You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
<
8000
a href="/signup?return_to=%2Fsorz%2Fmoproxy%2Fissues%2Fnew%2Fchoose" data-view-component="true" class="btn-primary btn mx-auto"> Sign up for GitHub
By clicking “Sign up for GitHub”, you agree to our terms of service and
privacy statement. We’ll occasionally send you account related emails.
I'm doing this on iptables/nftables level: let DNS resolver add IP addresses to ipset (or nft set), then match them on the firewall.
I was using dnsmasq (w/ ipset feature) + iptables, then switched to unbound + dnsnfset + nftables solution.
But this only works on transparent proxy mode, not the SOCKS5 frontend, and it's way too complicated. I agree that the black/whitelist is a nice-to-have feature.
i want all traffic pass through direct connection expect some domains (like Privoxy program)
Example:
The text was updated successfully, but these errors were encountered: