iptables -a forward -s 0/0 -p udp --dport 8000 -j drop iptables -a forward -s 0/0 -p udp --dport 4000 -j drop iptables -a forward -s 0/0 -d 66.161 .39.135 -J DROP iptables -a forward -s 0/0 -d 61.172.249.134 -j drop iptables -a forward -s 0/0 -d 202.104.193.12/255.255.255.0 -j drop iptables -a forward -s / 0 -d 218.18.95.100/255.255.255.0 -j drop iptables -a forward -s 0/0 -d 218.85.138.134/255.255.255.0 -j drop iptables -a forward -s 0/0 -d 218.17.209 / 255.255.255.0 -J Drop iptables -a forward -s 0/0 -d 218.17.09 / 255.255.255.09 / 255.255.255.95 / 255.255.255.0 -j drop iptables - A Forward-S 0/0 -D 218.17.09 / 255.255.255.0 -j drop iptables -a forward -s 0/0 -d 202.96.170.164 -d iptables -a forward -s 0/0 -d 202.96.170.165 -J DrOP iptables -a forward -s 0/0 -d 202.96.170.175 -j drop iptables -a forward -s 0/0 -d 202.96.170.188 -j drop iptables -a forward -s 0/0 -d 61.135. 131.240 -J Drop iptables -a forward -s 0/0 -d 61.141.194.203 -j drop iptables -a fortw Ard -s 0/0 -d 61.141.194.231 -j drop iptables -a forward -s 0/0 -d 61.141.194.224 -j drop iptables -a forward -s 0/0 -d 218.18.95.165 -j drop iptables - A forward -s 0/0 -d 219.133.40.15 -j drop iptables -a forward -s 0/0 -d 61.144.238.137 -j drop iptables -a forward -s 0/0 -d 61.144.238.145 -j drop iptables -A forward -s 0/0 -d 61.144.238.146 -j drop iptables -a forward -s 0/0 -d 61.144.238.150 -j drop iptables -a forward -s 0/0 -d 61.144.238.151 -j drop iptables -a forward -s 0/0 -d 202.104.129.254 -j drop iptables -a forward -s 0/0 -d 202.104.129.252 -j drop iptables -a forward -s 0/0 -d 202.104.129.253 -j Drop iptables -a forward -s 0/0 -d 202.104.129.251 -j drop iptables -a forward -s 0/0 -d 202.104.129.242 -j drop iptables -a forward
S 0/0 -d 202.104.129.246 -j drop iptables -a forward -s 0/0 -d 202.103.190.61 -j drop iptables -a forward -s 0/0 -d 202.103.149.40 -j drop iptables -a forward -S 0/0 -d 218.18.95.165 -j Drop iptables -a forward -s 0/0 -d 218.18.95.140 -j drop iptables -a forward -s 0/0 -d 218.18.95.153 -j drop iptables -a Forward -S 0/0 -d 218.17.209.23 -j drop iptables -a forward -s 0/0 -d 218.17.217.103 -j drop iptables -a forward -s 0/0 -d 218.17.209.42 -j drop iptables - A forward -s 0/0 -d 66.161.39.135 -j drop iptables -a forward -s 0/0 -d 61.172.249.134 -j drop I test can be tested here can block off because of blocks iptables -a forward -ss 0 / 0 -D 218.17.09 / 255.255.255.0 -J Drop iptables -a forward -s 0/0 -d 218.18.95 / 255.255.255.0 -j DROP These two parsing servers So I feel that there is no way to use the agent Most of the code is from a essence :) Post I used to send it in Chinaunix no one cares.
In theory, it is very simple QQ, which will use UDP TCP to connect UDP. Then, 8000 CUT, the one-to-pass, the same, the 80-port and the web, the smallest technology should be the relatively high technology should be based on the request to send block, unfortunately IPTables. So deep research as long as this simple approach does not let QQ go to domain analysis. QQ relies on domain name parsing to get the address of the external 80 server, but this will become a dead hole. Of course, QQ may also have some fixed IP to do server address. It is also very simple. It is very simple. This script is still Tube 2004-12-8 8:38 Tencent will use other ways:) ..... According to my continued study, this method still has a vulnerability vulnerability lies in that users can resolve the address, so this method is still not final solution