||||
@@ -1,11 +0,0 @@
|
||||
|
||||
config dns-failsafe-proxy 'main'
|
||||
option listen_ip '127.0.0.1'
|
||||
option listen_port '5359'
|
||||
option dns_ip '127.0.0.42'
|
||||
option dns_port '53'
|
||||
option failback_ip '127.0.0.1'
|
||||
option failback_port '5453'
|
||||
option connect_timeout '150'
|
||||
option session_timeout '2000'
|
||||
|
||||
@@ -1,42 +0,0 @@
|
||||
|
||||
config main 'config'
|
||||
option canary_domains_icloud '1'
|
||||
option canary_domains_mozilla '1'
|
||||
option dnsmasq_config_update '-'
|
||||
option force_dns '1'
|
||||
list force_dns_port '53'
|
||||
list force_dns_port '853'
|
||||
list procd_fw_src_interfaces 'lan'
|
||||
option procd_trigger_wan6 '0'
|
||||
|
||||
config doh-proxy
|
||||
option bootstrap_dns '94.140.14.14,94.140.15.15'
|
||||
option resolver_url 'https://dns.adguard-dns.com/dns-query'
|
||||
option listen_addr '127.0.0.1'
|
||||
option listen_port '5053'
|
||||
option user 'nobody'
|
||||
option group 'nogroup'
|
||||
|
||||
config doh-proxy
|
||||
option resolver_url 'https://dns.google/dns-query'
|
||||
option bootstrap_dns '8.8.8.8,8.8.4.4'
|
||||
option listen_addr '127.0.0.1'
|
||||
option listen_port '5054'
|
||||
option user 'nobody'
|
||||
option group 'nogroup'
|
||||
|
||||
config doh-proxy
|
||||
option resolver_url 'https://cloudflare-dns.com/dns-query'
|
||||
option bootstrap_dns '1.1.1.1,1.0.0.1'
|
||||
option listen_addr '127.0.0.1'
|
||||
option listen_port '5055'
|
||||
option user 'nobody'
|
||||
option group 'nogroup'
|
||||
|
||||
config doh-proxy
|
||||
option resolver_url 'https://router.comss.one/dns-query'
|
||||
option bootstrap_dns '195.133.25.16,212.109.195.93'
|
||||
option listen_addr '127.0.0.1'
|
||||
option listen_port '5056'
|
||||
option user 'nobody'
|
||||
option group 'nogroup'
|
||||
@@ -1,55 +0,0 @@
|
||||
|
||||
config main 'main'
|
||||
option mode 'proxy'
|
||||
option proxy_config_type 'outbound'
|
||||
option domain_list_enabled '1'
|
||||
option subnets_list_enabled '0'
|
||||
option custom_domains_list_type 'text'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
option delist_domains_enabled '0'
|
||||
option exclude_from_ip_enabled '0'
|
||||
option yacd '0'
|
||||
option socks5 '0'
|
||||
option exclude_ntp '1'
|
||||
option quic_disable '1'
|
||||
option dont_touch_dhcp '1'
|
||||
option update_interval '1d'
|
||||
option dns_type 'doh'
|
||||
option dns_server 'dns.adguard-dns.com'
|
||||
option split_dns_enabled '0'
|
||||
option dns_rewrite_ttl '60'
|
||||
option cache_file '/tmp/cache.db'
|
||||
list iface 'br-lan'
|
||||
option mon_restart_ifaces '0'
|
||||
option detour '1'
|
||||
option outbound_json '{
|
||||
"type": "http",
|
||||
"tag": "http-proxy",
|
||||
"server": "127.0.0.1",
|
||||
"server_port": 18080
|
||||
}'
|
||||
list domain_list 'geoblock'
|
||||
list domain_list 'block'
|
||||
list domain_list 'meta'
|
||||
list domain_list 'twitter'
|
||||
list domain_list 'hdrezka'
|
||||
list domain_list 'google_ai'
|
||||
option custom_domains_text 'myip.com'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
|
||||
config extra 'Youtube_Discord'
|
||||
option mode 'vpn'
|
||||
option interface 'awg10'
|
||||
option domain_list_enabled '1'
|
||||
list domain_list 'youtube'
|
||||
list domain_list 'discord'
|
||||
option custom_domains_list_type 'text'
|
||||
option custom_domains_text '2ip.ru'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
@@ -1,54 +0,0 @@
|
||||
|
||||
config main 'main'
|
||||
option mode 'proxy'
|
||||
option proxy_config_type 'outbound'
|
||||
option domain_list_enabled '1'
|
||||
option subnets_list_enabled '0'
|
||||
option custom_domains_list_type 'text'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
option delist_domains_enabled '0'
|
||||
option exclude_from_ip_enabled '0'
|
||||
option yacd '0'
|
||||
option socks5 '0'
|
||||
option exclude_ntp '1'
|
||||
option quic_disable '1'
|
||||
option dont_touch_dhcp '1'
|
||||
option update_interval '1d'
|
||||
option dns_type 'doh'
|
||||
option dns_server 'dns.adguard-dns.com'
|
||||
option split_dns_enabled '0'
|
||||
option dns_rewrite_ttl '60'
|
||||
option cache_file '/tmp/cache.db'
|
||||
list iface 'br-lan'
|
||||
option mon_restart_ifaces '0'
|
||||
option detour '1'
|
||||
option outbound_json '{
|
||||
"type": "http",
|
||||
"tag": "http-proxy",
|
||||
"server": "127.0.0.1",
|
||||
"server_port": 18080
|
||||
}'
|
||||
list domain_list 'geoblock'
|
||||
list domain_list 'block'
|
||||
list domain_list 'meta'
|
||||
list domain_list 'twitter'
|
||||
list domain_list 'hdrezka'
|
||||
list domain_list 'google_ai'
|
||||
option custom_domains_text 'myip.com'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
|
||||
config extra 'Discord'
|
||||
option mode 'vpn'
|
||||
option interface 'awg10'
|
||||
option domain_list_enabled '1'
|
||||
list domain_list 'discord'
|
||||
option custom_domains_list_type 'text'
|
||||
option custom_domains_text '2ip.ru'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
@@ -1,42 +0,0 @@
|
||||
|
||||
config main 'main'
|
||||
option mode 'proxy'
|
||||
option proxy_config_type 'outbound'
|
||||
option domain_list_enabled '1'
|
||||
option subnets_list_enabled '0'
|
||||
option custom_domains_list_type 'text'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
option delist_domains_enabled '0'
|
||||
option exclude_from_ip_enabled '0'
|
||||
option yacd '0'
|
||||
option socks5 '0'
|
||||
option exclude_ntp '1'
|
||||
option quic_disable '1'
|
||||
option dont_touch_dhcp '1'
|
||||
option update_interval '1d'
|
||||
option dns_type 'doh'
|
||||
option dns_server 'dns.adguard-dns.com'
|
||||
option split_dns_enabled '0'
|
||||
option dns_rewrite_ttl '60'
|
||||
option cache_file '/tmp/cache.db'
|
||||
list iface 'br-lan'
|
||||
option mon_restart_ifaces '0'
|
||||
option detour '1'
|
||||
option outbound_json '{
|
||||
"type": "http",
|
||||
"tag": "http-proxy",
|
||||
"server": "127.0.0.1",
|
||||
"server_port": 18080
|
||||
}'
|
||||
list domain_list 'geoblock'
|
||||
list domain_list 'block'
|
||||
list domain_list 'meta'
|
||||
list domain_list 'twitter'
|
||||
list domain_list 'hdrezka'
|
||||
list domain_list 'google_ai'
|
||||
list domain_list 'discord'
|
||||
option custom_domains_text 'myip.com'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
@@ -1,43 +0,0 @@
|
||||
|
||||
config main 'main'
|
||||
option mode 'proxy'
|
||||
option proxy_config_type 'outbound'
|
||||
option domain_list_enabled '1'
|
||||
option subnets_list_enabled '0'
|
||||
option custom_domains_list_type 'text'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
option delist_domains_enabled '0'
|
||||
option exclude_from_ip_enabled '0'
|
||||
option yacd '0'
|
||||
option socks5 '0'
|
||||
option exclude_ntp '1'
|
||||
option quic_disable '1'
|
||||
option dont_touch_dhcp '1'
|
||||
option update_interval '1d'
|
||||
option dns_type 'doh'
|
||||
option dns_server 'dns.adguard-dns.com'
|
||||
option split_dns_enabled '0'
|
||||
option dns_rewrite_ttl '60'
|
||||
option cache_file '/tmp/cache.db'
|
||||
list iface 'br-lan'
|
||||
option mon_restart_ifaces '0'
|
||||
option detour '1'
|
||||
option outbound_json '{
|
||||
"type": "http",
|
||||
"tag": "http-proxy",
|
||||
"server": "127.0.0.1",
|
||||
"server_port": 18080
|
||||
}'
|
||||
list domain_list 'geoblock'
|
||||
list domain_list 'block'
|
||||
list domain_list 'meta'
|
||||
list domain_list 'twitter'
|
||||
list domain_list 'hdrezka'
|
||||
list domain_list 'google_ai'
|
||||
list domain_list 'discord'
|
||||
list domain_list 'youtube'
|
||||
option custom_domains_text 'myip.com'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
@@ -1,36 +0,0 @@
|
||||
|
||||
config main 'main'
|
||||
option mode 'vpn'
|
||||
option interface 'awg10'
|
||||
option domain_list_enabled '1'
|
||||
option subnets_list_enabled '0'
|
||||
option custom_domains_list_type 'text'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
option delist_domains_enabled '0'
|
||||
option exclude_from_ip_enabled '0'
|
||||
option yacd '0'
|
||||
option socks5 '0'
|
||||
option exclude_ntp '1'
|
||||
option quic_disable '1'
|
||||
option dont_touch_dhcp '1'
|
||||
option update_interval '1d'
|
||||
option dns_type 'doh'
|
||||
option dns_server 'dns.adguard-dns.com'
|
||||
option split_dns_enabled '0'
|
||||
option dns_rewrite_ttl '60'
|
||||
option cache_file '/tmp/cache.db'
|
||||
list iface 'br-lan'
|
||||
option mon_restart_ifaces '0'
|
||||
option detour '1'
|
||||
list domain_list 'block'
|
||||
list domain_list 'meta'
|
||||
list domain_list 'twitter'
|
||||
list domain_list 'hdrezka'
|
||||
list domain_list 'telegram'
|
||||
list domain_list 'discord'
|
||||
list domain_list 'youtube'
|
||||
option custom_domains_text 'myip.com'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
@@ -1,35 +0,0 @@
|
||||
|
||||
config main 'main'
|
||||
option mode 'vpn'
|
||||
option interface 'awg10'
|
||||
option domain_list_enabled '1'
|
||||
option subnets_list_enabled '0'
|
||||
option custom_domains_list_type 'text'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
