Version: Latest trunk version of openwrt. Linux OpenWrt 3.14.26 Platform: DLink DIR-505 Procedure: opkg update opkg install iptables-mod-filter reboot . iptables -I INPUT -m string --algo bm --string "test" -j DROP Effect: UDP packets with "test" within is dropped (correctly) while it doesn't seem to be the case for tcp. With a server
Here's the commands I ended up using, as I'm a rather simple user. #from a fresh install/reset to defaults opkg update && opkg install iptables-mod-ipopt kmod-ipt-ipopt # flush tables iptables -F iptables -t nat -F -t mangle # apply routing iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE iptables -t mangle -A PREROUTING -j TTL --ttl-set 65 iptables -A FORWARD -i eth1 -o br-lan -m state INSTALLATION Use of this package requires the iptables & gzip support, symlinks for iptables-save and iptables-restore, and relevant kernel support for any netfilter modules used in the rulesets. To use the wrt-iptables functionality, copy the files listed below to the following locations on your OpenWRT system. Correct me if I'm wrong, but I think OpenWRT is the original pi-hole. Just install "adblock" in OpenWRT. Also, RasPis are pretty reliable. You don't need a second one. As another comment mentioned, you should definitely change your DNS. I would recommend Cloudflare. However, Unbound is not supported in OpenWRT, but here is a thread on the topic. OpenWRT IPTables download rate limiting . By Gerco on Sunday 9 April 2017 05:09 Category: -, Views: 6.738 As a parent to an 11 year old girl with an iPhone (no mobile data contract), I have a problem. The problem is that, when given the chance, she will sit and watch Youtube all day - every day. There are a few ways to solve that problem: OpenWrt's implementation of UPnP isn't bad either since it has Secure Mode enabled by default. For port-forwarding testing, this seems to work for me. level 2. 1 point · 5 months ago "Secure mode" just makes it so the IP making the uPnP is the only one the rule can point to. It's in no way "secure" by any definition, as you could use any IP Setup iptables for RedSocks in OpenWRT. GitHub Gist: instantly share code, notes, and snippets. So iptables-save is the command with you can take iptables policy backup. Stop/disable iptables firewall For older Linux kernels you have an option of stopping service iptables with service iptables stop but if you are on the new kernel, you just need to wipe out all the policies and allow all traffic through the firewall.
Version: Latest trunk version of openwrt. Linux OpenWrt 3.14.26 Platform: DLink DIR-505 Procedure: opkg update opkg install iptables-mod-filter reboot . iptables -I INPUT -m string --algo bm --string "test" -j DROP Effect: UDP packets with "test" within is dropped (correctly) while it doesn't seem to be the case for tcp. With a server
iptables -t mangle -A PREROUTING -p tcp --dport 80 -s [IPADDRESS]-j ACCEPT Scripts above are used when the Proxy Server is on same network, who needs proxy transparent with dd-wrt Chillispot enabled in most case (mine too), the Proxy Server is on different Network. I have changed the script Option 1 above to this needs. root@OPENWRT:~# iptables-save # Generated by iptables-save v1.4.6 on Wed Nov 21 16:59:23 2012 *nat :PREROUTING ACCEPT [282:28098] :POSTROUTING ACCEPT [12:748] :OUTPUT ACCEPT [170:12487] :nat_reflection_in - [0:0] :nat_reflection_out - [0:0] :postrouting_rule - [0:0] :prerouting_lan - [0:0] :prerouting_rule - [0:0] :prerouting_wan - [0:0] :zone You can apply this patch to OpenWrt's Firewall3 (Recommended). Or manually add the following rules to /etc/firewall.user iptables -t nat -A zone_wan_prerouting -j FULLCONENAT iptables -t nat -A zone_wan_postrouting -j FULLCONENAT
OpenWrt's implementation of UPnP isn't bad either since it has Secure Mode enabled by default. For port-forwarding testing, this seems to work for me. level 2. 1 point · 5 months ago "Secure mode" just makes it so the IP making the uPnP is the only one the rule can point to. It's in no way "secure" by any definition, as you could use any IP
Version: Latest trunk version of openwrt. Linux OpenWrt 3.14.26 Platform: DLink DIR-505 Procedure: opkg update opkg install iptables-mod-filter reboot . iptables -I INPUT -m string --algo bm --string "test" -j DROP Effect: UDP packets with "test" within is dropped (correctly) while it doesn't seem to be the case for tcp. With a server