You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To make it so it works when offline, I'd like to make it so that pre-authenticated users have special rules like:
iptables -A ndsRTR -p udp -m udp --dport 53 -j DNAT --to-destination 192.168.10.1:55555
iptables -A ndsRTR -p udp -m tcp --dport 53 -j DNAT --to-destination 192.168.10.1:55555
I thought I could use the redirect for port 80 as an example, but... that's not in the configuration file.
And, of course, once authenticated, their DNS is free to go about their business.
I have a python script (for now) hanging on TCP/UDP 55555 that returns 192.168.10.1 for all queries with a TTL of 5 seconds.
Would solve offline operation and iodining....
The text was updated successfully, but these errors were encountered:
To make it so it works when offline, I'd like to make it so that pre-authenticated users have special rules like:
iptables -A ndsRTR -p udp -m udp --dport 53 -j DNAT --to-destination 192.168.10.1:55555
iptables -A ndsRTR -p udp -m tcp --dport 53 -j DNAT --to-destination 192.168.10.1:55555
I thought I could use the redirect for port 80 as an example, but... that's not in the configuration file.
And, of course, once authenticated, their DNS is free to go about their business.
I have a python script (for now) hanging on TCP/UDP 55555 that returns 192.168.10.1 for all queries with a TTL of 5 seconds.
Would solve offline operation and iodining....
The text was updated successfully, but these errors were encountered: