mirror of
https://github.com/SagerNet/sing-tun.git
synced 2025-04-04 20:37:43 +03:00
fix Windows firewall rules and allow to disable firewall manipulation
This commit is contained in:
parent
c8c2984261
commit
e94baeac0c
3 changed files with 34 additions and 18 deletions
|
@ -46,6 +46,7 @@ type System struct {
|
||||||
interfaceFinder control.InterfaceFinder
|
interfaceFinder control.InterfaceFinder
|
||||||
frontHeadroom int
|
frontHeadroom int
|
||||||
txChecksumOffload bool
|
txChecksumOffload bool
|
||||||
|
disableFirewallFix bool
|
||||||
}
|
}
|
||||||
|
|
||||||
type Session struct {
|
type Session struct {
|
||||||
|
@ -69,6 +70,7 @@ func NewSystem(options StackOptions) (Stack, error) {
|
||||||
broadcastAddr: BroadcastAddr(options.TunOptions.Inet4Address),
|
broadcastAddr: BroadcastAddr(options.TunOptions.Inet4Address),
|
||||||
bindInterface: options.ForwarderBindInterface,
|
bindInterface: options.ForwarderBindInterface,
|
||||||
interfaceFinder: options.InterfaceFinder,
|
interfaceFinder: options.InterfaceFinder,
|
||||||
|
disableFirewallFix: options.TunOptions.EXP_DisableFirewallFix,
|
||||||
}
|
}
|
||||||
if len(options.TunOptions.Inet4Address) > 0 {
|
if len(options.TunOptions.Inet4Address) > 0 {
|
||||||
if !HasNextAddress(options.TunOptions.Inet4Address[0], 1) {
|
if !HasNextAddress(options.TunOptions.Inet4Address[0], 1) {
|
||||||
|
@ -107,9 +109,12 @@ func (s *System) Start() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *System) start() error {
|
func (s *System) start() error {
|
||||||
err := fixWindowsFirewall()
|
var err error
|
||||||
|
if !s.disableFirewallFix {
|
||||||
|
err = fixWindowsFirewall()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return E.Cause(err, "fix windows firewall for system stack")
|
s.logger.Error(E.Cause(err, "fix windows firewall for system stack"))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
var listener net.ListenConfig
|
var listener net.ListenConfig
|
||||||
if s.bindInterface {
|
if s.bindInterface {
|
||||||
|
|
|
@ -15,15 +15,25 @@ func fixWindowsFirewall() error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
rule := winfw.FWRule{
|
_, err = winfw.FirewallRuleAddAdvanced(winfw.FWRule{
|
||||||
Name: "sing-tun (" + absPath + ")",
|
Name: "sing-tun (" + absPath + ")",
|
||||||
ApplicationName: absPath,
|
ApplicationName: absPath,
|
||||||
Enabled: true,
|
Enabled: true,
|
||||||
Protocol: winfw.NET_FW_IP_PROTOCOL_TCP,
|
Protocol: winfw.NET_FW_IP_PROTOCOL_TCP,
|
||||||
Direction: winfw.NET_FW_RULE_DIR_IN,
|
Direction: winfw.NET_FW_RULE_DIR_IN,
|
||||||
Action: winfw.NET_FW_ACTION_ALLOW,
|
Action: winfw.NET_FW_ACTION_ALLOW,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
}
|
}
|
||||||
_, err = winfw.FirewallRuleAddAdvanced(rule)
|
_, err = winfw.FirewallRuleAddAdvanced(winfw.FWRule{
|
||||||
|
Name: "sing-tun UDP (" + absPath + ")",
|
||||||
|
ApplicationName: absPath,
|
||||||
|
Enabled: true,
|
||||||
|
Protocol: winfw.NET_FW_IP_PROTOCOL_UDP,
|
||||||
|
Direction: winfw.NET_FW_RULE_DIR_IN,
|
||||||
|
Action: winfw.NET_FW_ACTION_ALLOW,
|
||||||
|
})
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
1
tun.go
1
tun.go
|
@ -88,6 +88,7 @@ type Options struct {
|
||||||
|
|
||||||
// For library usages.
|
// For library usages.
|
||||||
EXP_DisableDNSHijack bool
|
EXP_DisableDNSHijack bool
|
||||||
|
EXP_DisableFirewallFix bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func (o *Options) Inet4GatewayAddr() netip.Addr {
|
func (o *Options) Inet4GatewayAddr() netip.Addr {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue