|
7 | 7 | "os/exec" |
8 | 8 | "strings" |
9 | 9 |
|
| 10 | + "github.com/sagernet/sing/common" |
10 | 11 | E "github.com/sagernet/sing/common/exceptions" |
11 | 12 | F "github.com/sagernet/sing/common/format" |
12 | 13 |
|
@@ -109,42 +110,48 @@ func (r *autoRedirect) setupIPTables(family int) error { |
109 | 110 | return err |
110 | 111 | } |
111 | 112 | } |
112 | | - var dnsServerAddress netip.Addr |
113 | | - if family == unix.AF_INET { |
114 | | - dnsServerAddress = r.tunOptions.Inet4Address[0].Addr().Next() |
115 | | - } else { |
116 | | - dnsServerAddress = r.tunOptions.Inet6Address[0].Addr().Next() |
117 | | - } |
118 | | - if len(routeAddress) > 0 { |
119 | | - for _, address := range routeAddress { |
120 | | - err = r.runShell(iptablesPath, "-t nat -A", tableNamePreRouteing, |
121 | | - "-d", address.String(), "-p udp --dport 53 -j DNAT --to", dnsServerAddress) |
122 | | - if err != nil { |
123 | | - return err |
| 113 | + if !r.tunOptions.EXP_DisableDNSHijack { |
| 114 | + dnsServer := common.Find(r.tunOptions.DNSServers, func(it netip.Addr) bool { |
| 115 | + return it.Is4() == (family == unix.AF_INET) |
| 116 | + }) |
| 117 | + if !dnsServer.IsValid() { |
| 118 | + if family == unix.AF_INET { |
| 119 | + dnsServer = r.tunOptions.Inet4Address[0].Addr().Next() |
| 120 | + } else { |
| 121 | + dnsServer = r.tunOptions.Inet6Address[0].Addr().Next() |
124 | 122 | } |
125 | 123 | } |
126 | | - } else if len(r.tunOptions.IncludeInterface) > 0 || len(r.tunOptions.IncludeUID) > 0 { |
127 | | - for _, name := range r.tunOptions.IncludeInterface { |
128 | | - err = r.runShell(iptablesPath, "-t nat -A", tableNamePreRouteing, |
129 | | - "-i", name, "-p udp --dport 53 -j DNAT --to", dnsServerAddress) |
130 | | - if err != nil { |
131 | | - return err |
| 124 | + if len(routeAddress) > 0 { |
| 125 | + for _, address := range routeAddress { |
| 126 | + err = r.runShell(iptablesPath, "-t nat -A", tableNamePreRouteing, |
| 127 | + "-d", address.String(), "-p udp --dport 53 -j DNAT --to", dnsServer) |
| 128 | + if err != nil { |
| 129 | + return err |
| 130 | + } |
132 | 131 | } |
133 | | - } |
134 | | - for _, uidRange := range r.tunOptions.IncludeUID { |
135 | | - for uid := uidRange.Start; uid <= uidRange.End; uid++ { |
| 132 | + } else if len(r.tunOptions.IncludeInterface) > 0 || len(r.tunOptions.IncludeUID) > 0 { |
| 133 | + for _, name := range r.tunOptions.IncludeInterface { |
136 | 134 | err = r.runShell(iptablesPath, "-t nat -A", tableNamePreRouteing, |
137 | | - "-m owner --uid-owner", uid, "-p udp --dport 53 -j DNAT --to", dnsServerAddress) |
| 135 | + "-i", name, "-p udp --dport 53 -j DNAT --to", dnsServer) |
138 | 136 | if err != nil { |
139 | 137 | return err |
140 | 138 | } |
141 | 139 | } |
142 | | - } |
143 | | - } else { |
144 | | - err = r.runShell(iptablesPath, "-t nat -A", tableNamePreRouteing, |
145 | | - "-p udp --dport 53 -j DNAT --to", dnsServerAddress) |
146 | | - if err != nil { |
147 | | - return err |
| 140 | + for _, uidRange := range r.tunOptions.IncludeUID { |
| 141 | + for uid := uidRange.Start; uid <= uidRange.End; uid++ { |
| 142 | + err = r.runShell(iptablesPath, "-t nat -A", tableNamePreRouteing, |
| 143 | + "-m owner --uid-owner", uid, "-p udp --dport 53 -j DNAT --to", dnsServer) |
| 144 | + if err != nil { |
| 145 | + return err |
| 146 | + } |
| 147 | + } |
| 148 | + } |
| 149 | + } else { |
| 150 | + err = r.runShell(iptablesPath, "-t nat -A", tableNamePreRouteing, |
| 151 | + "-p udp --dport 53 -j DNAT --to", dnsServer) |
| 152 | + if err != nil { |
| 153 | + return err |
| 154 | + } |
148 | 155 | } |
149 | 156 | } |
150 | 157 |
|
|
0 commit comments