secubox-openwrt/package/secubox/secubox-app-tor/files/etc/config/tor-shield
CyberMind-FR 4a0ab9530f feat(mesh): Yggdrasil extended peer discovery + bugfixes
## New Features
- secubox-app-yggdrasil-discovery: Mesh peer discovery via gossip protocol
  - yggctl CLI: status, self, peers, announce, discover, bootstrap
  - Auto-peering with trust verification (master-link fingerprint)
  - Daemon for periodic announcements

## Bug Fixes
- tor-shield: Fix opkg downloads failing when Tor active
  - DNS over Tor disabled by default
  - Auto-exclude public DNS servers from iptables rules
  - Excluded domains bypass list (openwrt.org, pool.ntp.org, etc.)

- haproxy: Fix portal 503 "End of Internet" error
  - Corrected malformed vhost backend configuration
  - Regenerated HAProxy config from UCI

- luci-app-nextcloud: Fix users list showing empty
  - RPC expect clause was extracting array, render expected object

## Updated
- Bonus feed: All IPKs rebuilt
- Documentation: HISTORY.md, WIP.md, TODO.md updated

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-02-28 17:32:41 +01:00

85 lines
2.4 KiB
Plaintext

# SecuBox Tor Shield configuration
# /etc/config/tor-shield
config tor-shield 'main'
option enabled '0'
option mode 'transparent'
# DNS over Tor disabled by default - enables opkg/system DNS to work
# When disabled, public DNS servers are automatically excluded from kill switch
option dns_over_tor '0'
option kill_switch '1'
option auto_bridges '0'
config preset 'anonymous'
option name 'Full Anonymity'
option icon 'shield'
option mode 'transparent'
# DNS over Tor disabled for compatibility - traffic still routes through Tor
option dns_over_tor '0'
option kill_switch '1'
config preset 'selective'
option name 'Selective Apps'
option icon 'target'
option mode 'socks'
option dns_over_tor '0'
option kill_switch '0'
config preset 'censored'
option name 'Bypass Censorship'
option icon 'unlock'
option mode 'transparent'
option use_bridges '1'
option dns_over_tor '1'
config preset 'server'
option name 'Server Mode'
option icon 'server'
option mode 'transparent'
option dns_over_tor '1'
option kill_switch '1'
option lan_proxy '1'
option wan_input_allow '1'
config proxy 'socks'
option port '9050'
option address '127.0.0.1'
config transparent 'trans'
option port '9040'
option dns_port '9053'
option lan_proxy '0'
list excluded_ips '192.168.0.0/16'
list excluded_ips '10.0.0.0/8'
list excluded_ips '172.16.0.0/12'
list excluded_ips '127.0.0.0/8'
# Domains excluded from Tor routing (DNS bypasses Tor for these)
# OpenWrt package repositories
list excluded_domains 'downloads.openwrt.org'
list excluded_domains 'openwrt.org'
list excluded_domains 'mirror.leaseweb.com'
list excluded_domains 'mirror1.openwrt.org'
# NTP time servers
list excluded_domains 'pool.ntp.org'
list excluded_domains 'time.google.com'
list excluded_domains 'time.cloudflare.com'
# Security feeds (CVE, threat intel)
list excluded_domains 'services.nvd.nist.gov'
list excluded_domains 'cve.mitre.org'
# Let's Encrypt ACME (for SSL certificates)
list excluded_domains 'acme-v02.api.letsencrypt.org'
list excluded_domains 'letsencrypt.org'
# DNS verification (optional, for own domains)
list excluded_domains 'api.gandi.net'
list excluded_domains 'api.ovh.com'
list excluded_domains 'api.cloudflare.com'
config bridges 'bridges'
option enabled '0'
option type 'obfs4'
config security 'security'
option exit_nodes ''
option exclude_exit_nodes ''
option strict_nodes '0'