redirect-ports.sh 1.2 KB

123456789101112131415161718192021222324
  1. #!/bin/bash
  2. # redirects ports below 1024 to a higher range using iptables, so they can be used without elevated rights
  3. # MySQL SIP (3306 and 5060) are left out because they are >= 1024 anyways
  4. # ECHO FTP HTTP HTTPS SMB (NETBIOS UDP & TCP) SSH TELNET
  5. protocol=( "tcp" "tcp" "tcp" "tcp" "udp" "udp" "tcp" "tcp" "tcp" "tcp" )
  6. origin=( 7 21 80 443 137 138 137 139 22 23 )
  7. destination=( 28144 28169 28217 28580 28274 28275 28274 28276 28159 28160 ) # simply offset by 1024 + 27113
  8. length=${#protocol[@]} # count protocol elements
  9. # for (( i=0; i<$length; i++ ))
  10. for i in `seq 0 9` # fix for android's annoyingly limited bash
  11. do
  12. # echo ${protocol[$i]} ${origin[$i]} ${destination[$i]} # debug
  13. # delete previous rules to avoid duplicates
  14. iptables -t nat -D PREROUTING -p ${protocol[$i]} --dport ${origin[$i]} -j REDIRECT --to-ports ${destination[$i]}
  15. iptables -t nat -D OUTPUT -p ${protocol[$i]} --dport ${destination[$i]} -j REDIRECT --to-ports ${origin[$i]}
  16. # add new rules
  17. iptables -t nat -A PREROUTING -p ${protocol[$i]} --dport ${origin[$i]} -j REDIRECT --to-ports ${destination[$i]}
  18. iptables -t nat -A OUTPUT -p ${protocol[$i]} --dport ${destination[$i]} -j REDIRECT --to-ports ${origin[$i]}
  19. done