option delist_domains_enabled '0'
|
||||
option exclude_from_ip_enabled '0'
|
||||
option yacd '0'
|
||||
option socks5 '0'
|
||||
option exclude_ntp '1'
|
||||
option quic_disable '1'
|
||||
option dont_touch_dhcp '1'
|
||||
option update_interval '1d'
|
||||
option dns_type 'doh'
|
||||
option dns_server 'dns.adguard-dns.com'
|
||||
option split_dns_enabled '0'
|
||||
option dns_rewrite_ttl '60'
|
||||
option cache_file '/tmp/cache.db'
|
||||
list iface 'br-lan'
|
||||
option mon_restart_ifaces '0'
|
||||
option detour '1'
|
||||
list domain_list 'block'
|
||||
list domain_list 'meta'
|
||||
list domain_list 'twitter'
|
||||
list domain_list 'hdrezka'
|
||||
list domain_list 'telegram'
|
||||
list domain_list 'discord'
|
||||
option custom_domains_text 'myip.com'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
@@ -1,102 +0,0 @@
|
||||
|
||||
config main 'main'
|
||||
option mode 'vpn'
|
||||
option domain_list_enabled '0'
|
||||
option subnets_list_enabled '1'
|
||||
option custom_domains_list_enabled 'dynamic'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option exclude_from_ip_enabled '0'
|
||||
option update_interval '0 4 * * *'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option interface 'awg10'
|
||||
list subnets 'meta'
|
||||
list subnets 'twitter'
|
||||
list subnets 'discord'
|
||||
list custom_domains '2ip.ru'
|
||||
list custom_domains 'rutracker.org'
|
||||
list custom_domains 'rutracker.net'
|
||||
list custom_domains 'rutracker.cc'
|
||||
list custom_domains 'rutor.info'
|
||||
list custom_domains 'nnmclub.to'
|
||||
list custom_domains 'lostfilm.tv'
|
||||
list custom_domains 'animego.org'
|
||||
list custom_domains 'jut.su'
|
||||
list custom_domains 'anilibria.tv'
|
||||
list custom_domains 'twimg.com'
|
||||
list custom_domains 'kinozal.tv'
|
||||
list custom_domains 'cdninstagram.com'
|
||||
list custom_domains 'instagram.com'
|
||||
list custom_domains 'ig.me'
|
||||
list custom_domains 'fbcdn.net'
|
||||
list custom_domains 'facebook.com'
|
||||
list custom_domains 'facebook.net'
|
||||
list custom_domains 'fb.com'
|
||||
list custom_domains 'discord.com'
|
||||
list custom_domains 'discordapp.com'
|
||||
list custom_domains 'discord.gg'
|
||||
list custom_domains 'discordapp.net'
|
||||
list custom_domains 'discord.media'
|
||||
|
||||
config second 'second'
|
||||
option second_enable '1'
|
||||
option domain_list_enabled '0'
|
||||
list domains 'youtube'
|
||||
option second_mode 'proxy'
|
||||
option second_proxy_config_type 'outbound'
|
||||
option second_outbound_json '{
|
||||
"type": "http",
|
||||
"server": "127.0.0.1",
|
||||
"server_port": 18080
|
||||
}'
|
||||
option second_domain_service_enabled '0'
|
||||
option second_custom_domains_list_enabled 'dynamic'
|
||||
option second_custom_subnets_list_enabled 'disabled'
|
||||
list second_custom_domains 'chatgpt.com'
|
||||
list second_custom_domains 'oaistatic.com'
|
||||
list second_custom_domains 'oaiusercontent.com'
|
||||
list second_custom_domains 'openai.com'
|
||||
list second_custom_domains 'microsoft.com'
|
||||
list second_custom_domains 'windowsupdate.com'
|
||||
list second_custom_domains 'bing.com'
|
||||
list second_custom_domains 'supercell.com'
|
||||
list second_custom_domains 'seeurlpcl.com'
|
||||
list second_custom_domains 'supercellid.com'
|
||||
list second_custom_domains 'supercellgames.com'
|
||||
list second_custom_domains 'clashroyale.com'
|
||||
list second_custom_domains 'brawlstars.com'
|
||||
list second_custom_domains 'clash.com'
|
||||
list second_custom_domains 'clashofclans.com'
|
||||
list second_custom_domains 'x.ai'
|
||||
list second_custom_domains 'grok.com'
|
||||
list second_custom_domains 'gitgub.com'
|
||||
list second_custom_domains 'searchgpt.com'
|
||||
list second_custom_domains 'xboxlive.com'
|
||||
list second_custom_domains 'gamepass.com'
|
||||
list second_custom_domains 'xboxab.com'
|
||||
list second_custom_domains 'xboxservices.com'
|
||||
list second_custom_domains 'myip.com'
|
||||
list second_custom_domains '4pda.to'
|
||||
list second_custom_domains '4pda.ws'
|
||||
list second_custom_domains 'habr.com'
|
||||
list second_custom_domains 'byteoversea.com'
|
||||
list second_custom_domains 'ibytedtos.com'
|
||||
list second_custom_domains 'muscdn.com'
|
||||
list second_custom_domains 'musical.ly'
|
||||
list second_custom_domains 'tik-tokapi.com'
|
||||
list second_custom_domains 'tiktok.com'
|
||||
list second_custom_domains 'tiktokcdn-us.com'
|
||||
list second_custom_domains 'tiktokcdn-eu.com'
|
||||
list second_custom_domains 'tiktokcdn.com'
|
||||
list second_custom_domains 'tiktokd.net'
|
||||
list second_custom_domains 'tiktokd.org'
|
||||
list second_custom_domains 'tiktokv.com'
|
||||
list second_custom_domains 'tiktokv.us'
|
||||
list second_custom_domains 'tiktokw.us'
|
||||
list second_custom_domains 'ttwstatic.com'
|
||||
list second_custom_domains 'intel.com'
|
||||
list second_custom_domains 'intel.se'
|
||||
list second_custom_domains 'onetrust.com'
|
||||
list second_custom_domains 'gemini.google.com'
|
||||
@@ -1,112 +0,0 @@
|
||||
|
||||
config main 'main'
|
||||
option mode 'vpn'
|
||||
option domain_list_enabled '0'
|
||||
option subnets_list_enabled '1'
|
||||
option custom_domains_list_enabled 'dynamic'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option exclude_from_ip_enabled '0'
|
||||
option update_interval '0 4 * * *'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option interface 'awg10'
|
||||
list subnets 'meta'
|
||||
list subnets 'twitter'
|
||||
list subnets 'discord'
|
||||
list custom_domains '2ip.ru'
|
||||
list custom_domains 'googlevideo.com'
|
||||
list custom_domains 'ggpht.com'
|
||||
list custom_domains 'ytimg.com'
|
||||
list custom_domains 'youtube.com'
|
||||
list custom_domains 'play.google.com'
|
||||
list custom_domains 'youtu.be'
|
||||
list custom_domains 'googleapis.com'
|
||||
list custom_domains 'googleusercontent.com'
|
||||
list custom_domains 'gstatic.com'
|
||||
list custom_domains 'l.google.com'
|
||||
list custom_domains 'rutracker.org'
|
||||
list custom_domains 'rutracker.net'
|
||||
list custom_domains 'rutracker.cc'
|
||||
list custom_domains 'rutor.info'
|
||||
list custom_domains 'nnmclub.to'
|
||||
list custom_domains 'lostfilm.tv'
|
||||
list custom_domains 'animego.org'
|
||||
list custom_domains 'jut.su'
|
||||
list custom_domains 'anilibria.tv'
|
||||
list custom_domains 'twimg.com'
|
||||
list custom_domains 'kinozal.tv'
|
||||
list custom_domains 'cdninstagram.com'
|
||||
list custom_domains 'instagram.com'
|
||||
list custom_domains 'ig.me'
|
||||
list custom_domains 'fbcdn.net'
|
||||
list custom_domains 'facebook.com'
|
||||
list custom_domains 'facebook.net'
|
||||
list custom_domains 'fb.com'
|
||||
list custom_domains 'discord.com'
|
||||
list custom_domains 'discordapp.com'
|
||||
list custom_domains 'discord.gg'
|
||||
list custom_domains 'discordapp.net'
|
||||
list custom_domains 'discord.media'
|
||||
|
||||
config second 'second'
|
||||
option second_enable '0'
|
||||
option domain_list_enabled '0'
|
||||
list domains 'youtube'
|
||||
option second_mode 'proxy'
|
||||
option second_proxy_config_type 'outbound'
|
||||
option second_outbound_json '{
|
||||
"type": "http",
|
||||
"server": "127.0.0.1",
|
||||
"server_port": 18080
|
||||
}'
|
||||
option second_domain_service_enabled '0'
|
||||
option second_custom_domains_list_enabled 'dynamic'
|
||||
option second_custom_subnets_list_enabled 'disabled'
|
||||
list second_custom_domains 'chatgpt.com'
|
||||
list second_custom_domains 'oaistatic.com'
|
||||
list second_custom_domains 'oaiusercontent.com'
|
||||
list second_custom_domains 'openai.com'
|
||||
list second_custom_domains 'microsoft.com'
|
||||
list second_custom_domains 'windowsupdate.com'
|
||||
list second_custom_domains 'bing.com'
|
||||
list second_custom_domains 'supercell.com'
|
||||
list second_custom_domains 'seeurlpcl.com'
|
||||
list second_custom_domains 'supercellid.com'
|
||||
list second_custom_domains 'supercellgames.com'
|
||||
list second_custom_domains 'clashroyale.com'
|
||||
list second_custom_domains 'brawlstars.com'
|
||||
list second_custom_domains 'clash.com'
|
||||
list second_custom_domains 'clashofclans.com'
|
||||
list second_custom_domains 'x.ai'
|
||||
list second_custom_domains 'grok.com'
|
||||
list second_custom_domains 'gitgub.com'
|
||||
list second_custom_domains 'searchgpt.com'
|
||||
list second_custom_domains 'xboxlive.com'
|
||||
list second_custom_domains 'gamepass.com'
|
||||
list second_custom_domains 'xboxab.com'
|
||||
list second_custom_domains 'xboxservices.com'
|
||||
list second_custom_domains 'myip.com'
|
||||
list second_custom_domains '4pda.to'
|
||||
list second_custom_domains '4pda.ws'
|
||||
list second_custom_domains 'habr.com'
|
||||
list second_custom_domains 'byteoversea.com'
|
||||
list second_custom_domains 'ibytedtos.com'
|
||||
list second_custom_domains 'muscdn.com'
|
||||
list second_custom_domains 'musical.ly'
|
||||
list second_custom_domains 'tik-tokapi.com'
|
||||
list second_custom_domains 'tiktok.com'
|
||||
list second_custom_domains 'tiktokcdn-us.com'
|
||||
list second_custom_domains 'tiktokcdn-eu.com'
|
||||
list second_custom_domains 'tiktokcdn.com'
|
||||
list second_custom_domains 'tiktokd.net'
|
||||
list second_custom_domains 'tiktokd.org'
|
||||
list second_custom_domains 'tiktokv.com'
|
||||
list second_custom_domains 'tiktokv.us'
|
||||
list second_custom_domains 'tiktokw.us'
|
||||
list second_custom_domains 'ttwstatic.com'
|
||||
list second_custom_domains 'intel.com'
|
||||
list second_custom_domains 'intel.se'
|
||||
list second_custom_domains 'onetrust.com'
|
||||
list second_custom_domains 'gemini.google.com'
|
||||
@@ -1,102 +0,0 @@
|
||||
|
||||
config main 'main'
|
||||
option mode 'vpn'
|
||||
option domain_list_enabled '0'
|
||||
option subnets_list_enabled '1'
|
||||
option custom_domains_list_enabled 'dynamic'
|
||||
option custom_subnets_list_enabled 'disabled'
|
||||
option all_traffic_from_ip_enabled '0'
|
||||
option custom_download_domains_list_enabled '0'
|
||||
option custom_download_subnets_list_enabled '0'
|
||||
option exclude_from_ip_enabled '0'
|
||||
option update_interval '0 4 * * *'
|
||||
option custom_local_domains_list_enabled '0'
|
||||
option interface 'awg10'
|
||||
list subnets 'meta'
|
||||
list subnets 'twitter'
|
||||
list subnets 'discord'
|
||||
list custom_domains '2ip.ru'
|
||||
list custom_domains 'rutracker.org'
|
||||
list custom_domains 'rutracker.net'
|
||||
list custom_domains 'rutracker.cc'
|
||||
list custom_domains 'rutor.info'
|
||||
list custom_domains 'nnmclub.to'
|
||||
list custom_domains 'lostfilm.tv'
|
||||
list custom_domains 'animego.org'
|
||||
list custom_domains 'jut.su'
|
||||
list custom_domains 'anilibria.tv'
|
||||
list custom_domains 'twimg.com'
|
||||
list custom_domains 'kinozal.tv'
|
||||
list custom_domains 'cdninstagram.com'
|
||||
list custom_domains 'instagram.com'
|
||||
list custom_domains 'ig.me'
|
||||
list custom_domains 'fbcdn.net'
|
||||
list custom_domains 'facebook.com'
|
||||
list custom_domains 'facebook.net'
|
||||
list custom_domains 'fb.com'
|
||||
list custom_domains 'discord.com'
|
||||
list custom_domains 'discordapp.com'
|
||||
list custom_domains 'discord.gg'
|
||||
list custom_domains 'discordapp.net'
|
||||
list custom_domains 'discord.media'
|
||||
|
||||
config second 'second'
|
||||
option second_enable '0'
|
||||
option domain_list_enabled '0'
|
||||
list domains 'youtube'
|
||||
option second_mode 'proxy'
|
||||
option second_proxy_config_type 'outbound'
|
||||
option second_outbound_json '{
|
||||
"type": "http",
|
||||
"server": "127.0.0.1",
|
||||
"server_port": 18080
|
||||
}'
|
||||
option second_domain_service_enabled '0'
|
||||
option second_custom_domains_list_enabled 'dynamic'
|
||||
option second_custom_subnets_list_enabled 'disabled'
|
||||
list second_custom_domains 'chatgpt.com'
|
||||
list second_custom_domains 'oaistatic.com'
|
||||
list second_custom_domains 'oaiusercontent.com'
|
||||
list second_custom_domains 'openai.com'
|
||||
list second_custom_domains 'microsoft.com'
|
||||
list second_custom_domains 'windowsupdate.com'
|
||||
list second_custom_domains 'bing.com'
|
||||
list second_custom_domains 'supercell.com'
|
||||
list second_custom_domains 'seeurlpcl.com'
|
||||
list second_custom_domains 'supercellid.com'
|
||||
list second_custom_domains 'supercellgames.com'
|
||||
list second_custom_domains 'clashroyale.com'
|
||||
list second_custom_domains 'brawlstars.com'
|
||||
list second_custom_domains 'clash.com'
|
||||
list second_custom_domains 'clashofclans.com'
|
||||
list second_custom_domains 'x.ai'
|
||||
list second_custom_domains 'grok.com'
|
||||
list second_custom_domains 'gitgub.com'
|
||||
list second_custom_domains 'searchgpt.com'
|
||||
list second_custom_domains 'xboxlive.com'
|
||||
list second_custom_domains 'gamepass.com'
|
||||
list second_custom_domains 'xboxab.com'
|
||||
list second_custom_domains 'xboxservices.com'
|
||||
list second_custom_domains 'myip.com'
|
||||
list second_custom_domains '4pda.to'
|
||||
list second_custom_domains '4pda.ws'
|
||||
list second_custom_domains 'habr.com'
|
||||
list second_custom_domains 'byteoversea.com'
|
||||
list second_custom_domains 'ibytedtos.com'
|
||||
list second_custom_domains 'muscdn.com'
|
||||
list second_custom_domains 'musical.ly'
|
||||
list second_custom_domains 'tik-tokapi.com'
|
||||
list second_custom_domains 'tiktok.com'
|
||||
list second_custom_domains 'tiktokcdn-us.com'
|
||||
list second_custom_domains 'tiktokcdn-eu.com'
|
||||
list second_custom_domains 'tiktokcdn.com'
|
||||
list second_custom_domains 'tiktokd.net'
|
||||
list second_custom_domains 'tiktokd.org'
|
||||
list second_custom_domains 'tiktokv.com'
|
||||
list second_custom_domains 'tiktokv.us'
|
||||
list second_custom_domains 'tiktokw.us'
|
||||
list second_custom_domains 'ttwstatic.com'
|
||||
list second_custom_domains 'intel.com'
|
||||
list second_custom_domains 'intel.se'
|
||||
list second_custom_domains 'onetrust.com'
|
||||
list second_custom_domains 'gemini.google.com'
|
||||
@@ -1,86 +0,0 @@
|
||||
|
||||
config stubby 'global'
|
||||
option manual '0'
|
||||
list dns_transport 'GETDNS_TRANSPORT_TLS'
|
||||
option tls_authentication '1'
|
||||
option tls_query_padding_blocksize '128'
|
||||
option appdata_dir '/var/lib/stubby'
|
||||
option edns_client_subnet_private '1'
|
||||
option idle_timeout '10000'
|
||||
option round_robin_upstreams '0'
|
||||
list listen_address '127.0.0.1@5453'
|
||||
list listen_address '0::1@5453'
|
||||
list trigger 'wan'
|
||||
list trigger 'wan6'
|
||||
list trigger 'pppoe'
|
||||
list trigger 'l2tp'
|
||||
list trigger 'pptp'
|
||||
list trigger 'modem'
|
||||
list trigger 'wwan'
|
||||
list trigger 'wwan0'
|
||||
option log_level '0'
|
||||
|
||||
config resolver
|
||||
option address '94.140.14.14'
|
||||
option tls_auth_name 'dns.adguard.com'
|
||||
|
||||
config resolver
|
||||
option address '94.140.14.15'
|
||||
option tls_auth_name 'dns.adguard.com'
|
||||
|
||||
config resolver
|
||||
option address '2a10:50c0::ad1:ff'
|
||||
option tls_auth_name 'dns.adguard.com'
|
||||
|
||||
config resolver
|
||||
option address '2a10:50c0::ad2:ff'
|
||||
option tls_auth_name 'dns.adguard.com'
|
||||
|
||||
config resolver
|
||||
option address '8.8.8.8'
|
||||
option tls_auth_name 'dns.google'
|
||||
|
||||
config resolver
|
||||
option address '1.1.1.1'
|
||||
option tls_auth_name 'cloudflare-dns.com'
|
||||
|
||||
config resolver
|
||||
option address '2001:4860:4860::8888'
|
||||
option tls_auth_name 'dns.google'
|
||||
|
||||
config resolver
|
||||
option address '2606:4700:4700::1111'
|
||||
option tls_auth_name 'cloudflare-dns.com'
|
||||
|
||||
config resolver
|
||||
option address '8.8.4.4'
|
||||
option tls_auth_name 'dns.google'
|
||||
|
||||
config resolver
|
||||
option address '1.0.0.1'
|
||||
option tls_auth_name 'cloudflare-dns.com'
|
||||
|
||||
config resolver
|
||||
option address '2001:4860:4860::8844'
|
||||
option tls_auth_name 'dns.google'
|
||||
|
||||
config resolver
|
||||
option address '2606:4700:4700::1001'
|
||||
option tls_auth_name 'cloudflare-dns.com'
|
||||
|
||||
config resolver
|
||||
option address '9.9.9.9'
|
||||
option tls_auth_name 'dns.quad9.net'
|
||||
|
||||
config resolver
|
||||
option address '149.112.112.112'
|
||||
option tls_auth_name 'dns.quad9.net'
|
||||
|
||||
config resolver
|
||||
option address '2620:fe::fe'
|
||||
option tls_auth_name 'dns.quad9.net'
|
||||
|
||||
config resolver
|
||||
option address '2620:fe::9'
|
||||
option tls_auth_name 'dns.quad9.net'
|
||||
|
||||
@@ -8,7 +8,7 @@ config youtubeUnblock 'youtubeUnblock'
|
||||
|
||||
config section
|
||||
option name 'Youtube'
|
||||
option enabled '1'
|
||||
option enabled '0'
|
||||
option tls_enabled '1'
|
||||
option fake_sni '1'
|
||||
option faking_strategy 'pastseq'
|
||||
@@ -36,37 +36,6 @@ config section
|
||||
list sni_domains 'l.google.com'
|
||||
option quic_drop '1'
|
||||
|
||||
config section
|
||||
option name 'Discord'
|
||||
option tls_enabled '1'
|
||||
option fake_sni '1'
|
||||
option faking_strategy 'pastseq'
|
||||
option fake_sni_seq_len '1'
|
||||
option fake_sni_type 'default'
|
||||
option frag 'tcp'
|
||||
option frag_sni_reverse '1'
|
||||
option frag_sni_faked '0'
|
||||
option frag_middle_sni '1'
|
||||
option frag_sni_pos '1'
|
||||
option seg2delay '0'
|
||||
option fk_winsize '0'
|
||||
option synfake '0'
|
||||
option all_domains '0'
|
||||
option sni_detection 'parse'
|
||||
option quic_drop '0'
|
||||
option udp_mode 'fake'
|
||||
option udp_faking_strategy 'none'
|
||||
option udp_fake_seq_len '6'
|
||||
option udp_fake_len '64'
|
||||
list udp_dport_filter '50000-50100 '
|
||||
option udp_filter_quic 'disabled'
|
||||
option enabled '1'
|
||||
list sni_domains 'discord.com'
|
||||
list sni_domains 'discordapp.com'
|
||||
list sni_domains 'discord.gg'
|
||||
list sni_domains 'discordapp.net'
|
||||
list sni_domains 'discord.media'
|
||||
|
||||
config section
|
||||
option name 'CallsWhatsAppTelegram'
|
||||
option tls_enabled '0'
|
||||
@@ -102,4 +71,5 @@ config section
|
||||
option udp_fake_len '64'
|
||||
option udp_filter_quic 'disabled'
|
||||
option enabled '1'
|
||||
option udp_stun_filter '1'
|
||||
option udp_stun_filter '1'
|
||||
|
||||
@@ -36,6 +36,37 @@ config section
|
||||
list sni_domains 'l.google.com'
|
||||
option quic_drop '1'
|
||||
|
||||
config section
|
||||
option name 'Discord'
|
||||
option tls_enabled '1'
|
||||
option fake_sni '1'
|
||||
option faking_strategy 'pastseq'
|
||||
option fake_sni_seq_len '1'
|
||||
option fake_sni_type 'default'
|
||||
option frag 'tcp'
|
||||
option frag_sni_reverse '1'
|
||||
option frag_sni_faked '0'
|
||||
option frag_middle_sni '1'
|
||||
option frag_sni_pos '1'
|
||||
option seg2delay '0'
|
||||
option fk_winsize '0'
|
||||
option synfake '0'
|
||||
option all_domains '0'
|
||||
option sni_detection 'parse'
|
||||
option quic_drop '0'
|
||||
option udp_mode 'fake'
|
||||
option udp_faking_strategy 'none'
|
||||
option udp_fake_seq_len '6'
|
||||
option udp_fake_len '64'
|
||||
list udp_dport_filter '50000-50100 '
|
||||
option udp_filter_quic 'disabled'
|
||||
option enabled '1'
|
||||
list sni_domains 'discord.com'
|
||||
list sni_domains 'discordapp.com'
|
||||
list sni_domains 'discord.gg'
|
||||
list sni_domains 'discordapp.net'
|
||||
list sni_domains 'discord.media'
|
||||
|
||||
config section
|
||||
option name 'CallsWhatsAppTelegram'
|
||||
option tls_enabled '0'
|
||||
|
||||
@@ -1,55 +0,0 @@
|
||||
|
||||
config main 'config'
|
||||
option run_on_boot '1'
|
||||
option FWTYPE 'nftables'
|
||||
option POSTNAT '1'
|
||||
option FLOWOFFLOAD 'none'
|
||||
option INIT_APPLY_FW '1'
|
||||
option DISABLE_IPV4 '0'
|
||||
option DISABLE_IPV6 '1'
|
||||
option FILTER_TTL_EXPIRED_ICMP '1'
|
||||
option MODE_FILTER 'hostlist'
|
||||
option DISABLE_CUSTOM '0'
|
||||
option WS_USER 'daemon'
|
||||
option DAEMON_LOG_ENABLE '0'
|
||||
option DAEMON_LOG_FILE '/tmp/zapret+<DAEMON_NAME>+<DAEMON_IDNUM>+<DAEMON_CFGNAME>.log'
|
||||
option AUTOHOSTLIST_RETRANS_THRESHOLD '3'
|
||||
option AUTOHOSTLIST_FAIL_THRESHOLD '3'
|
||||
option AUTOHOSTLIST_FAIL_TIME '60'
|
||||
option AUTOHOSTLIST_DEBUGLOG '0'
|
||||
option NFQWS_ENABLE '1'
|
||||
option DESYNC_MARK '0x40000000'
|
||||
option DESYNC_MARK_POSTNAT '0x20000000'
|
||||
option NFQWS_PORTS_TCP '80,443'
|
||||
option NFQWS_PORTS_UDP '443'
|
||||
option NFQWS_TCP_PKT_OUT '9'
|
||||
option NFQWS_TCP_PKT_IN '3'
|
||||
option NFQWS_UDP_PKT_OUT '9'
|
||||
option NFQWS_UDP_PKT_IN '0'
|
||||
option NFQWS_PORTS_TCP_KEEPALIVE '0'
|
||||
option NFQWS_PORTS_UDP_KEEPALIVE '0'
|
||||
option NFQWS_OPT '
|
||||
--filter-tcp=80 <HOSTLIST>
|
||||
--dpi-desync=fake,fakedsplit
|
||||
--dpi-desync-autottl=2
|
||||
--dpi-desync-fooling=badsum
|
||||
--new
|
||||
--filter-tcp=443
|
||||
--hostlist=/opt/zapret/ipset/zapret-hosts-google.txt
|
||||
--dpi-desync=multidisorder
|
||||
--dpi-desync-split-pos=1,midsld
|
||||
--new
|
||||
--filter-udp=443 --hostlist=/opt/zapret/ipset/zapret-hosts-google.txt
|
||||
--dpi-desync=fake
|
||||
--dpi-desync-repeats=11
|
||||
--dpi-desync-fake-quic=/opt/zapret/files/fake/quic_initial_www_google_com.bin
|
||||
--new
|
||||
--filter-udp=443 <HOSTLIST_NOAUTO>
|
||||
--dpi-desync=fake
|
||||
--dpi-desync-repeats=11
|
||||
--new
|
||||
--filter-tcp=443 <HOSTLIST>
|
||||
--dpi-desync=multidisorder
|
||||
--dpi-desync-split-pos=1,sniext+1,host+1,midsld-2,midsld,midsld+2,endhost-1
|
||||
'
|
||||
|
||||
@@ -1,34 +0,0 @@
|
||||
speedtest.net
|
||||
discord.com
|
||||
discordapp.com
|
||||
discord.gg
|
||||
discordapp.net
|
||||
discord.media
|
||||
cdninstagram.com
|
||||
instagram.com
|
||||
ig.me
|
||||
fbcdn.net
|
||||
facebook.com
|
||||
facebook.net
|
||||
fb.com
|
||||
rutracker.org
|
||||
rutracker.net
|
||||
rutracker.cc
|
||||
rutor.info
|
||||
rutor.is
|
||||
nnmclub.to
|
||||
twitter.com
|
||||
t.co
|
||||
twimg.com
|
||||
ads-twitter.com
|
||||
x.com
|
||||
pscp.tv
|
||||
twtrdns.net
|
||||
twttr.com
|
||||
periscope.tv
|
||||
tweetdeck.com
|
||||
twitpic.com
|
||||
twitter.co
|
||||
twitterinc.com
|
||||
twitteroauth.com
|
||||
twitterstat.us
|
||||
@@ -1 +0,0 @@
|
||||
speedtest.net
|
||||
@@ -1,6 +1,6 @@
|
||||
#!/bin/sh
|
||||
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/main"
|
||||
DIR="/etc/config"
|
||||
DIR_BACKUP="/root/backup"
|
||||
config_files="dhcp
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
#!/bin/sh
|
||||
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/main"
|
||||
DIR="/etc/config"
|
||||
DIR_BACKUP="/root/backup"
|
||||
config_files="dhcp
|
||||
|
||||
@@ -1,68 +0,0 @@
|
||||
#!/bin/sh
|
||||
|
||||
DIR="/etc/config"
|
||||
DIR_BACKUP="/root/backup3"
|
||||
config_files="network
|
||||
firewall
|
||||
youtubeUnblock
|
||||
https-dns-proxy
|
||||
dhcp
|
||||
dns-failsafe-proxy"
|
||||
|
||||
manage_package() {
|
||||
local name="$1"
|
||||
local autostart="$2"
|
||||
local process="$3"
|
||||
|
||||
# Проверка, установлен ли пакет
|
||||
if opkg list-installed | grep -q "^$name"; then
|
||||
|
||||
# Проверка, включен ли автозапуск
|
||||
if /etc/init.d/$name enabled; then
|
||||
if [ "$autostart" = "disable" ]; then
|
||||
/etc/init.d/$name disable
|
||||
fi
|
||||
else
|
||||
if [ "$autostart" = "enable" ]; then
|
||||
/etc/init.d/$name enable
|
||||
fi
|
||||
fi
|
||||
|
||||
# Проверка, запущен ли процесс
|
||||
if pidof $name > /dev/null; then
|
||||
if [ "$process" = "stop" ]; then
|
||||
/etc/init.d/$name stop
|
||||
fi
|
||||
else
|
||||
if [ "$process" = "start" ]; then
|
||||
/etc/init.d/$name start
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
if [ -d "$DIR_BACKUP" ]
|
||||
then
|
||||
echo "Restore configs..."
|
||||
for file in $config_files
|
||||
do
|
||||
cp -f "$DIR_BACKUP/$file" "$DIR/$file"
|
||||
done
|
||||
|
||||
rm -rf "$DIR_BACKUP"
|
||||
fi
|
||||
|
||||
echo "Stop and disabled autostart Podkop..."
|
||||
manage_package "podkop" "disable" "stop"
|
||||
|
||||
echo "Run and enabled autostart youtubeUnblock and ruantiblock..."
|
||||
manage_package "youtubeUnblock" "enable" "start"
|
||||
manage_package "ruantiblock" "enable" "start"
|
||||
|
||||
printf "\033[32;1mRestart firewall, dnsmasq, odhcpd...\033[0m\n"
|
||||
service firewall restart
|
||||
service dnsmasq restart
|
||||
service odhcpd restart
|
||||
#service network restart
|
||||
|
||||
printf "\033[32;1mOff configured completed...\033[0m\n"
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1,16 +0,0 @@
|
||||
#!/bin/sh
|
||||
|
||||
DESCRIPTION=$(ubus call system board | jsonfilter -e '@.release.description')
|
||||
VERSION=$(ubus call system board | jsonfilter -e '@.release.version')
|
||||
findKey="RouteRich"
|
||||
findVersion="24.10.2"
|
||||
|
||||
if echo "$DESCRIPTION" | grep -qi -- "$findKey" && printf '%s\n%s\n' "$findVersion" "$VERSION" | sort -V | tail -n1 | grep -qx -- "$VERSION"; then
|
||||
printf "\033[32;1mThis new firmware. Running new scprit...\033[0m\n"
|
||||
wget --no-check-certificate -O /tmp/universal_config_new_podkop.sh https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop/universal_config_new_podkop.sh && chmod +x /tmp/universal_config_new_podkop.sh && /tmp/universal_config_new_podkop.sh $1 $2
|
||||
else
|
||||
printf "\033[32;1mThis old firmware.\nRecommendation, upgrade firmware to actual release...\nSleep 5 sec...\033[0m\n"
|
||||
sleep 5
|
||||
printf "\033[32;1mRunning old scprit...\033[0m\n"
|
||||
wget --no-check-certificate -O /tmp/universal_config.sh https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop/universal_config.sh && chmod +x /tmp/universal_config.sh && /tmp/universal_config.sh $1 $2
|
||||
fi
|
||||
@@ -120,191 +120,118 @@ manage_package() {
|
||||
fi
|
||||
}
|
||||
|
||||
checkPackageAndInstall()
|
||||
{
|
||||
|
||||
checkPackageAndInstall() {
|
||||
local name="$1"
|
||||
local isRequried="$2"
|
||||
#проверяем установлени ли библиотека $name
|
||||
if opkg list-installed | grep -q $name; then
|
||||
echo "$name already installed..."
|
||||
local isRequired="$2"
|
||||
local alt=""
|
||||
|
||||
if [ "$name" = "https-dns-proxy" ]; then
|
||||
alt="luci-app-doh-proxy"
|
||||
fi
|
||||
|
||||
if [ -n "$alt" ]; then
|
||||
if opkg list-installed | grep -qE "^($name|$alt) "; then
|
||||
echo "$name or $alt already installed..."
|
||||
return 0
|
||||
fi
|
||||
else
|
||||
echo "$name not installed. Installed $name..."
|
||||
opkg install $name
|
||||
res=$?
|
||||
if [ "$isRequried" = "1" ]; then
|
||||
if [ $res -eq 0 ]; then
|
||||
echo "$name insalled successfully"
|
||||
else
|
||||
echo "Error installing $name. Please, install $name manually and run the script again"
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
if opkg list-installed | grep -q "^$name "; then
|
||||
echo "$name already installed..."
|
||||
return 0
|
||||
fi
|
||||
fi
|
||||
|
||||
echo "$name not installed. Installing $name..."
|
||||
opkg install "$name"
|
||||
res=$?
|
||||
|
||||
if [ "$isRequired" = "1" ]; then
|
||||
if [ $res -eq 0 ]; then
|
||||
echo "$name installed successfully"
|
||||
else
|
||||
echo "Error installing $name. Please, install $name manually$( [ -n "$alt" ] && echo " or $alt") and run the script again."
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
requestConfWARP1()
|
||||
{
|
||||
HASH='68747470733a2f2f73616e74612d61746d6f2e72752f776172702f776172702e706870'
|
||||
COMPILE=$(printf '%b' "$(printf '%s\n' "$HASH" | sed 's/../\\x&/g')")
|
||||
#запрос конфигурации WARP
|
||||
local response=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" "$COMPILE" \
|
||||
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
|
||||
-H "referer: $COMPILE" \
|
||||
-H "Origin: $COMPILE")
|
||||
echo "$response"
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp.llimonix.pw/api/warp' \
|
||||
-H 'Accept: */*' \
|
||||
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
|
||||
-H 'Connection: keep-alive' \
|
||||
-H 'Content-Type: application/json' \
|
||||
-H 'Origin: https://warp.llimonix.pw' \
|
||||
-H 'Referer: https://warp.llimonix.pw/' \
|
||||
-H 'Sec-Fetch-Dest: empty' \
|
||||
-H 'Sec-Fetch-Mode: cors' \
|
||||
-H 'Sec-Fetch-Site: same-origin' \
|
||||
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36' \
|
||||
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133")' \
|
||||
-H 'sec-ch-ua-mobile: ?0' \
|
||||
-H 'sec-ch-ua-platform: "Windows"' \
|
||||
--data-raw '{"selectedServices":[],"siteMode":"all","deviceType":"computer"}')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
requestConfWARP2()
|
||||
{
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://dulcet-fox-556b08.netlify.app/api/warp' \
|
||||
-H 'Accept: */*' \
|
||||
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
|
||||
-H 'Connection: keep-alive' \
|
||||
-H 'Content-Type: application/json' \
|
||||
-H 'Origin: https://dulcet-fox-556b08.netlify.app/api/warp' \
|
||||
-H 'Referer: https://dulcet-fox-556b08.netlify.app/api/warp' \
|
||||
-H 'Sec-Fetch-Dest: empty' \
|
||||
-H 'Sec-Fetch-Mode: cors' \
|
||||
-H 'Sec-Fetch-Site: same-origin' \
|
||||
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/140.0.0.0 Safari/537.36' \
|
||||
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133")' \
|
||||
-H 'sec-ch-ua-mobile: ?0' \
|
||||
-H 'sec-ch-ua-platform: "Windows"' \
|
||||
--data-raw '{"selectedServices":[],"siteMode":"all","deviceType":"computer","endpoint":"162.159.195.1:500"}')
|
||||
echo "$result"
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://topor-warp.vercel.app/generate' \
|
||||
-H 'Accept: */*' \
|
||||
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
|
||||
-H 'Connection: keep-alive' \
|
||||
-H 'Content-Type: application/json' \
|
||||
-H 'Origin: https://topor-warp.vercel.app' \
|
||||
-H 'Referer: https://topor-warp.vercel.app/' \
|
||||
-H 'Sec-Fetch-Dest: empty' \
|
||||
-H 'Sec-Fetch-Mode: cors' \
|
||||
-H 'Sec-Fetch-Site: same-origin' \
|
||||
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36' \
|
||||
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133"' \
|
||||
-H 'sec-ch-ua-mobile: ?0' \
|
||||
-H 'sec-ch-ua-platform: "Windows"' \
|
||||
--data-raw '{"platform":"all"}')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
requestConfWARP3()
|
||||
{
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp-config-generator-theta.vercel.app/api/warp' \
|
||||
-H 'Accept: */*' \
|
||||
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
|
||||
-H 'Connection: keep-alive' \
|
||||
-H 'Content-Type: application/json' \
|
||||
-H 'Origin: https://warp-config-generator-theta.vercel.app/api/warp' \
|
||||
-H 'Referer: https://warp-config-generator-theta.vercel.app/api/warp' \
|
||||
-H 'Sec-Fetch-Dest: empty' \
|
||||
-H 'Sec-Fetch-Mode: cors' \
|
||||
-H 'Sec-Fetch-Site: same-origin' \
|
||||
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/140.0.0.0 Safari/537.36' \
|
||||
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133")' \
|
||||
-H 'sec-ch-ua-mobile: ?0' \
|
||||
-H 'sec-ch-ua-platform: "Windows"' \
|
||||
--data-raw '{"selectedServices":[],"siteMode":"all","deviceType":"computer","endpoint":"162.159.195.1:500"}')
|
||||
echo "$result"
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp-gen.vercel.app/generate-config' \
|
||||
-H 'Accept: */*' \
|
||||
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
|
||||
-H 'Connection: keep-alive' \
|
||||
-H 'Referer: https://warp-gen.vercel.app/' \
|
||||
-H 'Sec-Fetch-Dest: empty' \
|
||||
-H 'Sec-Fetch-Mode: cors' \
|
||||
-H 'Sec-Fetch-Site: same-origin' \
|
||||
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36' \
|
||||
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133"' \
|
||||
-H 'sec-ch-ua-mobile: ?0' \
|
||||
-H 'sec-ch-ua-platform: "Windows"')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
requestConfWARP4()
|
||||
{
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://generator-warp-config.vercel.app/warp4s?dns=1.1.1.1%2C%201.0.0.1%2C%202606%3A4700%3A4700%3A%3A1111%2C%202606%3A4700%3A4700%3A%3A1001&allowedIPs=0.0.0.0%2F0%2C%20%3A%3A%2F0' \
|
||||
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
|
||||
-H 'referer: https://generator-warp-config.vercel.app' \
|
||||
-H "Origin: https://generator-warp-config.vercel.app")
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
requestConfWARP5()
|
||||
{
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://valokda-amnezia.vercel.app/api/warp' \
|
||||
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
|
||||
-H 'accept: */*' \
|
||||
-H 'accept-language: ru-RU,ru;q=0.9' \
|
||||
-H 'referer: https://valokda-amnezia.vercel.app/api/warp')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
requestConfWARP6()
|
||||
{
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp-gen.vercel.app/generate-config' \
|
||||
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
|
||||
-H 'accept: */*' \
|
||||
-H 'accept-language: ru-RU,ru;q=0.9' \
|
||||
-H 'referer: https://warp-gen.vercel.app/generate-config')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
requestConfWARP7()
|
||||
{
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://config-generator-warp.vercel.app/warps' \
|
||||
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
|
||||
-H 'accept: */*' \
|
||||
-H 'accept-language: ru-RU,ru;q=0.9' \
|
||||
-H 'referer: https://config-generator-warp.vercel.app/')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
requestConfWARP8()
|
||||
{
|
||||
#запрос конфигурации WARP без параметров
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://config-generator-warp.vercel.app/warp6s' \
|
||||
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
|
||||
-H 'accept: */*' \
|
||||
-H 'accept-language: ru-RU,ru;q=0.9' \
|
||||
-H 'referer: https://config-generator-warp.vercel.app/')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
requestConfWARP9()
|
||||
{
|
||||
#запрос конфигурации WARP без параметров
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://config-generator-warp.vercel.app/warp4s' \
|
||||
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
|
||||
-H 'accept: */*' \
|
||||
-H 'accept-language: ru-RU,ru;q=0.9' \
|
||||
-H 'referer: https://config-generator-warp.vercel.app/')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
requestConfWARP10()
|
||||
{
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp-generator.vercel.app/api/warp' \
|
||||
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
|
||||
-H 'accept: */*' \
|
||||
-H 'accept-language: ru-RU,ru;q=0.6' \
|
||||
-H 'content-type: application/json' \
|
||||
-H 'referer: https://warp-generator.vercel.app/' \
|
||||
--data-raw '{"selectedServices":[],"siteMode":"all","deviceType":"computer"}')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
confWarpBuilder()
|
||||
{
|
||||
response_body=$1
|
||||
peer_pub=$(echo "$response_body" | jq -r '.result.config.peers[0].public_key')
|
||||
client_ipv4=$(echo "$response_body" | jq -r '.result.config.interface.addresses.v4')
|
||||
client_ipv6=$(echo "$response_body" | jq -r '.result.config.interface.addresses.v6')
|
||||
priv=$(echo "$response_body" | jq -r '.result.key')
|
||||
conf=$(cat <<-EOM
|
||||
[Interface]
|
||||
PrivateKey = ${priv}
|
||||
S1 = 0
|
||||
S2 = 0
|
||||
Jc = 120
|
||||
Jmin = 23
|
||||
Jmax = 911
|
||||
H1 = 1
|
||||
H2 = 2
|
||||
H3 = 3
|
||||
H4 = 4
|
||||
MTU = 1280
|
||||
I1 = <b 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>
|
||||
Address = ${client_ipv4}, ${client_ipv6}
|
||||
DNS = 1.1.1.1, 2606:4700:4700::1111, 1.0.0.1, 2606:4700:4700::1001
|
||||
|
||||
[Peer]
|
||||
PublicKey = ${peer_pub}
|
||||
AllowedIPs = 0.0.0.0/0, ::/0
|
||||
Endpoint = 162.159.192.1:500
|
||||
EOM
|
||||
)
|
||||
echo "$conf"
|
||||
#запрос конфигурации WARP
|
||||
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://config-generator-warp.vercel.app/warp' \
|
||||
-H 'Accept: */*' \
|
||||
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
|
||||
-H 'Connection: keep-alive' \
|
||||
-H 'Referer: https://config-generator-warp.vercel.app/' \
|
||||
-H 'Sec-Fetch-Dest: empty' \
|
||||
-H 'Sec-Fetch-Mode: cors' \
|
||||
-H 'Sec-Fetch-Site: same-origin' \
|
||||
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36' \
|
||||
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133"' \
|
||||
-H 'sec-ch-ua-mobile: ?0' \
|
||||
-H 'sec-ch-ua-platform: "Windows"')
|
||||
echo "$result"
|
||||
}
|
||||
|
||||
# Функция для обработки выполнения запроса
|
||||
@@ -320,56 +247,31 @@ check_request() {
|
||||
# Проверяем код состояния
|
||||
if [ "$response_code" -eq 200 ]; then
|
||||
case $choice in
|
||||
1)
|
||||
warp_config=$(confWarpBuilder "$response_body")
|
||||
echo "$warp_config"
|
||||
1)
|
||||
status=$(echo $response_body | jq '.success')
|
||||
#echo "$status"
|
||||
if [ "$status" = "true" ]
|
||||
then
|
||||
content=$(echo $response_body | jq '.content')
|
||||
configBase64=$(echo $content | jq -r '.configBase64')
|
||||
warpGen=$(echo "$configBase64" | base64 -d)
|
||||
echo "$warpGen";
|
||||
else
|
||||
echo "Error"
|
||||
fi
|
||||
;;
|
||||
2)
|
||||
content=$(echo $response_body | jq -r '.content')
|
||||
content=$(echo $content | jq -r '.configBase64')
|
||||
warp_config=$(echo "$content" | base64 -d)
|
||||
echo "$warp_config"
|
||||
echo "$response_body"
|
||||
;;
|
||||
3)
|
||||
content=$(echo $response_body | jq -r '.content')
|
||||
content=$(echo $content | jq -r '.configBase64')
|
||||
warp_config=$(echo "$content" | base64 -d)
|
||||
echo "$warp_config"
|
||||
content=$(echo $response_body | jq -r '.config')
|
||||
#content=$(echo "$content" | sed 's/\\n/\012/g')
|
||||
echo "$content"
|
||||
;;
|
||||
4)
|
||||
content=$(echo $response_body | jq -r '.content')
|
||||
warp_config=$(echo "$content" | base64 -d)
|
||||
echo "$warp_config"
|
||||
;;
|
||||
5)
|
||||
content=$(echo $response_body | jq -r '.content')
|
||||
warp_config=$(echo "$content" | base64 -d)
|
||||
echo "$warp_config"
|
||||
;;
|
||||
6)
|
||||
content=$(echo $response_body | jq -r '.config')
|
||||
echo "$content"
|
||||
;;
|
||||
7)
|
||||
content=$(echo $response_body | jq -r '.content')
|
||||
warp_config=$(echo "$content" | base64 -d)
|
||||
echo "$warp_config"
|
||||
;;
|
||||
8)
|
||||
content=$(echo $response_body | jq -r '.content')
|
||||
warp_config=$(echo "$content" | base64 -d)
|
||||
echo "$warp_config"
|
||||
;;
|
||||
9)
|
||||
content=$(echo $response_body | jq -r '.content')
|
||||
warp_config=$(echo "$content" | base64 -d)
|
||||
echo "$warp_config"
|
||||
;;
|
||||
10)
|
||||
content=$(echo $response_body | jq -r '.content')
|
||||
content=$(echo $content | jq -r '.configBase64')
|
||||
warp_config=$(echo "$content" | base64 -d)
|
||||
echo "$warp_config"
|
||||
;;
|
||||
*)
|
||||
echo "Error"
|
||||
@@ -393,94 +295,6 @@ checkAndAddDomainPermanentName()
|
||||
fi
|
||||
}
|
||||
|
||||
byPassGeoBlockComssDNS()
|
||||
{
|
||||
echo "Configure dhcp..."
|
||||
|
||||
uci set dhcp.cfg01411c.strictorder='1'
|
||||
uci set dhcp.cfg01411c.filter_aaaa='1'
|
||||
uci add_list dhcp.cfg01411c.server='127.0.0.1#5053'
|
||||
uci add_list dhcp.cfg01411c.server='127.0.0.1#5054'
|
||||
uci add_list dhcp.cfg01411c.server='127.0.0.1#5055'
|
||||
uci add_list dhcp.cfg01411c.server='127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.chatgpt.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.oaistatic.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.oaiusercontent.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.openai.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.microsoft.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.windowsupdate.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.bing.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.supercell.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.seeurlpcl.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.supercellid.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.supercellgames.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.clashroyale.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.brawlstars.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.clash.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.clashofclans.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.x.ai/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.grok.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.github.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.forzamotorsport.net/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.forzaracingchampionship.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.forzarc.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.gamepass.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.orithegame.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.renovacionxboxlive.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.tellmewhygame.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xbox.co/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xbox.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xbox.eu/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xbox.org/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xbox360.co/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xbox360.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xbox360.eu/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xbox360.org/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxab.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxgamepass.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxgamestudios.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxlive.cn/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxlive.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxone.co/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxone.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxone.eu/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxplayanywhere.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxservices.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xboxstudios.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.xbx.lv/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.sentry.io/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.usercentrics.eu/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.recaptcha.net/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.gstatic.com/127.0.0.1#5056'
|
||||
uci add_list dhcp.cfg01411c.server='/*.brawlstarsgame.com/127.0.0.1#5056'
|
||||
uci commit dhcp
|
||||
|
||||
echo "Add unblock ChatGPT..."
|
||||
|
||||
checkAndAddDomainPermanentName "chatgpt.com" "83.220.169.155"
|
||||
checkAndAddDomainPermanentName "openai.com" "83.220.169.155"
|
||||
checkAndAddDomainPermanentName "webrtc.chatgpt.com" "83.220.169.155"
|
||||
checkAndAddDomainPermanentName "ios.chat.openai.com" "83.220.169.155"
|
||||
checkAndAddDomainPermanentName "searchgpt.com" "83.220.169.155"
|
||||
|
||||
service dnsmasq restart
|
||||
service odhcpd restart
|
||||
}
|
||||
|
||||
deleteByPassGeoBlockComssDNS()
|
||||
{
|
||||
uci del dhcp.cfg01411c.server
|
||||
uci add_list dhcp.cfg01411c.server='127.0.0.1#5053'
|
||||
uci add_list dhcp.cfg01411c.server='127.0.0.1#5054'
|
||||
uci add_list dhcp.cfg01411c.server='127.0.0.1#5055'
|
||||
uci add_list dhcp.cfg01411c.server='127.0.0.1#5056'
|
||||
while uci del dhcp.@domain[-1] ; do : ; done;
|
||||
uci commit dhcp
|
||||
service dnsmasq restart
|
||||
service odhcpd restart
|
||||
service https-dns-proxy restart
|
||||
}
|
||||
|
||||
install_youtubeunblock_packages() {
|
||||
PKGARCH=$(opkg print-architecture | awk 'BEGIN {max=0} {if ($3 > max) {max = $3; arch = $2}} END {print arch}')
|
||||
VERSION=$(ubus call system board | jsonfilter -e '@.release.version')
|
||||
@@ -564,19 +378,6 @@ install_youtubeunblock_packages() {
|
||||
rm -rf "$AWG_DIR"
|
||||
}
|
||||
|
||||
if [ "$1" = "y" ] || [ "$1" = "Y" ]
|
||||
then
|
||||
is_manual_input_parameters="y"
|
||||
else
|
||||
is_manual_input_parameters="n"
|
||||
fi
|
||||
if [ "$2" = "y" ] || [ "$2" = "Y" ] || [ "$2" = "" ]
|
||||
then
|
||||
is_reconfig_podkop="y"
|
||||
else
|
||||
is_reconfig_podkop="n"
|
||||
fi
|
||||
|
||||
echo "Update list packages..."
|
||||
opkg update
|
||||
|
||||
@@ -591,50 +392,9 @@ install_awg_packages
|
||||
checkPackageAndInstall "jq" "1"
|
||||
checkPackageAndInstall "curl" "1"
|
||||
checkPackageAndInstall "unzip" "1"
|
||||
#checkPackageAndInstall "sing-box" "1"
|
||||
checkPackageAndInstall "sing-box" "1"
|
||||
checkPackageAndInstall "opera-proxy" "1"
|
||||
checkPackageAndInstall "youtubeUnblock" "1"
|
||||
|
||||
###########
|
||||
manage_package "podkop" "enable" "stop"
|
||||
|
||||
PACKAGE="sing-box"
|
||||
REQUIRED_VERSION="1.11.15"
|
||||
|
||||
INSTALLED_VERSION=$(opkg list-installed | grep "^$PACKAGE" | cut -d ' ' -f 3)
|
||||
if [ -n "$INSTALLED_VERSION" ] && [ "$INSTALLED_VERSION" != "$REQUIRED_VERSION" ]; then
|
||||
echo "Version package $PACKAGE not equal $REQUIRED_VERSION. Removed packages..."
|
||||
opkg remove --force-removal-of-dependent-packages $PACKAGE
|
||||
fi
|
||||
|
||||
INSTALLED_VERSION=$(opkg list-installed | grep "^$PACKAGE")
|
||||
if [ -z "$INSTALLED_VERSION" ]; then
|
||||
PACK_NAME="sing-box"
|
||||
AWG_DIR="/tmp/$PACK_NAME"
|
||||
SINGBOX_FILENAME="sing-box_1.11.15_openwrt_aarch64_cortex-a53.ipk"
|
||||
BASE_URL="https://github.com/SagerNet/sing-box/releases/download/v1.11.15/"
|
||||
DOWNLOAD_URL="${BASE_URL}${SINGBOX_FILENAME}"
|
||||
mkdir -p "$AWG_DIR"
|
||||
#echo $DOWNLOAD_URL
|
||||
|
||||
wget -O "$AWG_DIR/$SINGBOX_FILENAME" "$DOWNLOAD_URL"
|
||||
if [ $? -eq 0 ]; then
|
||||
echo "$PACK_NAME file downloaded successfully"
|
||||
else
|
||||
echo "Error downloading $PACK_NAME. Please, install $PACK_NAME manually and run the script again"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
opkg install "$AWG_DIR/$SINGBOX_FILENAME"
|
||||
if [ $? -eq 0 ]; then
|
||||
echo "$PACK_NAME file installing successfully"
|
||||
else
|
||||
echo "Error installing $PACK_NAME. Please, install $PACK_NAME manually and run the script again"
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
###########
|
||||
|
||||
opkg upgrade youtubeUnblock
|
||||
opkg upgrade luci-app-youtubeUnblock
|
||||
manage_package "youtubeUnblock" "enable" "start"
|
||||
@@ -661,7 +421,7 @@ firewall
|
||||
https-dns-proxy
|
||||
youtubeUnblock
|
||||
dhcp"
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/test_main"
|
||||
|
||||
checkPackageAndInstall "https-dns-proxy" "0"
|
||||
|
||||
@@ -681,6 +441,10 @@ then
|
||||
then
|
||||
wget -O "$DIR/$file" "$URL/config_files/$file"
|
||||
fi
|
||||
if [ "$file" == "youtubeUnblock" ]
|
||||
then
|
||||
wget -O "$DIR/$file" "$URL/config_files/youtubeUnblockCalls"
|
||||
fi
|
||||
done
|
||||
fi
|
||||
|
||||
@@ -691,43 +455,35 @@ uci set dhcp.cfg01411c.filter_aaaa='1'
|
||||
uci commit dhcp
|
||||
|
||||
cat <<EOF > /etc/sing-box/config.json
|
||||
{
|
||||
"log": {
|
||||
"disabled": true,
|
||||
"level": "error"
|
||||
},
|
||||
"inbounds": [
|
||||
{
|
||||
"type": "tproxy",
|
||||
"listen": "::",
|
||||
"listen_port": 1100,
|
||||
"sniff": false
|
||||
}
|
||||
],
|
||||
"outbounds": [
|
||||
{
|
||||
"type": "http",
|
||||
"server": "127.0.0.1",
|
||||
"server_port": 18080
|
||||
}
|
||||
],
|
||||
"route": {
|
||||
"auto_detect_interface": true
|
||||
}
|
||||
{
|
||||
"log": {
|
||||
"disabled": true,
|
||||
"level": "error"
|
||||
},
|
||||
"inbounds": [
|
||||
{
|
||||
"type": "tproxy",
|
||||
"listen": "::",
|
||||
"listen_port": 1100,
|
||||
"sniff": false
|
||||
}
|
||||
],
|
||||
"outbounds": [
|
||||
{
|
||||
"type": "http",
|
||||
"server": "127.0.0.1",
|
||||
"server_port": 18080
|
||||
}
|
||||
],
|
||||
"route": {
|
||||
"auto_detect_interface": true
|
||||
}
|
||||
}
|
||||
EOF
|
||||
|
||||
echo "Setting sing-box..."
|
||||
uci set sing-box.main.enabled='1'
|
||||
uci set sing-box.main.user='root'
|
||||
uci add_list sing-box.main.ifaces='wan'
|
||||
uci add_list sing-box.main.ifaces='wan2'
|
||||
uci add_list sing-box.main.ifaces='wan6'
|
||||
uci add_list sing-box.main.ifaces='wwan'
|
||||
uci add_list sing-box.main.ifaces='wwan0'
|
||||
uci add_list sing-box.main.ifaces='modem'
|
||||
uci add_list sing-box.main.ifaces='l2tp'
|
||||
uci add_list sing-box.main.ifaces='pptp'
|
||||
uci commit sing-box
|
||||
|
||||
nameRule="option name 'Block_UDP_443'"
|
||||
@@ -753,59 +509,10 @@ then
|
||||
uci commit firewall
|
||||
fi
|
||||
|
||||
printf "\033[32;1mCheck work youtubeUnblock..\033[0m\n"
|
||||
#install_youtubeunblock_packages
|
||||
opkg upgrade youtubeUnblock
|
||||
opkg upgrade luci-app-youtubeUnblock
|
||||
manage_package "youtubeUnblock" "enable" "start"
|
||||
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecond"
|
||||
manage_package "podkop" "enable" "stop"
|
||||
service youtubeUnblock restart
|
||||
|
||||
isWorkYoutubeUnBlock=0
|
||||
|
||||
curl -f -o /dev/null -k --connect-to ::google.com -L -H "Host: mirror.gcr.io" --max-time 360 https://test.googlevideo.com/v2/cimg/android/blobs/sha256:6fd8bdac3da660bde7bd0b6f2b6a46e1b686afb74b9a4614def32532b73f5eaa
|
||||
|
||||
# Проверяем код выхода
|
||||
if [ $? -eq 0 ]; then
|
||||
printf "\033[32;1myoutubeUnblock well work...\033[0m\n"
|
||||
cronTask="0 4 * * * service youtubeUnblock restart"
|
||||
str=$(grep -i "0 4 \* \* \* service youtubeUnblock restart" /etc/crontabs/root)
|
||||
if [ -z "$str" ]
|
||||
then
|
||||
echo "Add cron task auto reboot service youtubeUnblock..."
|
||||
echo "$cronTask" >> /etc/crontabs/root
|
||||
fi
|
||||
isWorkYoutubeUnBlock=1
|
||||
else
|
||||
manage_package "youtubeUnblock" "disable" "stop"
|
||||
printf "\033[32;1myoutubeUnblock not work...\033[0m\n"
|
||||
isWorkYoutubeUnBlock=0
|
||||
str=$(grep -i "0 4 \* \* \* service youtubeUnblock restart" /etc/crontabs/root)
|
||||
if [ ! -z "$str" ]
|
||||
then
|
||||
grep -v "0 4 \* \* \* service youtubeUnblock restart" /etc/crontabs/root > /etc/crontabs/temp
|
||||
cp -f "/etc/crontabs/temp" "/etc/crontabs/root"
|
||||
rm -f "/etc/crontabs/temp"
|
||||
fi
|
||||
fi
|
||||
|
||||
isWorkOperaProxy=0
|
||||
printf "\033[32;1mCheck opera proxy...\033[0m\n"
|
||||
service sing-box restart
|
||||
curl --proxy http://127.0.0.1:18080 ipinfo.io/ip
|
||||
if [ $? -eq 0 ]; then
|
||||
printf "\033[32;1mOpera proxy well work...\033[0m\n"
|
||||
isWorkOperaProxy=1
|
||||
else
|
||||
printf "\033[32;1mOpera proxy not work...\033[0m\n"
|
||||
isWorkOperaProxy=0
|
||||
fi
|
||||
|
||||
#printf "\033[32;1mAutomatic generate config AmneziaWG WARP (n) or manual input parameters for AmneziaWG (y)...\033[0m\n"
|
||||
printf "\033[32;1mAutomatic generate config AmneziaWG WARP (n) or manual input parameters for AmneziaWG (y)...\033[0m\n"
|
||||
countRepeatAWGGen=2
|
||||
#echo "Input manual parameters AmneziaWG? (y/n): "
|
||||
#read is_manual_input_parameters
|
||||
echo "Input manual parameters AmneziaWG? (y/n): "
|
||||
read is_manual_input_parameters
|
||||
currIter=0
|
||||
isExit=0
|
||||
while [ $currIter -lt $countRepeatAWGGen ] && [ "$isExit" = "0" ]
|
||||
@@ -864,55 +571,7 @@ do
|
||||
warpGen=$(check_request "$result" 4)
|
||||
if [ "$warpGen" = "Error" ]
|
||||
then
|
||||
printf "\033[32;1mRequest WARP config... Attempt #5\033[0m\n"
|
||||
result=$(requestConfWARP5)
|
||||
warpGen=$(check_request "$result" 5)
|
||||
if [ "$warpGen" = "Error" ]
|
||||
then
|
||||
printf "\033[32;1mRequest WARP config... Attempt #6\033[0m\n"
|
||||
result=$(requestConfWARP6)
|
||||
warpGen=$(check_request "$result" 6)
|
||||
if [ "$warpGen" = "Error" ]
|
||||
then
|
||||
printf "\033[32;1mRequest WARP config... Attempt #7\033[0m\n"
|
||||
result=$(requestConfWARP7)
|
||||
warpGen=$(check_request "$result" 7)
|
||||
if [ "$warpGen" = "Error" ]
|
||||
then
|
||||
printf "\033[32;1mRequest WARP config... Attempt #8\033[0m\n"
|
||||
result=$(requestConfWARP8)
|
||||
warpGen=$(check_request "$result" 8)
|
||||
if [ "$warpGen" = "Error" ]
|
||||
then
|
||||
printf "\033[32;1mRequest WARP config... Attempt #9\033[0m\n"
|
||||
result=$(requestConfWARP9)
|
||||
warpGen=$(check_request "$result" 9)
|
||||
if [ "$warpGen" = "Error" ]
|
||||
then
|
||||
printf "\033[32;1mRequest WARP config... Attempt #10\033[0m\n"
|
||||
result=$(requestConfWARP10)
|
||||
warpGen=$(check_request "$result" 10)
|
||||
if [ "$warpGen" = "Error" ]
|
||||
then
|
||||
warp_config="Error"
|
||||
else
|
||||
warp_config=$warpGen
|
||||
fi
|
||||
else
|
||||
warp_config=$warpGen
|
||||
fi
|
||||
else
|
||||
warp_config=$warpGen
|
||||
fi
|
||||
else
|
||||
warp_config=$warpGen
|
||||
fi
|
||||
else
|
||||
warp_config=$warpGen
|
||||
fi
|
||||
else
|
||||
warp_config=$warpGen
|
||||
fi
|
||||
warp_config="Error"
|
||||
else
|
||||
warp_config=$warpGen
|
||||
fi
|
||||
@@ -1043,98 +702,52 @@ do
|
||||
#service firewall restart
|
||||
#service network restart
|
||||
|
||||
if [ "$is_manual_input_parameters" = "n" ]; then
|
||||
I=0
|
||||
WARP_ENDPOINT_HOSTS="engage.cloudflareclient.com 162.159.192.1 162.159.192.2 162.159.192.4 162.159.195.1 162.159.195.4 188.114.96.1 188.114.96.23 188.114.96.50 188.114.96.81"
|
||||
WARP_ENDPOINT_PORTS="500 1701 2408 3138 4500"
|
||||
for element in $WARP_ENDPOINT_HOSTS; do
|
||||
EndpointIP="$element"
|
||||
for element2 in $WARP_ENDPOINT_PORTS; do
|
||||
I=$(( $I + 1 ))
|
||||
EndpointPort="$element2"
|
||||
uci set network.@${CONFIG_NAME}[-1].endpoint_host=$EndpointIP
|
||||
uci set network.@${CONFIG_NAME}[-1].endpoint_port=$EndpointPort
|
||||
uci commit network
|
||||
# Отключаем интерфейс
|
||||
ifdown $INTERFACE_NAME
|
||||
# Включаем интерфейс
|
||||
ifup $INTERFACE_NAME
|
||||
printf "\033[33;1mIter #$I: Check Endpoint WARP $element:$element2. Wait up AWG WARP 10 second...\033[0m\n"
|
||||
sleep 10
|
||||
|
||||
pingAddress="8.8.8.8"
|
||||
if ping -c 1 -I $INTERFACE_NAME $pingAddress >/dev/null 2>&1
|
||||
then
|
||||
printf "\033[32;1m Endpoint WARP $element:$element2 work...\033[0m\n"
|
||||
isExit=1
|
||||
break
|
||||
else
|
||||
printf "\033[31;1m Endpoint WARP $element:$element2 not work...\033[0m\n"
|
||||
isExit=0
|
||||
fi
|
||||
done
|
||||
if [ "$isExit" = "1" ]
|
||||
then
|
||||
break
|
||||
fi
|
||||
done
|
||||
# Отключаем интерфейс
|
||||
ifdown $INTERFACE_NAME
|
||||
# Включаем интерфейс
|
||||
ifup $INTERFACE_NAME
|
||||
printf "\033[32;1mWait up AWG WARP 10 second...\033[0m\n"
|
||||
sleep 10
|
||||
|
||||
pingAddress="8.8.8.8"
|
||||
if ping -c 1 -I $INTERFACE_NAME $pingAddress >/dev/null 2>&1
|
||||
then
|
||||
isExit=1
|
||||
else
|
||||
# Отключаем интерфейс
|
||||
ifdown $INTERFACE_NAME
|
||||
# Включаем интерфейс
|
||||
ifup $INTERFACE_NAME
|
||||
printf "\033[32;1mWait up AWG WARP 10 second...\033[0m\n"
|
||||
sleep 10
|
||||
|
||||
pingAddress="8.8.8.8"
|
||||
if ping -c 1 -I $INTERFACE_NAME $pingAddress >/dev/null 2>&1
|
||||
then
|
||||
isExit=1
|
||||
else
|
||||
isExit=0
|
||||
fi
|
||||
isExit=0
|
||||
fi
|
||||
fi
|
||||
done
|
||||
|
||||
varByPass=0
|
||||
isWorkWARP=0
|
||||
|
||||
if [ "$isExit" = "1" ]
|
||||
then
|
||||
printf "\033[32;1mAWG WARP well work...\033[0m\n"
|
||||
isWorkWARP=1
|
||||
else
|
||||
printf "\033[32;1mAWG WARP not work.....Try opera proxy...\033[0m\n"
|
||||
isWorkWARP=0
|
||||
fi
|
||||
|
||||
echo "isWorkYoutubeUnBlock = $isWorkYoutubeUnBlock, isWorkOperaProxy = $isWorkOperaProxy, isWorkWARP = $isWorkWARP"
|
||||
|
||||
if [ "$isWorkYoutubeUnBlock" = "1" ] && [ "$isWorkOperaProxy" = "1" ] && [ "$isWorkWARP" = "1" ]
|
||||
then
|
||||
varByPass=1
|
||||
elif [ "$isWorkYoutubeUnBlock" = "0" ] && [ "$isWorkOperaProxy" = "1" ] && [ "$isWorkWARP" = "1" ]
|
||||
then
|
||||
varByPass=2
|
||||
elif [ "$isWorkYoutubeUnBlock" = "1" ] && [ "$isWorkOperaProxy" = "1" ] && [ "$isWorkWARP" = "0" ]
|
||||
then
|
||||
varByPass=3
|
||||
elif [ "$isWorkYoutubeUnBlock" = "0" ] && [ "$isWorkOperaProxy" = "1" ] && [ "$isWorkWARP" = "0" ]
|
||||
then
|
||||
varByPass=4
|
||||
elif [ "$isWorkYoutubeUnBlock" = "1" ] && [ "$isWorkOperaProxy" = "0" ] && [ "$isWorkWARP" = "0" ]
|
||||
then
|
||||
varByPass=5
|
||||
elif [ "$isWorkYoutubeUnBlock" = "0" ] && [ "$isWorkOperaProxy" = "0" ] && [ "$isWorkWARP" = "1" ]
|
||||
then
|
||||
varByPass=6
|
||||
elif [ "$isWorkYoutubeUnBlock" = "1" ] && [ "$isWorkOperaProxy" = "0" ] && [ "$isWorkWARP" = "1" ]
|
||||
then
|
||||
varByPass=7
|
||||
elif [ "$isWorkYoutubeUnBlock" = "0" ] && [ "$isWorkOperaProxy" = "0" ] && [ "$isWorkWARP" = "0" ]
|
||||
then
|
||||
varByPass=8
|
||||
else
|
||||
printf "\033[32;1mAWG WARP not work...Try work youtubeunblock...Please wait...\033[0m\n"
|
||||
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecond"
|
||||
service youtubeUnblock restart
|
||||
curl -f -o /dev/null -k --connect-to ::google.com -L -H "Host: mirror.gcr.io" --max-time 360 https://test.googlevideo.com/v2/cimg/android/blobs/sha256:6fd8bdac3da660bde7bd0b6f2b6a46e1b686afb74b9a4614def32532b73f5eaa
|
||||
|
||||
# Проверяем код выхода
|
||||
if [ $? -eq 0 ]; then
|
||||
printf "\033[32;1myoutubeUnblock well work...\033[0m\n"
|
||||
varByPass=2
|
||||
else
|
||||
manage_package "youtubeUnblock" "disable" "stop"
|
||||
printf "\033[32;1myoutubeUnblock not work...Try opera proxy...\033[0m\n"
|
||||
service sing-box restart
|
||||
sing-box tools fetch ifconfig.co -D /etc/sing-box/
|
||||
if [ $? -eq 0 ]; then
|
||||
printf "\033[32;1mOpera proxy well work...\033[0m\n"
|
||||
varByPass=3
|
||||
else
|
||||
printf "\033[32;1mOpera proxy not work...Try custom settings router to bypass the locks... Recomendation buy 'VPS' and up 'vless'\033[0m\n"
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
||||
printf "\033[32;1mRestart service dnsmasq, odhcpd...\033[0m\n"
|
||||
@@ -1143,80 +756,28 @@ service odhcpd restart
|
||||
|
||||
path_podkop_config="/etc/config/podkop"
|
||||
path_podkop_config_backup="/root/podkop"
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
|
||||
|
||||
messageComplete=""
|
||||
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/test_main"
|
||||
|
||||
case $varByPass in
|
||||
1)
|
||||
nameFileReplacePodkop="podkopNoYoutube"
|
||||
printf "\033[32;1mStop and disabled service 'ruantiblock'...\033[0m\n"
|
||||
manage_package "ruantiblock" "disable" "stop"
|
||||
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecond"
|
||||
service youtubeUnblock restart
|
||||
deleteByPassGeoBlockComssDNS
|
||||
messageComplete="ByPass block for Method 1: AWG WARP + youtubeunblock + Opera Proxy...Configured completed..."
|
||||
;;
|
||||
2)
|
||||
nameFileReplacePodkop="podkop"
|
||||
printf "\033[32;1mStop and disabled service 'youtubeUnblock' and 'ruantiblock'...\033[0m\n"
|
||||
manage_package "youtubeUnblock" "disable" "stop"
|
||||
#manage_package "youtubeUnblock" "disable" "stop"
|
||||
manage_package "ruantiblock" "disable" "stop"
|
||||
deleteByPassGeoBlockComssDNS
|
||||
messageComplete="ByPass block for Method 2: AWG WARP + Opera Proxy...Configured completed..."
|
||||
;;
|
||||
3)
|
||||
2)
|
||||
nameFileReplacePodkop="podkopSecond"
|
||||
printf "\033[32;1mStop and disabled service 'ruantiblock'...\033[0m\n"
|
||||
manage_package "ruantiblock" "disable" "stop"
|
||||
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecondDiscord"
|
||||
service youtubeUnblock restart
|
||||
deleteByPassGeoBlockComssDNS
|
||||
messageComplete="ByPass block for Method 3: youtubeUnblock + Opera Proxy...Configured completed..."
|
||||
;;
|
||||
4)
|
||||
3)
|
||||
nameFileReplacePodkop="podkopSecondYoutube"
|
||||
printf "\033[32;1mStop and disabled service 'youtubeUnblock' and 'ruantiblock'...\033[0m\n"
|
||||
manage_package "youtubeUnblock" "disable" "stop"
|
||||
manage_package "ruantiblock" "disable" "stop"
|
||||
deleteByPassGeoBlockComssDNS
|
||||
messageComplete="ByPass block for Method 4: Only Opera Proxy...Configured completed..."
|
||||
;;
|
||||
5)
|
||||
nameFileReplacePodkop="podkopSecondYoutube"
|
||||
printf "\033[32;1mStop and disabled service 'ruantiblock' and 'podkop'...\033[0m\n"
|
||||
manage_package "ruantiblock" "disable" "stop"
|
||||
manage_package "podkop" "disable" "stop"
|
||||
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblock"
|
||||
service youtubeUnblock restart
|
||||
byPassGeoBlockComssDNS
|
||||
printf "\033[32;1mByPass block for Method 5: youtubeUnblock + ComssDNS for GeoBlock...Configured completed...\033[0m\n"
|
||||
exit 1
|
||||
;;
|
||||
6)
|
||||
nameFileReplacePodkop="podkopWARP"
|
||||
printf "\033[32;1mStop and disabled service 'youtubeUnblock' and 'ruantiblock'...\033[0m\n"
|
||||
manage_package "youtubeUnblock" "disable" "stop"
|
||||
manage_package "ruantiblock" "disable" "stop"
|
||||
byPassGeoBlockComssDNS
|
||||
messageComplete="ByPass block for Method 6: AWG WARP + ComssDNS for GeoBlock...Configured completed..."
|
||||
;;
|
||||
7)
|
||||
nameFileReplacePodkop="podkopWARPNoYoutube"
|
||||
printf "\033[32;1mStop and disabled service 'ruantiblock'...\033[0m\n"
|
||||
manage_package "ruantiblock" "disable" "stop"
|
||||
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecond"
|
||||
service youtubeUnblock restart
|
||||
byPassGeoBlockComssDNS
|
||||
messageComplete="ByPass block for Method 7: AWG WARP + youtubeUnblock + ComssDNS for GeoBlock...Configured completed..."
|
||||
;;
|
||||
8)
|
||||
printf "\033[32;1mTry custom settings router to bypass the locks... Recomendation buy 'VPS' and up 'vless'\033[0m\n"
|
||||
exit 1
|
||||
;;
|
||||
*)
|
||||
echo "Unknown error. Please send message in group Telegram t.me/routerich"
|
||||
exit 1
|
||||
nameFileReplacePodkop="podkop"
|
||||
esac
|
||||
|
||||
PACKAGE="podkop"
|
||||
@@ -1229,9 +790,9 @@ if [ -n "$INSTALLED_VERSION" ] && [ "$INSTALLED_VERSION" != "$REQUIRED_VERSION"
|
||||
fi
|
||||
|
||||
if [ -f "/etc/init.d/podkop" ]; then
|
||||
#printf "Podkop installed. Reconfigured on AWG WARP and Opera Proxy? (y/n): \n"
|
||||
#is_reconfig_podkop="y"
|
||||
#read is_reconfig_podkop
|
||||
printf "Podkop installed. Reconfigured on AWG WARP and Opera Proxy? (y/n): \n"
|
||||
is_reconfig_podkop="y"
|
||||
read is_reconfig_podkop
|
||||
if [ "$is_reconfig_podkop" = "y" ] || [ "$is_reconfig_podkop" = "Y" ]; then
|
||||
cp -f "$path_podkop_config" "$path_podkop_config_backup"
|
||||
wget -O "$path_podkop_config" "$URL/config_files/$nameFileReplacePodkop"
|
||||
@@ -1239,9 +800,9 @@ if [ -f "/etc/init.d/podkop" ]; then
|
||||
echo "Podkop reconfigured..."
|
||||
fi
|
||||
else
|
||||
#printf "\033[32;1mInstall and configure PODKOP (a tool for point routing of traffic)?? (y/n): \033[0m\n"
|
||||
printf "\033[32;1mInstall and configure PODKOP (a tool for point routing of traffic)?? (y/n): \033[0m\n"
|
||||
is_install_podkop="y"
|
||||
#read is_install_podkop
|
||||
read is_install_podkop
|
||||
|
||||
if [ "$is_install_podkop" = "y" ] || [ "$is_install_podkop" = "Y" ]; then
|
||||
DOWNLOAD_DIR="/tmp/podkop"
|
||||
@@ -1291,4 +852,4 @@ service sing-box restart
|
||||
service podkop enable
|
||||
service podkop restart
|
||||
|
||||
printf "\033[32;1m$messageComplete\033[0m\n"
|
||||
printf "\033[32;1mConfigured completed...\033[0m\n"
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user