4 Commits

Author SHA1 Message Date
CodeRoK7
6bf92c9c58 Fix name youtubeunblock files 2025-08-15 11:15:10 +00:00
CodeRoK7
a51c9f8b77 Change repo url 2025-08-15 10:54:20 +00:00
CodeRoK7
4c7bc4b3c1 Fix voice calls WhatspApp and Telegram 2025-08-15 10:35:12 +00:00
CodeRoK7
85663170f8 Add check if alt firmware 2025-07-14 22:48:47 +05:00
48 changed files with 226 additions and 2999 deletions

View File

@@ -318,7 +318,7 @@ config_files="network
firewall
https-dns-proxy
dhcp"
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/main"
checkPackageAndInstall "https-dns-proxy" "0"
@@ -575,7 +575,7 @@ fi
path_podkop_config="/etc/config/podkop"
path_podkop_config_backup="/root/podkop"
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/main"
if [ -f "/etc/init.d/podkop" ]; then
printf "Podkop installed. Reconfigured on AWG WARP and Opera Proxy? (y/n): \n"

View File

@@ -1,36 +0,0 @@
# this custom script runs desync to all discord media packets
# NOTE: @ih requires nft 1.0.1+ and updated kernel version. it's confirmed to work on 5.15 (openwrt 23) and not work on 5.10 (openwrt 22)
# can override in config :
NFQWS_OPT_DESYNC_DISCORD_MEDIA="${NFQWS_OPT_DESYNC_DISCORD_MEDIA:---dpi-desync=fake --dpi-desync-repeats=2}"
DISCORD_MEDIA_PORT_RANGE="${DISCORD_MEDIA_PORT_RANGE:-50000-50099}"
alloc_dnum DNUM_DISCORD_MEDIA
alloc_qnum QNUM_DISCORD_MEDIA
zapret_custom_daemons()
{
# $1 - 1 - add, 0 - stop
local opt="--qnum=$QNUM_DISCORD_MEDIA $NFQWS_OPT_DESYNC_DISCORD_MEDIA"
do_nfqws $1 $DNUM_DISCORD_MEDIA "$opt"
}
# size = 156 (8 udp header + 148 payload) && payload starts with 0x01000000
zapret_custom_firewall()
{
# $1 - 1 - run, 0 - stop
local DISABLE_IPV6=1
local port_range=$(replace_char - : $DISCORD_MEDIA_PORT_RANGE)
local f="-p udp --dport $port_range -m u32 --u32"
# this is simplified test to skip writing monstrous rule. instead of checking 64 bytes for zeroes only check 2 dwords for zero
fw_nfqws_post $1 "$f 0>>22&0x3C@4>>16=0x52&&0>>22&0x3C@8=0x00010046&&0>>22&0x3C@16=0&&0>>22&0x3C@76=0" '' $QNUM_DISCORD_MEDIA
}
zapret_custom_firewall_nft()
{
# stop logic is not required
local DISABLE_IPV6=1
local f="udp dport $DISCORD_MEDIA_PORT_RANGE udp length == 82 @ih,0,32 0x00010046 @ih,64,128 0x00000000000000000000000000000000 @ih,192,128 0x00000000000000000000000000000000 @ih,320,128 0x00000000000000000000000000000000 @ih,448,128 0x00000000000000000000000000000000"
nft_fw_nfqws_post "$f" '' $QNUM_DISCORD_MEDIA
}

View File

@@ -1,31 +0,0 @@
# this custom script runs desync to all stun packets
# NOTE: @ih requires nft 1.0.1+ and updated kernel version. it's confirmed to work on 5.15 (openwrt 23) and not work on 5.10 (openwrt 22)
# can override in config :
NFQWS_OPT_DESYNC_STUN="${NFQWS_OPT_DESYNC_STUN:---dpi-desync=fake --dpi-desync-repeats=2}"
alloc_dnum DNUM_STUN4ALL
alloc_qnum QNUM_STUN4ALL
zapret_custom_daemons()
{
# $1 - 1 - add, 0 - stop
local opt="--qnum=$QNUM_STUN4ALL $NFQWS_OPT_DESYNC_STUN"
do_nfqws $1 $DNUM_STUN4ALL "$opt"
}
# size = 156 (8 udp header + 148 payload) && payload starts with 0x01000000
zapret_custom_firewall()
{
# $1 - 1 - run, 0 - stop
local f='-p udp -m u32 --u32'
fw_nfqws_post $1 "$f 0>>22&0x3C@4>>16=28:65535&&0>>22&0x3C@12=0x2112A442&&0>>22&0x3C@8&0xC0000003=0" "$f 44>>16=28:65535&&52=0x2112A442&&48&0xC0000003=0" $QNUM_STUN4ALL
}
zapret_custom_firewall_nft()
{
# stop logic is not required
local f="udp length >= 28 @ih,32,32 0x2112A442 @ih,0,2 0 @ih,30,2 0"
nft_fw_nfqws_post "$f" "$f" $QNUM_STUN4ALL
}

View File

@@ -1,32 +0,0 @@
# this custom script runs desync to all wireguard handshake initiation packets
# NOTE: this works for original wireguard and may not work for 3rd party implementations such as xray
# NOTE: @ih requires nft 1.0.1+ and updated kernel version. it's confirmed to work on 5.15 (openwrt 23) and not work on 5.10 (openwrt 22)
# can override in config :
NFQWS_OPT_DESYNC_WG="${NFQWS_OPT_DESYNC_WG:---dpi-desync=fake --dpi-desync-fake-wireguard=/opt/zapret/files/fake/quic_initial_vk_com.bin --dpi-desync-repeats=5}"
alloc_dnum DNUM_WG4ALL
alloc_qnum QNUM_WG4ALL
zapret_custom_daemons()
{
# $1 - 1 - add, 0 - stop
local opt="--qnum=$QNUM_WG4ALL $NFQWS_OPT_DESYNC_WG"
do_nfqws $1 $DNUM_WG4ALL "$opt"
}
# size = 156 (8 udp header + 148 payload) && payload starts with 0x01000000
zapret_custom_firewall()
{
# $1 - 1 - run, 0 - stop
local f='-p udp -m u32 --u32'
fw_nfqws_post $1 "$f 0>>22&0x3C@4>>16=0x9c&&0>>22&0x3C@8=0x01000000" "$f 44>>16=0x9c&&48=0x01000000" $QNUM_WG4ALL
}
zapret_custom_firewall_nft()
{
# stop logic is not required
local f="udp length 156 @ih,0,32 0x01000000"
nft_fw_nfqws_post "$f" "$f" $QNUM_WG4ALL
}

View File

@@ -1,11 +0,0 @@
config dns-failsafe-proxy 'main'
option listen_ip '127.0.0.1'
option listen_port '5359'
option dns_ip '127.0.0.42'
option dns_port '53'
option failback_ip '127.0.0.1'
option failback_port '5453'
option connect_timeout '150'
option session_timeout '2000'

View File

@@ -1,42 +0,0 @@
config main 'config'
option canary_domains_icloud '1'
option canary_domains_mozilla '1'
option dnsmasq_config_update '-'
option force_dns '1'
list force_dns_port '53'
list force_dns_port '853'
list procd_fw_src_interfaces 'lan'
option procd_trigger_wan6 '0'
config doh-proxy
option bootstrap_dns '94.140.14.14,94.140.15.15'
option resolver_url 'https://dns.adguard-dns.com/dns-query'
option listen_addr '127.0.0.1'
option listen_port '5053'
option user 'nobody'
option group 'nogroup'
config doh-proxy
option resolver_url 'https://dns.google/dns-query'
option bootstrap_dns '8.8.8.8,8.8.4.4'
option listen_addr '127.0.0.1'
option listen_port '5054'
option user 'nobody'
option group 'nogroup'
config doh-proxy
option resolver_url 'https://cloudflare-dns.com/dns-query'
option bootstrap_dns '1.1.1.1,1.0.0.1'
option listen_addr '127.0.0.1'
option listen_port '5055'
option user 'nobody'
option group 'nogroup'
config doh-proxy
option resolver_url 'https://router.comss.one/dns-query'
option bootstrap_dns '195.133.25.16,212.109.195.93'
option listen_addr '127.0.0.1'
option listen_port '5056'
option user 'nobody'
option group 'nogroup'

View File

@@ -1,55 +0,0 @@
config main 'main'
option mode 'proxy'
option proxy_config_type 'outbound'
option domain_list_enabled '1'
option subnets_list_enabled '0'
option custom_domains_list_type 'text'
option custom_local_domains_list_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_download_subnets_list_enabled '0'
option all_traffic_from_ip_enabled '0'
option delist_domains_enabled '0'
option exclude_from_ip_enabled '0'
option yacd '0'
option socks5 '0'
option exclude_ntp '1'
option quic_disable '1'
option dont_touch_dhcp '1'
option update_interval '1d'
option dns_type 'doh'
option dns_server 'dns.adguard-dns.com'
option split_dns_enabled '0'
option dns_rewrite_ttl '60'
option cache_file '/tmp/cache.db'
list iface 'br-lan'
option mon_restart_ifaces '0'
option detour '1'
option outbound_json '{
"type": "http",
"tag": "http-proxy",
"server": "127.0.0.1",
"server_port": 18080
}'
list domain_list 'geoblock'
list domain_list 'block'
list domain_list 'meta'
list domain_list 'twitter'
list domain_list 'hdrezka'
list domain_list 'google_ai'
option custom_domains_text 'myip.com'
option custom_subnets_list_enabled 'disabled'
config extra 'Youtube_Discord'
option mode 'vpn'
option interface 'awg10'
option domain_list_enabled '1'
list domain_list 'youtube'
list domain_list 'discord'
option custom_domains_list_type 'text'
option custom_domains_text '2ip.ru'
option custom_local_domains_list_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_subnets_list_enabled 'disabled'
option custom_download_subnets_list_enabled '0'
option all_traffic_from_ip_enabled '0'

View File

@@ -1,54 +0,0 @@
config main 'main'
option mode 'proxy'
option proxy_config_type 'outbound'
option domain_list_enabled '1'
option subnets_list_enabled '0'
option custom_domains_list_type 'text'
option custom_local_domains_list_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_download_subnets_list_enabled '0'
option all_traffic_from_ip_enabled '0'
option delist_domains_enabled '0'
option exclude_from_ip_enabled '0'
option yacd '0'
option socks5 '0'
option exclude_ntp '1'
option quic_disable '1'
option dont_touch_dhcp '1'
option update_interval '1d'
option dns_type 'doh'
option dns_server 'dns.adguard-dns.com'
option split_dns_enabled '0'
option dns_rewrite_ttl '60'
option cache_file '/tmp/cache.db'
list iface 'br-lan'
option mon_restart_ifaces '0'
option detour '1'
option outbound_json '{
"type": "http",
"tag": "http-proxy",
"server": "127.0.0.1",
"server_port": 18080
}'
list domain_list 'geoblock'
list domain_list 'block'
list domain_list 'meta'
list domain_list 'twitter'
list domain_list 'hdrezka'
list domain_list 'google_ai'
option custom_domains_text 'myip.com'
option custom_subnets_list_enabled 'disabled'
config extra 'Discord'
option mode 'vpn'
option interface 'awg10'
option domain_list_enabled '1'
list domain_list 'discord'
option custom_domains_list_type 'text'
option custom_domains_text '2ip.ru'
option custom_local_domains_list_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_subnets_list_enabled 'disabled'
option custom_download_subnets_list_enabled '0'
option all_traffic_from_ip_enabled '0'

View File

@@ -1,42 +0,0 @@
config main 'main'
option mode 'proxy'
option proxy_config_type 'outbound'
option domain_list_enabled '1'
option subnets_list_enabled '0'
option custom_domains_list_type 'text'
option custom_local_domains_list_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_download_subnets_list_enabled '0'
option all_traffic_from_ip_enabled '0'
option delist_domains_enabled '0'
option exclude_from_ip_enabled '0'
option yacd '0'
option socks5 '0'
option exclude_ntp '1'
option quic_disable '1'
option dont_touch_dhcp '1'
option update_interval '1d'
option dns_type 'doh'
option dns_server 'dns.adguard-dns.com'
option split_dns_enabled '0'
option dns_rewrite_ttl '60'
option cache_file '/tmp/cache.db'
list iface 'br-lan'
option mon_restart_ifaces '0'
option detour '1'
option outbound_json '{
"type": "http",
"tag": "http-proxy",
"server": "127.0.0.1",
"server_port": 18080
}'
list domain_list 'geoblock'
list domain_list 'block'
list domain_list 'meta'
list domain_list 'twitter'
list domain_list 'hdrezka'
list domain_list 'google_ai'
list domain_list 'discord'
option custom_domains_text 'myip.com'
option custom_subnets_list_enabled 'disabled'

View File

@@ -1,43 +0,0 @@
config main 'main'
option mode 'proxy'
option proxy_config_type 'outbound'
option domain_list_enabled '1'
option subnets_list_enabled '0'
option custom_domains_list_type 'text'
option custom_local_domains_list_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_download_subnets_list_enabled '0'
option all_traffic_from_ip_enabled '0'
option delist_domains_enabled '0'
option exclude_from_ip_enabled '0'
option yacd '0'
option socks5 '0'
option exclude_ntp '1'
option quic_disable '1'
option dont_touch_dhcp '1'
option update_interval '1d'
option dns_type 'doh'
option dns_server 'dns.adguard-dns.com'
option split_dns_enabled '0'
option dns_rewrite_ttl '60'
option cache_file '/tmp/cache.db'
list iface 'br-lan'
option mon_restart_ifaces '0'
option detour '1'
option outbound_json '{
"type": "http",
"tag": "http-proxy",
"server": "127.0.0.1",
"server_port": 18080
}'
list domain_list 'geoblock'
list domain_list 'block'
list domain_list 'meta'
list domain_list 'twitter'
list domain_list 'hdrezka'
list domain_list 'google_ai'
list domain_list 'discord'
list domain_list 'youtube'
option custom_domains_text 'myip.com'
option custom_subnets_list_enabled 'disabled'

View File

@@ -1,36 +0,0 @@
config main 'main'
option mode 'vpn'
option interface 'awg10'
option domain_list_enabled '1'
option subnets_list_enabled '0'
option custom_domains_list_type 'text'
option custom_local_domains_list_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_download_subnets_list_enabled '0'
option all_traffic_from_ip_enabled '0'
option delist_domains_enabled '0'
option exclude_from_ip_enabled '0'
option yacd '0'
option socks5 '0'
option exclude_ntp '1'
option quic_disable '1'
option dont_touch_dhcp '1'
option update_interval '1d'
option dns_type 'doh'
option dns_server 'dns.adguard-dns.com'
option split_dns_enabled '0'
option dns_rewrite_ttl '60'
option cache_file '/tmp/cache.db'
list iface 'br-lan'
option mon_restart_ifaces '0'
option detour '1'
list domain_list 'block'
list domain_list 'meta'
list domain_list 'twitter'
list domain_list 'hdrezka'
list domain_list 'telegram'
list domain_list 'discord'
list domain_list 'youtube'
option custom_domains_text 'myip.com'
option custom_subnets_list_enabled 'disabled'

View File

@@ -1,35 +0,0 @@
config main 'main'
option mode 'vpn'
option interface 'awg10'
option domain_list_enabled '1'
option subnets_list_enabled '0'
option custom_domains_list_type 'text'
option custom_local_domains_list_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_download_subnets_list_enabled '0'
option all_traffic_from_ip_enabled '0'
option delist_domains_enabled '0'
option exclude_from_ip_enabled '0'
option yacd '0'
option socks5 '0'
option exclude_ntp '1'
option quic_disable '1'
option dont_touch_dhcp '1'
option update_interval '1d'
option dns_type 'doh'
option dns_server 'dns.adguard-dns.com'
option split_dns_enabled '0'
option dns_rewrite_ttl '60'
option cache_file '/tmp/cache.db'
list iface 'br-lan'
option mon_restart_ifaces '0'
option detour '1'
list domain_list 'block'
list domain_list 'meta'
list domain_list 'twitter'
list domain_list 'hdrezka'
list domain_list 'telegram'
list domain_list 'discord'
option custom_domains_text 'myip.com'
option custom_subnets_list_enabled 'disabled'

View File

@@ -1,102 +0,0 @@
config main 'main'
option mode 'vpn'
option domain_list_enabled '0'
option subnets_list_enabled '1'
option custom_domains_list_enabled 'dynamic'
option custom_subnets_list_enabled 'disabled'
option all_traffic_from_ip_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_download_subnets_list_enabled '0'
option exclude_from_ip_enabled '0'
option update_interval '0 4 * * *'
option custom_local_domains_list_enabled '0'
option interface 'awg10'
list subnets 'meta'
list subnets 'twitter'
list subnets 'discord'
list custom_domains '2ip.ru'
list custom_domains 'rutracker.org'
list custom_domains 'rutracker.net'
list custom_domains 'rutracker.cc'
list custom_domains 'rutor.info'
list custom_domains 'nnmclub.to'
list custom_domains 'lostfilm.tv'
list custom_domains 'animego.org'
list custom_domains 'jut.su'
list custom_domains 'anilibria.tv'
list custom_domains 'twimg.com'
list custom_domains 'kinozal.tv'
list custom_domains 'cdninstagram.com'
list custom_domains 'instagram.com'
list custom_domains 'ig.me'
list custom_domains 'fbcdn.net'
list custom_domains 'facebook.com'
list custom_domains 'facebook.net'
list custom_domains 'fb.com'
list custom_domains 'discord.com'
list custom_domains 'discordapp.com'
list custom_domains 'discord.gg'
list custom_domains 'discordapp.net'
list custom_domains 'discord.media'
config second 'second'
option second_enable '1'
option domain_list_enabled '0'
list domains 'youtube'
option second_mode 'proxy'
option second_proxy_config_type 'outbound'
option second_outbound_json '{
"type": "http",
"server": "127.0.0.1",
"server_port": 18080
}'
option second_domain_service_enabled '0'
option second_custom_domains_list_enabled 'dynamic'
option second_custom_subnets_list_enabled 'disabled'
list second_custom_domains 'chatgpt.com'
list second_custom_domains 'oaistatic.com'
list second_custom_domains 'oaiusercontent.com'
list second_custom_domains 'openai.com'
list second_custom_domains 'microsoft.com'
list second_custom_domains 'windowsupdate.com'
list second_custom_domains 'bing.com'
list second_custom_domains 'supercell.com'
list second_custom_domains 'seeurlpcl.com'
list second_custom_domains 'supercellid.com'
list second_custom_domains 'supercellgames.com'
list second_custom_domains 'clashroyale.com'
list second_custom_domains 'brawlstars.com'
list second_custom_domains 'clash.com'
list second_custom_domains 'clashofclans.com'
list second_custom_domains 'x.ai'
list second_custom_domains 'grok.com'
list second_custom_domains 'gitgub.com'
list second_custom_domains 'searchgpt.com'
list second_custom_domains 'xboxlive.com'
list second_custom_domains 'gamepass.com'
list second_custom_domains 'xboxab.com'
list second_custom_domains 'xboxservices.com'
list second_custom_domains 'myip.com'
list second_custom_domains '4pda.to'
list second_custom_domains '4pda.ws'
list second_custom_domains 'habr.com'
list second_custom_domains 'byteoversea.com'
list second_custom_domains 'ibytedtos.com'
list second_custom_domains 'muscdn.com'
list second_custom_domains 'musical.ly'
list second_custom_domains 'tik-tokapi.com'
list second_custom_domains 'tiktok.com'
list second_custom_domains 'tiktokcdn-us.com'
list second_custom_domains 'tiktokcdn-eu.com'
list second_custom_domains 'tiktokcdn.com'
list second_custom_domains 'tiktokd.net'
list second_custom_domains 'tiktokd.org'
list second_custom_domains 'tiktokv.com'
list second_custom_domains 'tiktokv.us'
list second_custom_domains 'tiktokw.us'
list second_custom_domains 'ttwstatic.com'
list second_custom_domains 'intel.com'
list second_custom_domains 'intel.se'
list second_custom_domains 'onetrust.com'
list second_custom_domains 'gemini.google.com'

View File

@@ -1,112 +0,0 @@
config main 'main'
option mode 'vpn'
option domain_list_enabled '0'
option subnets_list_enabled '1'
option custom_domains_list_enabled 'dynamic'
option custom_subnets_list_enabled 'disabled'
option all_traffic_from_ip_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_download_subnets_list_enabled '0'
option exclude_from_ip_enabled '0'
option update_interval '0 4 * * *'
option custom_local_domains_list_enabled '0'
option interface 'awg10'
list subnets 'meta'
list subnets 'twitter'
list subnets 'discord'
list custom_domains '2ip.ru'
list custom_domains 'googlevideo.com'
list custom_domains 'ggpht.com'
list custom_domains 'ytimg.com'
list custom_domains 'youtube.com'
list custom_domains 'play.google.com'
list custom_domains 'youtu.be'
list custom_domains 'googleapis.com'
list custom_domains 'googleusercontent.com'
list custom_domains 'gstatic.com'
list custom_domains 'l.google.com'
list custom_domains 'rutracker.org'
list custom_domains 'rutracker.net'
list custom_domains 'rutracker.cc'
list custom_domains 'rutor.info'
list custom_domains 'nnmclub.to'
list custom_domains 'lostfilm.tv'
list custom_domains 'animego.org'
list custom_domains 'jut.su'
list custom_domains 'anilibria.tv'
list custom_domains 'twimg.com'
list custom_domains 'kinozal.tv'
list custom_domains 'cdninstagram.com'
list custom_domains 'instagram.com'
list custom_domains 'ig.me'
list custom_domains 'fbcdn.net'
list custom_domains 'facebook.com'
list custom_domains 'facebook.net'
list custom_domains 'fb.com'
list custom_domains 'discord.com'
list custom_domains 'discordapp.com'
list custom_domains 'discord.gg'
list custom_domains 'discordapp.net'
list custom_domains 'discord.media'
config second 'second'
option second_enable '0'
option domain_list_enabled '0'
list domains 'youtube'
option second_mode 'proxy'
option second_proxy_config_type 'outbound'
option second_outbound_json '{
"type": "http",
"server": "127.0.0.1",
"server_port": 18080
}'
option second_domain_service_enabled '0'
option second_custom_domains_list_enabled 'dynamic'
option second_custom_subnets_list_enabled 'disabled'
list second_custom_domains 'chatgpt.com'
list second_custom_domains 'oaistatic.com'
list second_custom_domains 'oaiusercontent.com'
list second_custom_domains 'openai.com'
list second_custom_domains 'microsoft.com'
list second_custom_domains 'windowsupdate.com'
list second_custom_domains 'bing.com'
list second_custom_domains 'supercell.com'
list second_custom_domains 'seeurlpcl.com'
list second_custom_domains 'supercellid.com'
list second_custom_domains 'supercellgames.com'
list second_custom_domains 'clashroyale.com'
list second_custom_domains 'brawlstars.com'
list second_custom_domains 'clash.com'
list second_custom_domains 'clashofclans.com'
list second_custom_domains 'x.ai'
list second_custom_domains 'grok.com'
list second_custom_domains 'gitgub.com'
list second_custom_domains 'searchgpt.com'
list second_custom_domains 'xboxlive.com'
list second_custom_domains 'gamepass.com'
list second_custom_domains 'xboxab.com'
list second_custom_domains 'xboxservices.com'
list second_custom_domains 'myip.com'
list second_custom_domains '4pda.to'
list second_custom_domains '4pda.ws'
list second_custom_domains 'habr.com'
list second_custom_domains 'byteoversea.com'
list second_custom_domains 'ibytedtos.com'
list second_custom_domains 'muscdn.com'
list second_custom_domains 'musical.ly'
list second_custom_domains 'tik-tokapi.com'
list second_custom_domains 'tiktok.com'
list second_custom_domains 'tiktokcdn-us.com'
list second_custom_domains 'tiktokcdn-eu.com'
list second_custom_domains 'tiktokcdn.com'
list second_custom_domains 'tiktokd.net'
list second_custom_domains 'tiktokd.org'
list second_custom_domains 'tiktokv.com'
list second_custom_domains 'tiktokv.us'
list second_custom_domains 'tiktokw.us'
list second_custom_domains 'ttwstatic.com'
list second_custom_domains 'intel.com'
list second_custom_domains 'intel.se'
list second_custom_domains 'onetrust.com'
list second_custom_domains 'gemini.google.com'

View File

@@ -1,102 +0,0 @@
config main 'main'
option mode 'vpn'
option domain_list_enabled '0'
option subnets_list_enabled '1'
option custom_domains_list_enabled 'dynamic'
option custom_subnets_list_enabled 'disabled'
option all_traffic_from_ip_enabled '0'
option custom_download_domains_list_enabled '0'
option custom_download_subnets_list_enabled '0'
option exclude_from_ip_enabled '0'
option update_interval '0 4 * * *'
option custom_local_domains_list_enabled '0'
option interface 'awg10'
list subnets 'meta'
list subnets 'twitter'
list subnets 'discord'
list custom_domains '2ip.ru'
list custom_domains 'rutracker.org'
list custom_domains 'rutracker.net'
list custom_domains 'rutracker.cc'
list custom_domains 'rutor.info'
list custom_domains 'nnmclub.to'
list custom_domains 'lostfilm.tv'
list custom_domains 'animego.org'
list custom_domains 'jut.su'
list custom_domains 'anilibria.tv'
list custom_domains 'twimg.com'
list custom_domains 'kinozal.tv'
list custom_domains 'cdninstagram.com'
list custom_domains 'instagram.com'
list custom_domains 'ig.me'
list custom_domains 'fbcdn.net'
list custom_domains 'facebook.com'
list custom_domains 'facebook.net'
list custom_domains 'fb.com'
list custom_domains 'discord.com'
list custom_domains 'discordapp.com'
list custom_domains 'discord.gg'
list custom_domains 'discordapp.net'
list custom_domains 'discord.media'
config second 'second'
option second_enable '0'
option domain_list_enabled '0'
list domains 'youtube'
option second_mode 'proxy'
option second_proxy_config_type 'outbound'
option second_outbound_json '{
"type": "http",
"server": "127.0.0.1",
"server_port": 18080
}'
option second_domain_service_enabled '0'
option second_custom_domains_list_enabled 'dynamic'
option second_custom_subnets_list_enabled 'disabled'
list second_custom_domains 'chatgpt.com'
list second_custom_domains 'oaistatic.com'
list second_custom_domains 'oaiusercontent.com'
list second_custom_domains 'openai.com'
list second_custom_domains 'microsoft.com'
list second_custom_domains 'windowsupdate.com'
list second_custom_domains 'bing.com'
list second_custom_domains 'supercell.com'
list second_custom_domains 'seeurlpcl.com'
list second_custom_domains 'supercellid.com'
list second_custom_domains 'supercellgames.com'
list second_custom_domains 'clashroyale.com'
list second_custom_domains 'brawlstars.com'
list second_custom_domains 'clash.com'
list second_custom_domains 'clashofclans.com'
list second_custom_domains 'x.ai'
list second_custom_domains 'grok.com'
list second_custom_domains 'gitgub.com'
list second_custom_domains 'searchgpt.com'
list second_custom_domains 'xboxlive.com'
list second_custom_domains 'gamepass.com'
list second_custom_domains 'xboxab.com'
list second_custom_domains 'xboxservices.com'
list second_custom_domains 'myip.com'
list second_custom_domains '4pda.to'
list second_custom_domains '4pda.ws'
list second_custom_domains 'habr.com'
list second_custom_domains 'byteoversea.com'
list second_custom_domains 'ibytedtos.com'
list second_custom_domains 'muscdn.com'
list second_custom_domains 'musical.ly'
list second_custom_domains 'tik-tokapi.com'
list second_custom_domains 'tiktok.com'
list second_custom_domains 'tiktokcdn-us.com'
list second_custom_domains 'tiktokcdn-eu.com'
list second_custom_domains 'tiktokcdn.com'
list second_custom_domains 'tiktokd.net'
list second_custom_domains 'tiktokd.org'
list second_custom_domains 'tiktokv.com'
list second_custom_domains 'tiktokv.us'
list second_custom_domains 'tiktokw.us'
list second_custom_domains 'ttwstatic.com'
list second_custom_domains 'intel.com'
list second_custom_domains 'intel.se'
list second_custom_domains 'onetrust.com'
list second_custom_domains 'gemini.google.com'

View File

@@ -1,86 +0,0 @@
config stubby 'global'
option manual '0'
list dns_transport 'GETDNS_TRANSPORT_TLS'
option tls_authentication '1'
option tls_query_padding_blocksize '128'
option appdata_dir '/var/lib/stubby'
option edns_client_subnet_private '1'
option idle_timeout '10000'
option round_robin_upstreams '0'
list listen_address '127.0.0.1@5453'
list listen_address '0::1@5453'
list trigger 'wan'
list trigger 'wan6'
list trigger 'pppoe'
list trigger 'l2tp'
list trigger 'pptp'
list trigger 'modem'
list trigger 'wwan'
list trigger 'wwan0'
option log_level '0'
config resolver
option address '94.140.14.14'
option tls_auth_name 'dns.adguard.com'
config resolver
option address '94.140.14.15'
option tls_auth_name 'dns.adguard.com'
config resolver
option address '2a10:50c0::ad1:ff'
option tls_auth_name 'dns.adguard.com'
config resolver
option address '2a10:50c0::ad2:ff'
option tls_auth_name 'dns.adguard.com'
config resolver
option address '8.8.8.8'
option tls_auth_name 'dns.google'
config resolver
option address '1.1.1.1'
option tls_auth_name 'cloudflare-dns.com'
config resolver
option address '2001:4860:4860::8888'
option tls_auth_name 'dns.google'
config resolver
option address '2606:4700:4700::1111'
option tls_auth_name 'cloudflare-dns.com'
config resolver
option address '8.8.4.4'
option tls_auth_name 'dns.google'
config resolver
option address '1.0.0.1'
option tls_auth_name 'cloudflare-dns.com'
config resolver
option address '2001:4860:4860::8844'
option tls_auth_name 'dns.google'
config resolver
option address '2606:4700:4700::1001'
option tls_auth_name 'cloudflare-dns.com'
config resolver
option address '9.9.9.9'
option tls_auth_name 'dns.quad9.net'
config resolver
option address '149.112.112.112'
option tls_auth_name 'dns.quad9.net'
config resolver
option address '2620:fe::fe'
option tls_auth_name 'dns.quad9.net'
config resolver
option address '2620:fe::9'
option tls_auth_name 'dns.quad9.net'

View File

@@ -8,7 +8,7 @@ config youtubeUnblock 'youtubeUnblock'
config section
option name 'Youtube'
option enabled '1'
option enabled '0'
option tls_enabled '1'
option fake_sni '1'
option faking_strategy 'pastseq'
@@ -36,37 +36,6 @@ config section
list sni_domains 'l.google.com'
option quic_drop '1'
config section
option name 'Discord'
option tls_enabled '1'
option fake_sni '1'
option faking_strategy 'pastseq'
option fake_sni_seq_len '1'
option fake_sni_type 'default'
option frag 'tcp'
option frag_sni_reverse '1'
option frag_sni_faked '0'
option frag_middle_sni '1'
option frag_sni_pos '1'
option seg2delay '0'
option fk_winsize '0'
option synfake '0'
option all_domains '0'
option sni_detection 'parse'
option quic_drop '0'
option udp_mode 'fake'
option udp_faking_strategy 'none'
option udp_fake_seq_len '6'
option udp_fake_len '64'
list udp_dport_filter '50000-50100 '
option udp_filter_quic 'disabled'
option enabled '1'
list sni_domains 'discord.com'
list sni_domains 'discordapp.com'
list sni_domains 'discord.gg'
list sni_domains 'discordapp.net'
list sni_domains 'discord.media'
config section
option name 'CallsWhatsAppTelegram'
option tls_enabled '0'
@@ -102,4 +71,5 @@ config section
option udp_fake_len '64'
option udp_filter_quic 'disabled'
option enabled '1'
option udp_stun_filter '1'
option udp_stun_filter '1'

View File

@@ -36,6 +36,37 @@ config section
list sni_domains 'l.google.com'
option quic_drop '1'
config section
option name 'Discord'
option tls_enabled '1'
option fake_sni '1'
option faking_strategy 'pastseq'
option fake_sni_seq_len '1'
option fake_sni_type 'default'
option frag 'tcp'
option frag_sni_reverse '1'
option frag_sni_faked '0'
option frag_middle_sni '1'
option frag_sni_pos '1'
option seg2delay '0'
option fk_winsize '0'
option synfake '0'
option all_domains '0'
option sni_detection 'parse'
option quic_drop '0'
option udp_mode 'fake'
option udp_faking_strategy 'none'
option udp_fake_seq_len '6'
option udp_fake_len '64'
list udp_dport_filter '50000-50100 '
option udp_filter_quic 'disabled'
option enabled '1'
list sni_domains 'discord.com'
list sni_domains 'discordapp.com'
list sni_domains 'discord.gg'
list sni_domains 'discordapp.net'
list sni_domains 'discord.media'
config section
option name 'CallsWhatsAppTelegram'
option tls_enabled '0'

View File

@@ -1,55 +0,0 @@
config main 'config'
option run_on_boot '1'
option FWTYPE 'nftables'
option POSTNAT '1'
option FLOWOFFLOAD 'none'
option INIT_APPLY_FW '1'
option DISABLE_IPV4 '0'
option DISABLE_IPV6 '1'
option FILTER_TTL_EXPIRED_ICMP '1'
option MODE_FILTER 'hostlist'
option DISABLE_CUSTOM '0'
option WS_USER 'daemon'
option DAEMON_LOG_ENABLE '0'
option DAEMON_LOG_FILE '/tmp/zapret+<DAEMON_NAME>+<DAEMON_IDNUM>+<DAEMON_CFGNAME>.log'
option AUTOHOSTLIST_RETRANS_THRESHOLD '3'
option AUTOHOSTLIST_FAIL_THRESHOLD '3'
option AUTOHOSTLIST_FAIL_TIME '60'
option AUTOHOSTLIST_DEBUGLOG '0'
option NFQWS_ENABLE '1'
option DESYNC_MARK '0x40000000'
option DESYNC_MARK_POSTNAT '0x20000000'
option NFQWS_PORTS_TCP '80,443'
option NFQWS_PORTS_UDP '443'
option NFQWS_TCP_PKT_OUT '9'
option NFQWS_TCP_PKT_IN '3'
option NFQWS_UDP_PKT_OUT '9'
option NFQWS_UDP_PKT_IN '0'
option NFQWS_PORTS_TCP_KEEPALIVE '0'
option NFQWS_PORTS_UDP_KEEPALIVE '0'
option NFQWS_OPT '
--filter-tcp=80 <HOSTLIST>
--dpi-desync=fake,fakedsplit
--dpi-desync-autottl=2
--dpi-desync-fooling=badsum
--new
--filter-tcp=443
--hostlist=/opt/zapret/ipset/zapret-hosts-google.txt
--dpi-desync=multidisorder
--dpi-desync-split-pos=1,midsld
--new
--filter-udp=443 --hostlist=/opt/zapret/ipset/zapret-hosts-google.txt
--dpi-desync=fake
--dpi-desync-repeats=11
--dpi-desync-fake-quic=/opt/zapret/files/fake/quic_initial_www_google_com.bin
--new
--filter-udp=443 <HOSTLIST_NOAUTO>
--dpi-desync=fake
--dpi-desync-repeats=11
--new
--filter-tcp=443 <HOSTLIST>
--dpi-desync=multidisorder
--dpi-desync-split-pos=1,sniext+1,host+1,midsld-2,midsld,midsld+2,endhost-1
'

View File

@@ -1,34 +0,0 @@
speedtest.net
discord.com
discordapp.com
discord.gg
discordapp.net
discord.media
cdninstagram.com
instagram.com
ig.me
fbcdn.net
facebook.com
facebook.net
fb.com
rutracker.org
rutracker.net
rutracker.cc
rutor.info
rutor.is
nnmclub.to
twitter.com
t.co
twimg.com
ads-twitter.com
x.com
pscp.tv
twtrdns.net
twttr.com
periscope.tv
tweetdeck.com
twitpic.com
twitter.co
twitterinc.com
twitteroauth.com
twitterstat.us

View File

@@ -1 +0,0 @@
speedtest.net

View File

@@ -1,6 +1,6 @@
#!/bin/sh
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/main"
DIR="/etc/config"
DIR_BACKUP="/root/backup"
config_files="dhcp

View File

@@ -1,6 +1,6 @@
#!/bin/sh
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/main"
DIR="/etc/config"
DIR_BACKUP="/root/backup"
config_files="dhcp

View File

@@ -1,68 +0,0 @@
#!/bin/sh
DIR="/etc/config"
DIR_BACKUP="/root/backup3"
config_files="network
firewall
youtubeUnblock
https-dns-proxy
dhcp
dns-failsafe-proxy"
manage_package() {
local name="$1"
local autostart="$2"
local process="$3"
# Проверка, установлен ли пакет
if opkg list-installed | grep -q "^$name"; then
# Проверка, включен ли автозапуск
if /etc/init.d/$name enabled; then
if [ "$autostart" = "disable" ]; then
/etc/init.d/$name disable
fi
else
if [ "$autostart" = "enable" ]; then
/etc/init.d/$name enable
fi
fi
# Проверка, запущен ли процесс
if pidof $name > /dev/null; then
if [ "$process" = "stop" ]; then
/etc/init.d/$name stop
fi
else
if [ "$process" = "start" ]; then
/etc/init.d/$name start
fi
fi
fi
}
if [ -d "$DIR_BACKUP" ]
then
echo "Restore configs..."
for file in $config_files
do
cp -f "$DIR_BACKUP/$file" "$DIR/$file"
done
rm -rf "$DIR_BACKUP"
fi
echo "Stop and disabled autostart Podkop..."
manage_package "podkop" "disable" "stop"
echo "Run and enabled autostart youtubeUnblock and ruantiblock..."
manage_package "youtubeUnblock" "enable" "start"
manage_package "ruantiblock" "enable" "start"
printf "\033[32;1mRestart firewall, dnsmasq, odhcpd...\033[0m\n"
service firewall restart
service dnsmasq restart
service odhcpd restart
#service network restart
printf "\033[32;1mOff configured completed...\033[0m\n"

View File

@@ -1,16 +0,0 @@
#!/bin/sh
DESCRIPTION=$(ubus call system board | jsonfilter -e '@.release.description')
VERSION=$(ubus call system board | jsonfilter -e '@.release.version')
findKey="RouteRich"
findVersion="24.10.2"
if echo "$DESCRIPTION" | grep -qi -- "$findKey" && printf '%s\n%s\n' "$findVersion" "$VERSION" | sort -V | tail -n1 | grep -qx -- "$VERSION"; then
printf "\033[32;1mThis new firmware. Running new scprit...\033[0m\n"
wget --no-check-certificate -O /tmp/universal_config_new_podkop.sh https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop/universal_config_new_podkop.sh && chmod +x /tmp/universal_config_new_podkop.sh && /tmp/universal_config_new_podkop.sh $1 $2
else
printf "\033[32;1mThis old firmware.\nRecommendation, upgrade firmware to actual release...\nSleep 5 sec...\033[0m\n"
sleep 5
printf "\033[32;1mRunning old scprit...\033[0m\n"
wget --no-check-certificate -O /tmp/universal_config.sh https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop/universal_config.sh && chmod +x /tmp/universal_config.sh && /tmp/universal_config.sh $1 $2
fi

