mirror of
				https://github.com/Ysurac/openmptcprouter-feeds.git
				synced 2025-03-09 15:40:03 +00:00 
			
		
		
		
	Try to disable firewall changes made by dsvpn
This commit is contained in:
		
							parent
							
								
									e85b445dcc
								
							
						
					
					
						commit
						6c4c56a439
					
				
					 3 changed files with 60 additions and 2 deletions
				
			
		|  | @ -9,7 +9,7 @@ include $(TOPDIR)/rules.mk | |||
| 
 | ||||
| PKG_SOURCE_PROTO:=git | ||||
| PKG_SOURCE_URL:=https://github.com/jedisct1/dsvpn.git | ||||
| PKG_SOURCE_VERSION:=5372b454ae7925f11951b17cf42e52e270a75141 | ||||
| PKG_SOURCE_VERSION:=4a1417b4d9a7c55bac3ac289ea90e7f9d2038d0e | ||||
| PKG_NAME:=dsvpn | ||||
| PKG_VERSION:=0.1.3-$(PKG_SOURCE_VERSION) | ||||
| PKG_RELEASE:=1 | ||||
|  | @ -34,7 +34,7 @@ define Package/$(PKG_NAME)/install | |||
| 	$(INSTALL_DIR) $(1)/usr/sbin | ||||
| 	$(INSTALL_BIN) $(PKG_BUILD_DIR)/dsvpn $(1)/usr/sbin/$(PKG_NAME) | ||||
| 	$(INSTALL_DIR) $(1)/etc/init.d | ||||
| 	$(INSTALL_BIN) init $(1)/etc/init.d/$(PKG_NAME) | ||||
| 	$(INSTALL_BIN) files/init $(1)/etc/init.d/$(PKG_NAME) | ||||
| 	$(INSTALL_DIR) $(1)/etc/config | ||||
| 	touch $(1)/etc/config/dsvpn | ||||
| endef | ||||
|  |  | |||
							
								
								
									
										58
									
								
								dsvpn/patches/nofirewall.patch
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										58
									
								
								dsvpn/patches/nofirewall.patch
									
										
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,58 @@ | |||
| diff --git a/src/vpn.c b/src/vpn.c
 | ||||
| index 8064d62..0142f63 100644
 | ||||
| --- a/src/vpn.c
 | ||||
| +++ b/src/vpn.c
 | ||||
| @@ -297,6 +297,7 @@ static int client_connect(Context *context)
 | ||||
|   | ||||
|      context->client_buf.pos = 0; | ||||
|      memset(context->client_buf.data, 0, sizeof context->client_buf.data); | ||||
| +    /*
 | ||||
|      if (context->wanted_ext_gw_ip == NULL && (ext_gw_ip = get_default_gw_ip()) != NULL && | ||||
|          strcmp(ext_gw_ip, context->ext_gw_ip) != 0) { | ||||
|          printf("Gateway changed from [%s] to [%s]\n", context->ext_gw_ip, ext_gw_ip); | ||||
| @@ -304,6 +305,7 @@ static int client_connect(Context *context)
 | ||||
|          snprintf(context->ext_gw_ip, sizeof context->ext_gw_ip, "%s", ext_gw_ip); | ||||
|          firewall_rules(context, 1, 0); | ||||
|      } | ||||
| +    */
 | ||||
|      memset(context->uc_st, 0, sizeof context->uc_st); | ||||
|      context->uc_st[context->is_server][0] ^= 1; | ||||
|      context->client_fd = tcp_client(context->server_ip, context->server_port); | ||||
| @@ -319,7 +321,7 @@ static int client_connect(Context *context)
 | ||||
|          sleep(1); | ||||
|          return -1; | ||||
|      } | ||||
| -    firewall_rules(context, 1, 0);
 | ||||
| +    //firewall_rules(context, 1, 0);
 | ||||
|      context->fds[POLLFD_CLIENT] = | ||||
|          (struct pollfd){ .fd = context->client_fd, .events = POLLIN, .revents = 0 }; | ||||
|      puts("Connected"); | ||||
| @@ -597,22 +599,26 @@ int main(int argc, char *argv[])
 | ||||
|  #ifdef __OpenBSD__ | ||||
|      pledge("stdio proc exec dns inet", NULL); | ||||
|  #endif | ||||
| -    context.firewall_rules_set = -1;
 | ||||
| +    //context.firewall_rules_set = -1;
 | ||||
|      if (context.server_ip_or_name != NULL && | ||||
|          resolve_ip(context.server_ip, sizeof context.server_ip, context.server_ip_or_name) != 0) { | ||||
| -        firewall_rules(&context, 0, 1);
 | ||||
| +        //firewall_rules(&context, 0, 1);
 | ||||
|          return 1; | ||||
|      } | ||||
|      if (context.is_server) { | ||||
| +        /*
 | ||||
|          if (firewall_rules(&context, 1, 0) != 0) { | ||||
|              return -1; | ||||
|          } | ||||
| +        */
 | ||||
|  #ifdef __OpenBSD__ | ||||
|          printf("\nAdd the following rule to /etc/pf.conf:\npass out from %s nat-to egress\n\n", | ||||
|                 context.remote_tun_ip); | ||||
|  #endif | ||||
| +/*
 | ||||
|      } else { | ||||
|          firewall_rules(&context, 0, 1); | ||||
| +*/
 | ||||
|      } | ||||
|      signal(SIGINT, signal_handler); | ||||
|      signal(SIGTERM, signal_handler); | ||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue