Skip to content

Commit a058460

Browse files
committed
Add range of IP addresses for socks relays (exit nodes)
Use 10.124.0.0/20 as documented in the code
1 parent 2e1589e commit a058460

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

linux/netfilter/netfilter.go

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,10 @@ func (ctx *nftCtx) nftRestrictTraffic(ifname string) {
403403
})
404404

405405
element := []nftables.SetElement{
406+
{ Key: net.ParseIP("10.124.0.0").To4() },
407+
{ Key: net.ParseIP("10.124.240.0").To4(), IntervalEnd: true },
406408
{ Key: net.ParseIP("10.64.0.1").To4() },
409+
{ Key: net.ParseIP("10.64.0.2").To4(), IntervalEnd: true },
407410
}
408411
mozvpn_ctx.conn.SetAddElements(mozvpn_ctx.relayset, element)
409412
}
@@ -700,6 +703,7 @@ func NetfilterCreateTables() int32 {
700703
Table: mozvpn_ctx.table_inet,
701704
Name: "mozvpn-socks5-relays",
702705
KeyType: nftables.TypeIPAddr,
706+
Interval: true,
703707
}
704708
mozvpn_ctx.conn.AddSet(mozvpn_ctx.relayset, nil)
705709

0 commit comments

Comments
 (0)