How to use AFWall+ to connect to a socks5 server in local network and use it as a tunnel to bypass GFW?
I got the inspiration here: https://github.com/shadowsocks/shado....github/faq.md
It looks like AFWall+ is able to create a NAT forwarding policy to keep all traffic going through a socks5 proxy and fool Google apps into thinking they are not connected via a VPN (Google apps implement additional security measures when connecting via VPNService and if you are in China you will not pass the security check - the security check requests don't go through VPN, so they will EOF cuz GFW will kill these requests, read more here https://support.google.com/android/t...28979027?hl=en
So my question is, if let's say I have a socks5 server running at 192.168.1.1:1088 which tunnels all connections via vmess protocol (aka V2Ray) to remote servers in the US, how do I create my custom script? I have tried:
$ULIMIT -n 4096
$IP6TABLES -A INPUT -j DROP
$IP6TABLES -A OUTPUT -j DROP
$IPTABLES -t nat -F OUTPUT
$IPTABLES -t nat -A OUTPUT -o lo -j RETURN
$IPTABLES -t nat -A OUTPUT -d 127.0.0.1 -j RETURN
$IPTABLES -t nat -A OUTPUT -p tcp --dport 53 -j DNAT --to-destination $SERVER:$PORT
$IPTABLES -t nat -A OUTPUT -p udp --dport 53 -j DNAT --to-destination $SERVER:$PORT
$IPTABLES -t nat -A OUTPUT -p tcp -j DNAT --to-destination $SERVER:$PORT
$IPTABLES -t nat -A OUTPUT -p udp -j DNAT --to-destination $SERVER:$PORT
This does not work. So did I:
1. created a wrong script? - how do I create a script that does what I want to do?
2. r there other settings that I should enable first? I didn't tick any app so I assume that means all app go through custom script, right?