iptables: Wait for xtables lock
This commit is contained in:
24
create_ap
24
create_ap
@ -697,9 +697,9 @@ _cleanup() {
|
|||||||
|
|
||||||
if [[ "$SHARE_METHOD" != "none" ]]; then
|
if [[ "$SHARE_METHOD" != "none" ]]; then
|
||||||
if [[ "$SHARE_METHOD" == "nat" ]]; then
|
if [[ "$SHARE_METHOD" == "nat" ]]; then
|
||||||
iptables -t nat -D POSTROUTING -o ${INTERNET_IFACE} -s ${GATEWAY%.*}.0/24 -j MASQUERADE
|
iptables -w -t nat -D POSTROUTING -o ${INTERNET_IFACE} -s ${GATEWAY%.*}.0/24 -j MASQUERADE
|
||||||
iptables -D FORWARD -i ${WIFI_IFACE} -s ${GATEWAY%.*}.0/24 -j ACCEPT
|
iptables -w -D FORWARD -i ${WIFI_IFACE} -s ${GATEWAY%.*}.0/24 -j ACCEPT
|
||||||
iptables -D FORWARD -i ${INTERNET_IFACE} -d ${GATEWAY%.*}.0/24 -j ACCEPT
|
iptables -w -D FORWARD -i ${INTERNET_IFACE} -d ${GATEWAY%.*}.0/24 -j ACCEPT
|
||||||
elif [[ "$SHARE_METHOD" == "bridge" ]]; then
|
elif [[ "$SHARE_METHOD" == "bridge" ]]; then
|
||||||
if ! is_bridge_interface $INTERNET_IFACE; then
|
if ! is_bridge_interface $INTERNET_IFACE; then
|
||||||
ip link set dev $BRIDGE_IFACE down
|
ip link set dev $BRIDGE_IFACE down
|
||||||
@ -740,9 +740,9 @@ _cleanup() {
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
if [[ "$SHARE_METHOD" != "bridge" ]]; then
|
if [[ "$SHARE_METHOD" != "bridge" ]]; then
|
||||||
iptables -D INPUT -p tcp -m tcp --dport 53 -j ACCEPT
|
iptables -w -D INPUT -p tcp -m tcp --dport 53 -j ACCEPT
|
||||||
iptables -D INPUT -p udp -m udp --dport 53 -j ACCEPT
|
iptables -w -D INPUT -p udp -m udp --dport 53 -j ACCEPT
|
||||||
iptables -D INPUT -p udp -m udp --dport 67 -j ACCEPT
|
iptables -w -D INPUT -p udp -m udp --dport 67 -j ACCEPT
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [[ $NO_VIRT -eq 0 ]]; then
|
if [[ $NO_VIRT -eq 0 ]]; then
|
||||||
@ -1623,9 +1623,9 @@ fi
|
|||||||
if [[ "$SHARE_METHOD" != "none" ]]; then
|
if [[ "$SHARE_METHOD" != "none" ]]; then
|
||||||
echo "Sharing Internet using method: $SHARE_METHOD"
|
echo "Sharing Internet using method: $SHARE_METHOD"
|
||||||
if [[ "$SHARE_METHOD" == "nat" ]]; then
|
if [[ "$SHARE_METHOD" == "nat" ]]; then
|
||||||
iptables -t nat -I POSTROUTING -o ${INTERNET_IFACE} -s ${GATEWAY%.*}.0/24 -j MASQUERADE || die
|
iptables -w -t nat -I POSTROUTING -o ${INTERNET_IFACE} -s ${GATEWAY%.*}.0/24 -j MASQUERADE || die
|
||||||
iptables -I FORWARD -i ${WIFI_IFACE} -s ${GATEWAY%.*}.0/24 -j ACCEPT || die
|
iptables -w -I FORWARD -i ${WIFI_IFACE} -s ${GATEWAY%.*}.0/24 -j ACCEPT || die
|
||||||
iptables -I FORWARD -i ${INTERNET_IFACE} -d ${GATEWAY%.*}.0/24 -j ACCEPT || die
|
iptables -w -I FORWARD -i ${INTERNET_IFACE} -d ${GATEWAY%.*}.0/24 -j ACCEPT || die
|
||||||
echo 1 > /proc/sys/net/ipv4/conf/$INTERNET_IFACE/forwarding || die
|
echo 1 > /proc/sys/net/ipv4/conf/$INTERNET_IFACE/forwarding || die
|
||||||
echo 1 > /proc/sys/net/ipv4/ip_forward || die
|
echo 1 > /proc/sys/net/ipv4/ip_forward || die
|
||||||
# to enable clients to establish PPTP connections we must
|
# to enable clients to establish PPTP connections we must
|
||||||
@ -1709,12 +1709,12 @@ fi
|
|||||||
if [[ "$SHARE_METHOD" != "bridge" ]]; then
|
if [[ "$SHARE_METHOD" != "bridge" ]]; then
|
||||||
if [[ $NO_DNS -eq 0 ]]; then
|
if [[ $NO_DNS -eq 0 ]]; then
|
||||||
DNS_PORT=53
|
DNS_PORT=53
|
||||||
iptables -I INPUT -p tcp -m tcp --dport $DNS_PORT -j ACCEPT || die
|
iptables -w -I INPUT -p tcp -m tcp --dport $DNS_PORT -j ACCEPT || die
|
||||||
iptables -I INPUT -p udp -m udp --dport $DNS_PORT -j ACCEPT || die
|
iptables -w -I INPUT -p udp -m udp --dport $DNS_PORT -j ACCEPT || die
|
||||||
else
|
else
|
||||||
DNS_PORT=0
|
DNS_PORT=0
|
||||||
fi
|
fi
|
||||||
iptables -I INPUT -p udp -m udp --dport 67 -j ACCEPT || die
|
iptables -w -I INPUT -p udp -m udp --dport 67 -j ACCEPT || die
|
||||||
|
|
||||||
if which complain > /dev/null 2>&1; then
|
if which complain > /dev/null 2>&1; then
|
||||||
# openSUSE's apparmor does not allow dnsmasq to read files.
|
# openSUSE's apparmor does not allow dnsmasq to read files.
|
||||||
|
Reference in New Issue
Block a user