![shadowsocks gfwlist shadowsocks gfwlist](https://shadowsockshelp.github.io/Shadowsocks/img/Firefox4.png)
iptables -t nat -A intercept_gfwlist -p tcp -m set -match-set gfwlist dst -j REDIRECT -to-ports 1080.now we already redirect gfwlist related dns request to our proxy server, next tcp request will be easy.Ĭreate ssr script and start it /opt/etc/init.d/ssr start cat > /opt/etc /init.d/ssr on your laptop dig, should return result as dig.Test dns request=>iptable=>dnsmasq can success.iptables -t nat -A PREROUTING -p udp -j intercept_dns.iptables -t nat -A intercept_dns -p udp -dport 53 -j REDIRECT -to-ports 53.now ipset contain one google ip ipset list gfwlist.sh /jffs/config/ss.json /opt/etc /init.d/sst dnsmasq=>ipset can success You can add custom domain to custom_gfwlist.txt touch /jffs/config/custom_gfwlist. Now let’s config system to intercept tcp and dns request.
#SHADOWSOCKS GFWLIST INSTALL#
dependence of gfwlist2dnsmasq.sh opkg install coreutils-mktemp coreutils-base64.proxy dns request opkg install shadowsocks-libev-ss-tunnel.
![shadowsocks gfwlist shadowsocks gfwlist](https://mystery00.github.io/images/hexo/2017-01-1216-07-28.png)