View File

@@ -120,191 +120,118 @@ manage_package() {
fi
}
checkPackageAndInstall()
{
checkPackageAndInstall() {
local name="$1"
local isRequried="$2"
#проверяем установлени ли библиотека $name
if opkg list-installed | grep -q $name; then
echo "$name already installed..."
local isRequired="$2"
local alt=""
if [ "$name" = "https-dns-proxy" ]; then
alt="luci-app-doh-proxy"
fi
if [ -n "$alt" ]; then
if opkg list-installed | grep -qE "^($name|$alt) "; then
echo "$name or $alt already installed..."
return 0
fi
else
echo "$name not installed. Installed $name..."
opkg install $name
res=$?
if [ "$isRequried" = "1" ]; then
if [ $res -eq 0 ]; then
echo "$name insalled successfully"
else
echo "Error installing $name. Please, install $name manually and run the script again"
exit 1
fi
fi
if opkg list-installed | grep -q "^$name "; then
echo "$name already installed..."
return 0
fi
fi
echo "$name not installed. Installing $name..."
opkg install "$name"
res=$?
if [ "$isRequired" = "1" ]; then
if [ $res -eq 0 ]; then
echo "$name installed successfully"
else
echo "Error installing $name. Please, install $name manually$( [ -n "$alt" ] && echo " or $alt") and run the script again."
exit 1
fi
fi
}
requestConfWARP1()
{
HASH='68747470733a2f2f73616e74612d61746d6f2e72752f776172702f776172702e706870'
COMPILE=$(printf '%b' "$(printf '%s\n' "$HASH" | sed 's/../\\x&/g')")
#запрос конфигурации WARP
local response=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" "$COMPILE" \
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
-H "referer: $COMPILE" \
-H "Origin: $COMPILE")
echo "$response"
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp.llimonix.pw/api/warp' \
-H 'Accept: */*' \
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
-H 'Connection: keep-alive' \
-H 'Content-Type: application/json' \
-H 'Origin: https://warp.llimonix.pw' \
-H 'Referer: https://warp.llimonix.pw/' \
-H 'Sec-Fetch-Dest: empty' \
-H 'Sec-Fetch-Mode: cors' \
-H 'Sec-Fetch-Site: same-origin' \
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36' \
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133")' \
-H 'sec-ch-ua-mobile: ?0' \
-H 'sec-ch-ua-platform: "Windows"' \
--data-raw '{"selectedServices":[],"siteMode":"all","deviceType":"computer"}')
echo "$result"
}
requestConfWARP2()
{
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://dulcet-fox-556b08.netlify.app/api/warp' \
-H 'Accept: */*' \
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
-H 'Connection: keep-alive' \
-H 'Content-Type: application/json' \
-H 'Origin: https://dulcet-fox-556b08.netlify.app/api/warp' \
-H 'Referer: https://dulcet-fox-556b08.netlify.app/api/warp' \
-H 'Sec-Fetch-Dest: empty' \
-H 'Sec-Fetch-Mode: cors' \
-H 'Sec-Fetch-Site: same-origin' \
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/140.0.0.0 Safari/537.36' \
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133")' \
-H 'sec-ch-ua-mobile: ?0' \
-H 'sec-ch-ua-platform: "Windows"' \
--data-raw '{"selectedServices":[],"siteMode":"all","deviceType":"computer","endpoint":"162.159.195.1:500"}')
echo "$result"
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://topor-warp.vercel.app/generate' \
-H 'Accept: */*' \
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
-H 'Connection: keep-alive' \
-H 'Content-Type: application/json' \
-H 'Origin: https://topor-warp.vercel.app' \
-H 'Referer: https://topor-warp.vercel.app/' \
-H 'Sec-Fetch-Dest: empty' \
-H 'Sec-Fetch-Mode: cors' \
-H 'Sec-Fetch-Site: same-origin' \
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36' \
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133"' \
-H 'sec-ch-ua-mobile: ?0' \
-H 'sec-ch-ua-platform: "Windows"' \
--data-raw '{"platform":"all"}')
echo "$result"
}
requestConfWARP3()
{
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp-config-generator-theta.vercel.app/api/warp' \
-H 'Accept: */*' \
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
-H 'Connection: keep-alive' \
-H 'Content-Type: application/json' \
-H 'Origin: https://warp-config-generator-theta.vercel.app/api/warp' \
-H 'Referer: https://warp-config-generator-theta.vercel.app/api/warp' \
-H 'Sec-Fetch-Dest: empty' \
-H 'Sec-Fetch-Mode: cors' \
-H 'Sec-Fetch-Site: same-origin' \
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/140.0.0.0 Safari/537.36' \
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133")' \
-H 'sec-ch-ua-mobile: ?0' \
-H 'sec-ch-ua-platform: "Windows"' \
--data-raw '{"selectedServices":[],"siteMode":"all","deviceType":"computer","endpoint":"162.159.195.1:500"}')
echo "$result"
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp-gen.vercel.app/generate-config' \
-H 'Accept: */*' \
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
-H 'Connection: keep-alive' \
-H 'Referer: https://warp-gen.vercel.app/' \
-H 'Sec-Fetch-Dest: empty' \
-H 'Sec-Fetch-Mode: cors' \
-H 'Sec-Fetch-Site: same-origin' \
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36' \
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133"' \
-H 'sec-ch-ua-mobile: ?0' \
-H 'sec-ch-ua-platform: "Windows"')
echo "$result"
}
requestConfWARP4()
{
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://generator-warp-config.vercel.app/warp4s?dns=1.1.1.1%2C%201.0.0.1%2C%202606%3A4700%3A4700%3A%3A1111%2C%202606%3A4700%3A4700%3A%3A1001&allowedIPs=0.0.0.0%2F0%2C%20%3A%3A%2F0' \
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
-H 'referer: https://generator-warp-config.vercel.app' \
-H "Origin: https://generator-warp-config.vercel.app")
echo "$result"
}
requestConfWARP5()
{
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://valokda-amnezia.vercel.app/api/warp' \
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
-H 'accept: */*' \
-H 'accept-language: ru-RU,ru;q=0.9' \
-H 'referer: https://valokda-amnezia.vercel.app/api/warp')
echo "$result"
}
requestConfWARP6()
{
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp-gen.vercel.app/generate-config' \
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
-H 'accept: */*' \
-H 'accept-language: ru-RU,ru;q=0.9' \
-H 'referer: https://warp-gen.vercel.app/generate-config')
echo "$result"
}
requestConfWARP7()
{
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://config-generator-warp.vercel.app/warps' \
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
-H 'accept: */*' \
-H 'accept-language: ru-RU,ru;q=0.9' \
-H 'referer: https://config-generator-warp.vercel.app/')
echo "$result"
}
requestConfWARP8()
{
#запрос конфигурации WARP без параметров
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://config-generator-warp.vercel.app/warp6s' \
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
-H 'accept: */*' \
-H 'accept-language: ru-RU,ru;q=0.9' \
-H 'referer: https://config-generator-warp.vercel.app/')
echo "$result"
}
requestConfWARP9()
{
#запрос конфигурации WARP без параметров
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://config-generator-warp.vercel.app/warp4s' \
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
-H 'accept: */*' \
-H 'accept-language: ru-RU,ru;q=0.9' \
-H 'referer: https://config-generator-warp.vercel.app/')
echo "$result"
}
requestConfWARP10()
{
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://warp-generator.vercel.app/api/warp' \
-A 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/141.0.0.0 Safari/537.36' \
-H 'accept: */*' \
-H 'accept-language: ru-RU,ru;q=0.6' \
-H 'content-type: application/json' \
-H 'referer: https://warp-generator.vercel.app/' \
--data-raw '{"selectedServices":[],"siteMode":"all","deviceType":"computer"}')
echo "$result"
}
confWarpBuilder()
{
response_body=$1
peer_pub=$(echo "$response_body" | jq -r '.result.config.peers[0].public_key')
client_ipv4=$(echo "$response_body" | jq -r '.result.config.interface.addresses.v4')
client_ipv6=$(echo "$response_body" | jq -r '.result.config.interface.addresses.v6')
priv=$(echo "$response_body" | jq -r '.result.key')
conf=$(cat <<-EOM
[Interface]
PrivateKey = ${priv}
S1 = 0
S2 = 0
Jc = 120
Jmin = 23
Jmax = 911
H1 = 1
H2 = 2
H3 = 3
H4 = 4
MTU = 1280
I1 = <b 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>
Address = ${client_ipv4}, ${client_ipv6}
DNS = 1.1.1.1, 2606:4700:4700::1111, 1.0.0.1, 2606:4700:4700::1001
[Peer]
PublicKey = ${peer_pub}
AllowedIPs = 0.0.0.0/0, ::/0
Endpoint = 162.159.192.1:500
EOM
)
echo "$conf"
#запрос конфигурации WARP
local result=$(curl --connect-timeout 20 --max-time 60 -w "%{http_code}" 'https://config-generator-warp.vercel.app/warp' \
-H 'Accept: */*' \
-H 'Accept-Language: ru-RU,ru;q=0.9,en-US;q=0.8,en;q=0.7' \
-H 'Connection: keep-alive' \
-H 'Referer: https://config-generator-warp.vercel.app/' \
-H 'Sec-Fetch-Dest: empty' \
-H 'Sec-Fetch-Mode: cors' \
-H 'Sec-Fetch-Site: same-origin' \
-H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36' \
-H 'sec-ch-ua: "Not(A:Brand";v="99", "Google Chrome";v="133", "Chromium";v="133"' \
-H 'sec-ch-ua-mobile: ?0' \
-H 'sec-ch-ua-platform: "Windows"')
echo "$result"
}
# Функция для обработки выполнения запроса
@@ -320,56 +247,31 @@ check_request() {
# Проверяем код состояния
if [ "$response_code" -eq 200 ]; then
case $choice in
1)
warp_config=$(confWarpBuilder "$response_body")
echo "$warp_config"
1)
status=$(echo $response_body | jq '.success')
#echo "$status"
if [ "$status" = "true" ]
then
content=$(echo $response_body | jq '.content')
configBase64=$(echo $content | jq -r '.configBase64')
warpGen=$(echo "$configBase64" | base64 -d)
echo "$warpGen";
else
echo "Error"
fi
;;
2)
content=$(echo $response_body | jq -r '.content')
content=$(echo $content | jq -r '.configBase64')
warp_config=$(echo "$content" | base64 -d)
echo "$warp_config"
echo "$response_body"
;;
3)
content=$(echo $response_body | jq -r '.content')
content=$(echo $content | jq -r '.configBase64')
warp_config=$(echo "$content" | base64 -d)
echo "$warp_config"
content=$(echo $response_body | jq -r '.config')
#content=$(echo "$content" | sed 's/\\n/\012/g')
echo "$content"
;;
4)
content=$(echo $response_body | jq -r '.content')
warp_config=$(echo "$content" | base64 -d)
echo "$warp_config"
;;
5)
content=$(echo $response_body | jq -r '.content')
warp_config=$(echo "$content" | base64 -d)
echo "$warp_config"
;;
6)
content=$(echo $response_body | jq -r '.config')
echo "$content"
;;
7)
content=$(echo $response_body | jq -r '.content')
warp_config=$(echo "$content" | base64 -d)
echo "$warp_config"
;;
8)
content=$(echo $response_body | jq -r '.content')
warp_config=$(echo "$content" | base64 -d)
echo "$warp_config"
;;
9)
content=$(echo $response_body | jq -r '.content')
warp_config=$(echo "$content" | base64 -d)
echo "$warp_config"
;;
10)
content=$(echo $response_body | jq -r '.content')
content=$(echo $content | jq -r '.configBase64')
warp_config=$(echo "$content" | base64 -d)
echo "$warp_config"
;;
*)
echo "Error"
@@ -393,94 +295,6 @@ checkAndAddDomainPermanentName()
fi
}
byPassGeoBlockComssDNS()
{
echo "Configure dhcp..."
uci set dhcp.cfg01411c.strictorder='1'
uci set dhcp.cfg01411c.filter_aaaa='1'
uci add_list dhcp.cfg01411c.server='127.0.0.1#5053'
uci add_list dhcp.cfg01411c.server='127.0.0.1#5054'
uci add_list dhcp.cfg01411c.server='127.0.0.1#5055'
uci add_list dhcp.cfg01411c.server='127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.chatgpt.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.oaistatic.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.oaiusercontent.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.openai.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.microsoft.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.windowsupdate.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.bing.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.supercell.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.seeurlpcl.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.supercellid.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.supercellgames.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.clashroyale.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.brawlstars.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.clash.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.clashofclans.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.x.ai/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.grok.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.github.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.forzamotorsport.net/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.forzaracingchampionship.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.forzarc.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.gamepass.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.orithegame.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.renovacionxboxlive.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.tellmewhygame.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xbox.co/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xbox.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xbox.eu/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xbox.org/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xbox360.co/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xbox360.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xbox360.eu/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xbox360.org/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxab.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxgamepass.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxgamestudios.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxlive.cn/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxlive.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxone.co/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxone.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxone.eu/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxplayanywhere.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxservices.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xboxstudios.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.xbx.lv/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.sentry.io/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.usercentrics.eu/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.recaptcha.net/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.gstatic.com/127.0.0.1#5056'
uci add_list dhcp.cfg01411c.server='/*.brawlstarsgame.com/127.0.0.1#5056'
uci commit dhcp
echo "Add unblock ChatGPT..."
checkAndAddDomainPermanentName "chatgpt.com" "83.220.169.155"
checkAndAddDomainPermanentName "openai.com" "83.220.169.155"
checkAndAddDomainPermanentName "webrtc.chatgpt.com" "83.220.169.155"
checkAndAddDomainPermanentName "ios.chat.openai.com" "83.220.169.155"
checkAndAddDomainPermanentName "searchgpt.com" "83.220.169.155"
service dnsmasq restart
service odhcpd restart
}
deleteByPassGeoBlockComssDNS()
{
uci del dhcp.cfg01411c.server
uci add_list dhcp.cfg01411c.server='127.0.0.1#5053'
uci add_list dhcp.cfg01411c.server='127.0.0.1#5054'
uci add_list dhcp.cfg01411c.server='127.0.0.1#5055'
uci add_list dhcp.cfg01411c.server='127.0.0.1#5056'
while uci del dhcp.@domain[-1] ; do : ; done;
uci commit dhcp
service dnsmasq restart
service odhcpd restart
service https-dns-proxy restart
}
install_youtubeunblock_packages() {
PKGARCH=$(opkg print-architecture | awk 'BEGIN {max=0} {if ($3 > max) {max = $3; arch = $2}} END {print arch}')
VERSION=$(ubus call system board | jsonfilter -e '@.release.version')
@@ -564,19 +378,6 @@ install_youtubeunblock_packages() {
rm -rf "$AWG_DIR"
}
if [ "$1" = "y" ] || [ "$1" = "Y" ]
then
is_manual_input_parameters="y"
else
is_manual_input_parameters="n"
fi
if [ "$2" = "y" ] || [ "$2" = "Y" ] || [ "$2" = "" ]
then
is_reconfig_podkop="y"
else
is_reconfig_podkop="n"
fi
echo "Update list packages..."
opkg update
@@ -591,50 +392,9 @@ install_awg_packages
checkPackageAndInstall "jq" "1"
checkPackageAndInstall "curl" "1"
checkPackageAndInstall "unzip" "1"
#checkPackageAndInstall "sing-box" "1"
checkPackageAndInstall "sing-box" "1"
checkPackageAndInstall "opera-proxy" "1"
checkPackageAndInstall "youtubeUnblock" "1"
###########
manage_package "podkop" "enable" "stop"
PACKAGE="sing-box"
REQUIRED_VERSION="1.11.15"
INSTALLED_VERSION=$(opkg list-installed | grep "^$PACKAGE" | cut -d ' ' -f 3)
if [ -n "$INSTALLED_VERSION" ] && [ "$INSTALLED_VERSION" != "$REQUIRED_VERSION" ]; then
echo "Version package $PACKAGE not equal $REQUIRED_VERSION. Removed packages..."
opkg remove --force-removal-of-dependent-packages $PACKAGE
fi
INSTALLED_VERSION=$(opkg list-installed | grep "^$PACKAGE")
if [ -z "$INSTALLED_VERSION" ]; then
PACK_NAME="sing-box"
AWG_DIR="/tmp/$PACK_NAME"
SINGBOX_FILENAME="sing-box_1.11.15_openwrt_aarch64_cortex-a53.ipk"
BASE_URL="https://github.com/SagerNet/sing-box/releases/download/v1.11.15/"
DOWNLOAD_URL="${BASE_URL}${SINGBOX_FILENAME}"
mkdir -p "$AWG_DIR"
#echo $DOWNLOAD_URL
wget -O "$AWG_DIR/$SINGBOX_FILENAME" "$DOWNLOAD_URL"
if [ $? -eq 0 ]; then
echo "$PACK_NAME file downloaded successfully"
else
echo "Error downloading $PACK_NAME. Please, install $PACK_NAME manually and run the script again"
exit 1
fi
opkg install "$AWG_DIR/$SINGBOX_FILENAME"
if [ $? -eq 0 ]; then
echo "$PACK_NAME file installing successfully"
else
echo "Error installing $PACK_NAME. Please, install $PACK_NAME manually and run the script again"
exit 1
fi
fi
###########
opkg upgrade youtubeUnblock
opkg upgrade luci-app-youtubeUnblock
manage_package "youtubeUnblock" "enable" "start"
@@ -661,7 +421,7 @@ firewall
https-dns-proxy
youtubeUnblock
dhcp"
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/test_main"
checkPackageAndInstall "https-dns-proxy" "0"
@@ -681,6 +441,10 @@ then
then
wget -O "$DIR/$file" "$URL/config_files/$file"
fi
if [ "$file" == "youtubeUnblock" ]
then
wget -O "$DIR/$file" "$URL/config_files/youtubeUnblockCalls"
fi
done
fi
@@ -691,43 +455,35 @@ uci set dhcp.cfg01411c.filter_aaaa='1'
uci commit dhcp
cat <<EOF > /etc/sing-box/config.json
{
"log": {
"disabled": true,
"level": "error"
},
"inbounds": [
{
"type": "tproxy",
"listen": "::",
"listen_port": 1100,
"sniff": false
}
],
"outbounds": [
{
"type": "http",
"server": "127.0.0.1",
"server_port": 18080
}
],
"route": {
"auto_detect_interface": true
}
{
"log": {
"disabled": true,
"level": "error"
},
"inbounds": [
{
"type": "tproxy",
"listen": "::",
"listen_port": 1100,
"sniff": false
}
],
"outbounds": [
{
"type": "http",
"server": "127.0.0.1",
"server_port": 18080
}
],
"route": {
"auto_detect_interface": true
}
}
EOF
echo "Setting sing-box..."
uci set sing-box.main.enabled='1'
uci set sing-box.main.user='root'
uci add_list sing-box.main.ifaces='wan'
uci add_list sing-box.main.ifaces='wan2'
uci add_list sing-box.main.ifaces='wan6'
uci add_list sing-box.main.ifaces='wwan'
uci add_list sing-box.main.ifaces='wwan0'
uci add_list sing-box.main.ifaces='modem'
uci add_list sing-box.main.ifaces='l2tp'
uci add_list sing-box.main.ifaces='pptp'
uci commit sing-box
nameRule="option name 'Block_UDP_443'"
@@ -753,59 +509,10 @@ then
uci commit firewall
fi
printf "\033[32;1mCheck work youtubeUnblock..\033[0m\n"
#install_youtubeunblock_packages
opkg upgrade youtubeUnblock
opkg upgrade luci-app-youtubeUnblock
manage_package "youtubeUnblock" "enable" "start"
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecond"
manage_package "podkop" "enable" "stop"
service youtubeUnblock restart
isWorkYoutubeUnBlock=0
curl -f -o /dev/null -k --connect-to ::google.com -L -H "Host: mirror.gcr.io" --max-time 360 https://test.googlevideo.com/v2/cimg/android/blobs/sha256:6fd8bdac3da660bde7bd0b6f2b6a46e1b686afb74b9a4614def32532b73f5eaa
# Проверяем код выхода
if [ $? -eq 0 ]; then
printf "\033[32;1myoutubeUnblock well work...\033[0m\n"
cronTask="0 4 * * * service youtubeUnblock restart"
str=$(grep -i "0 4 \* \* \* service youtubeUnblock restart" /etc/crontabs/root)
if [ -z "$str" ]
then
echo "Add cron task auto reboot service youtubeUnblock..."
echo "$cronTask" >> /etc/crontabs/root
fi
isWorkYoutubeUnBlock=1
else
manage_package "youtubeUnblock" "disable" "stop"
printf "\033[32;1myoutubeUnblock not work...\033[0m\n"
isWorkYoutubeUnBlock=0
str=$(grep -i "0 4 \* \* \* service youtubeUnblock restart" /etc/crontabs/root)
if [ ! -z "$str" ]
then
grep -v "0 4 \* \* \* service youtubeUnblock restart" /etc/crontabs/root > /etc/crontabs/temp
cp -f "/etc/crontabs/temp" "/etc/crontabs/root"
rm -f "/etc/crontabs/temp"
fi
fi
isWorkOperaProxy=0
printf "\033[32;1mCheck opera proxy...\033[0m\n"
service sing-box restart
curl --proxy http://127.0.0.1:18080 ipinfo.io/ip
if [ $? -eq 0 ]; then
printf "\033[32;1mOpera proxy well work...\033[0m\n"
isWorkOperaProxy=1
else
printf "\033[32;1mOpera proxy not work...\033[0m\n"
isWorkOperaProxy=0
fi
#printf "\033[32;1mAutomatic generate config AmneziaWG WARP (n) or manual input parameters for AmneziaWG (y)...\033[0m\n"
printf "\033[32;1mAutomatic generate config AmneziaWG WARP (n) or manual input parameters for AmneziaWG (y)...\033[0m\n"
countRepeatAWGGen=2
#echo "Input manual parameters AmneziaWG? (y/n): "
#read is_manual_input_parameters
echo "Input manual parameters AmneziaWG? (y/n): "
read is_manual_input_parameters
currIter=0
isExit=0
while [ $currIter -lt $countRepeatAWGGen ] && [ "$isExit" = "0" ]
@@ -864,55 +571,7 @@ do
warpGen=$(check_request "$result" 4)
if [ "$warpGen" = "Error" ]
then
printf "\033[32;1mRequest WARP config... Attempt #5\033[0m\n"
result=$(requestConfWARP5)
warpGen=$(check_request "$result" 5)
if [ "$warpGen" = "Error" ]
then
printf "\033[32;1mRequest WARP config... Attempt #6\033[0m\n"
result=$(requestConfWARP6)
warpGen=$(check_request "$result" 6)
if [ "$warpGen" = "Error" ]
then
printf "\033[32;1mRequest WARP config... Attempt #7\033[0m\n"
result=$(requestConfWARP7)
warpGen=$(check_request "$result" 7)
if [ "$warpGen" = "Error" ]
then
printf "\033[32;1mRequest WARP config... Attempt #8\033[0m\n"
result=$(requestConfWARP8)
warpGen=$(check_request "$result" 8)
if [ "$warpGen" = "Error" ]
then
printf "\033[32;1mRequest WARP config... Attempt #9\033[0m\n"
result=$(requestConfWARP9)
warpGen=$(check_request "$result" 9)
if [ "$warpGen" = "Error" ]
then
printf "\033[32;1mRequest WARP config... Attempt #10\033[0m\n"
result=$(requestConfWARP10)
warpGen=$(check_request "$result" 10)
if [ "$warpGen" = "Error" ]
then
warp_config="Error"
else
warp_config=$warpGen
fi
else
warp_config=$warpGen
fi
else
warp_config=$warpGen
fi
else
warp_config=$warpGen
fi
else
warp_config=$warpGen
fi
else
warp_config=$warpGen
fi
warp_config="Error"
else
warp_config=$warpGen
fi
@@ -1043,98 +702,52 @@ do
#service firewall restart
#service network restart
if [ "$is_manual_input_parameters" = "n" ]; then
I=0
WARP_ENDPOINT_HOSTS="engage.cloudflareclient.com 162.159.192.1 162.159.192.2 162.159.192.4 162.159.195.1 162.159.195.4 188.114.96.1 188.114.96.23 188.114.96.50 188.114.96.81"
WARP_ENDPOINT_PORTS="500 1701 2408 3138 4500"
for element in $WARP_ENDPOINT_HOSTS; do
EndpointIP="$element"
for element2 in $WARP_ENDPOINT_PORTS; do
I=$(( $I + 1 ))
EndpointPort="$element2"
uci set network.@${CONFIG_NAME}[-1].endpoint_host=$EndpointIP
uci set network.@${CONFIG_NAME}[-1].endpoint_port=$EndpointPort
uci commit network
# Отключаем интерфейс
ifdown $INTERFACE_NAME
# Включаем интерфейс
ifup $INTERFACE_NAME
printf "\033[33;1mIter #$I: Check Endpoint WARP $element:$element2. Wait up AWG WARP 10 second...\033[0m\n"
sleep 10
pingAddress="8.8.8.8"
if ping -c 1 -I $INTERFACE_NAME $pingAddress >/dev/null 2>&1
then
printf "\033[32;1m Endpoint WARP $element:$element2 work...\033[0m\n"
isExit=1
break
else
printf "\033[31;1m Endpoint WARP $element:$element2 not work...\033[0m\n"
isExit=0
fi
done
if [ "$isExit" = "1" ]
then
break
fi
done
# Отключаем интерфейс
ifdown $INTERFACE_NAME
# Включаем интерфейс
ifup $INTERFACE_NAME
printf "\033[32;1mWait up AWG WARP 10 second...\033[0m\n"
sleep 10
pingAddress="8.8.8.8"
if ping -c 1 -I $INTERFACE_NAME $pingAddress >/dev/null 2>&1
then
isExit=1
else
# Отключаем интерфейс
ifdown $INTERFACE_NAME
# Включаем интерфейс
ifup $INTERFACE_NAME
printf "\033[32;1mWait up AWG WARP 10 second...\033[0m\n"
sleep 10
pingAddress="8.8.8.8"
if ping -c 1 -I $INTERFACE_NAME $pingAddress >/dev/null 2>&1
then
isExit=1
else
isExit=0
fi
isExit=0
fi
fi
done
varByPass=0
isWorkWARP=0
if [ "$isExit" = "1" ]
then
printf "\033[32;1mAWG WARP well work...\033[0m\n"
isWorkWARP=1
else
printf "\033[32;1mAWG WARP not work.....Try opera proxy...\033[0m\n"
isWorkWARP=0
fi
echo "isWorkYoutubeUnBlock = $isWorkYoutubeUnBlock, isWorkOperaProxy = $isWorkOperaProxy, isWorkWARP = $isWorkWARP"
if [ "$isWorkYoutubeUnBlock" = "1" ] && [ "$isWorkOperaProxy" = "1" ] && [ "$isWorkWARP" = "1" ]
then
varByPass=1
elif [ "$isWorkYoutubeUnBlock" = "0" ] && [ "$isWorkOperaProxy" = "1" ] && [ "$isWorkWARP" = "1" ]
then
varByPass=2
elif [ "$isWorkYoutubeUnBlock" = "1" ] && [ "$isWorkOperaProxy" = "1" ] && [ "$isWorkWARP" = "0" ]
then
varByPass=3
elif [ "$isWorkYoutubeUnBlock" = "0" ] && [ "$isWorkOperaProxy" = "1" ] && [ "$isWorkWARP" = "0" ]
then
varByPass=4
elif [ "$isWorkYoutubeUnBlock" = "1" ] && [ "$isWorkOperaProxy" = "0" ] && [ "$isWorkWARP" = "0" ]
then
varByPass=5
elif [ "$isWorkYoutubeUnBlock" = "0" ] && [ "$isWorkOperaProxy" = "0" ] && [ "$isWorkWARP" = "1" ]
then
varByPass=6
elif [ "$isWorkYoutubeUnBlock" = "1" ] && [ "$isWorkOperaProxy" = "0" ] && [ "$isWorkWARP" = "1" ]
then
varByPass=7
elif [ "$isWorkYoutubeUnBlock" = "0" ] && [ "$isWorkOperaProxy" = "0" ] && [ "$isWorkWARP" = "0" ]
then
varByPass=8
else
printf "\033[32;1mAWG WARP not work...Try work youtubeunblock...Please wait...\033[0m\n"
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecond"
service youtubeUnblock restart
curl -f -o /dev/null -k --connect-to ::google.com -L -H "Host: mirror.gcr.io" --max-time 360 https://test.googlevideo.com/v2/cimg/android/blobs/sha256:6fd8bdac3da660bde7bd0b6f2b6a46e1b686afb74b9a4614def32532b73f5eaa
# Проверяем код выхода
if [ $? -eq 0 ]; then
printf "\033[32;1myoutubeUnblock well work...\033[0m\n"
varByPass=2
else
manage_package "youtubeUnblock" "disable" "stop"
printf "\033[32;1myoutubeUnblock not work...Try opera proxy...\033[0m\n"
service sing-box restart
sing-box tools fetch ifconfig.co -D /etc/sing-box/
if [ $? -eq 0 ]; then
printf "\033[32;1mOpera proxy well work...\033[0m\n"
varByPass=3
else
printf "\033[32;1mOpera proxy not work...Try custom settings router to bypass the locks... Recomendation buy 'VPS' and up 'vless'\033[0m\n"
exit 1
fi
fi
fi
printf "\033[32;1mRestart service dnsmasq, odhcpd...\033[0m\n"
@@ -1143,80 +756,28 @@ service odhcpd restart
path_podkop_config="/etc/config/podkop"
path_podkop_config_backup="/root/podkop"
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/new_awg_podkop"
messageComplete=""
URL="https://raw.githubusercontent.com/routerich/RouterichAX3000_configs/refs/heads/test_main"
case $varByPass in
1)
nameFileReplacePodkop="podkopNoYoutube"
printf "\033[32;1mStop and disabled service 'ruantiblock'...\033[0m\n"
manage_package "ruantiblock" "disable" "stop"
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecond"
service youtubeUnblock restart
deleteByPassGeoBlockComssDNS
messageComplete="ByPass block for Method 1: AWG WARP + youtubeunblock + Opera Proxy...Configured completed..."
;;
2)
nameFileReplacePodkop="podkop"
printf "\033[32;1mStop and disabled service 'youtubeUnblock' and 'ruantiblock'...\033[0m\n"
manage_package "youtubeUnblock" "disable" "stop"
#manage_package "youtubeUnblock" "disable" "stop"
manage_package "ruantiblock" "disable" "stop"
deleteByPassGeoBlockComssDNS
messageComplete="ByPass block for Method 2: AWG WARP + Opera Proxy...Configured completed..."
;;
3)
2)
nameFileReplacePodkop="podkopSecond"
printf "\033[32;1mStop and disabled service 'ruantiblock'...\033[0m\n"
manage_package "ruantiblock" "disable" "stop"
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecondDiscord"
service youtubeUnblock restart
deleteByPassGeoBlockComssDNS
messageComplete="ByPass block for Method 3: youtubeUnblock + Opera Proxy...Configured completed..."
;;
4)
3)
nameFileReplacePodkop="podkopSecondYoutube"
printf "\033[32;1mStop and disabled service 'youtubeUnblock' and 'ruantiblock'...\033[0m\n"
manage_package "youtubeUnblock" "disable" "stop"
manage_package "ruantiblock" "disable" "stop"
deleteByPassGeoBlockComssDNS
messageComplete="ByPass block for Method 4: Only Opera Proxy...Configured completed..."
;;
5)
nameFileReplacePodkop="podkopSecondYoutube"
printf "\033[32;1mStop and disabled service 'ruantiblock' and 'podkop'...\033[0m\n"
manage_package "ruantiblock" "disable" "stop"
manage_package "podkop" "disable" "stop"
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblock"
service youtubeUnblock restart
byPassGeoBlockComssDNS
printf "\033[32;1mByPass block for Method 5: youtubeUnblock + ComssDNS for GeoBlock...Configured completed...\033[0m\n"
exit 1
;;
6)
nameFileReplacePodkop="podkopWARP"
printf "\033[32;1mStop and disabled service 'youtubeUnblock' and 'ruantiblock'...\033[0m\n"
manage_package "youtubeUnblock" "disable" "stop"
manage_package "ruantiblock" "disable" "stop"
byPassGeoBlockComssDNS
messageComplete="ByPass block for Method 6: AWG WARP + ComssDNS for GeoBlock...Configured completed..."
;;
7)
nameFileReplacePodkop="podkopWARPNoYoutube"
printf "\033[32;1mStop and disabled service 'ruantiblock'...\033[0m\n"
manage_package "ruantiblock" "disable" "stop"
wget -O "/etc/config/youtubeUnblock" "$URL/config_files/youtubeUnblockSecond"
service youtubeUnblock restart
byPassGeoBlockComssDNS
messageComplete="ByPass block for Method 7: AWG WARP + youtubeUnblock + ComssDNS for GeoBlock...Configured completed..."
;;
8)
printf "\033[32;1mTry custom settings router to bypass the locks... Recomendation buy 'VPS' and up 'vless'\033[0m\n"
exit 1
;;
*)
echo "Unknown error. Please send message in group Telegram t.me/routerich"
exit 1
nameFileReplacePodkop="podkop"
esac
PACKAGE="podkop"
@@ -1229,9 +790,9 @@ if [ -n "$INSTALLED_VERSION" ] && [ "$INSTALLED_VERSION" != "$REQUIRED_VERSION"
fi
if [ -f "/etc/init.d/podkop" ]; then
#printf "Podkop installed. Reconfigured on AWG WARP and Opera Proxy? (y/n): \n"
#is_reconfig_podkop="y"
#read is_reconfig_podkop
printf "Podkop installed. Reconfigured on AWG WARP and Opera Proxy? (y/n): \n"
is_reconfig_podkop="y"
read is_reconfig_podkop
if [ "$is_reconfig_podkop" = "y" ] || [ "$is_reconfig_podkop" = "Y" ]; then
cp -f "$path_podkop_config" "$path_podkop_config_backup"
wget -O "$path_podkop_config" "$URL/config_files/$nameFileReplacePodkop"
@@ -1239,9 +800,9 @@ if [ -f "/etc/init.d/podkop" ]; then
echo "Podkop reconfigured..."
fi
else
#printf "\033[32;1mInstall and configure PODKOP (a tool for point routing of traffic)?? (y/n): \033[0m\n"
printf "\033[32;1mInstall and configure PODKOP (a tool for point routing of traffic)?? (y/n): \033[0m\n"
is_install_podkop="y"
#read is_install_podkop
read is_install_podkop
if [ "$is_install_podkop" = "y" ] || [ "$is_install_podkop" = "Y" ]; then
DOWNLOAD_DIR="/tmp/podkop"
@@ -1291,4 +852,4 @@ service sing-box restart
service podkop enable
service podkop restart
printf "\033[32;1m$messageComplete\033[0m\n"
printf "\033[32;1mConfigured completed...\033[0m\n"

File diff suppressed because it is too large Load Diff