vim /etc/nftables.d/ttl64.nft
chain mangle_prerouting_ttl64 {
type filter hook prerouting priority 300; policy accept;
counter ip ttl set 64
counter ip6 hoplimit set 64
}
vim /etc/nftables.d/ttl64.nft
chain mangle_prerouting_ttl64 {
type filter hook prerouting priority 300; policy accept;
counter ip ttl set 64
counter ip6 hoplimit set 64
}
Just FYI:
Kinda converted particular ruleset yesterday.
Interestingly which provider started to battle tethering to rise interest in this....
this is only applicable on wireless hotspot with anti tethering enabled. It's like receiving 1 ttl and broadcast it into 64 ttl
AP ttl=1 radio0 -> Openwrt router radio1 ttl=64
There is other check for ttl=64 in upload direction sometimes.
something like ping -t 62 8.8.8.8 should be dropped then from the phone or lan.
Im connected to the AP with ttl=1 from a gateway 10.0.0.1 (Anti Tethering Enable) using this Keenetic router on WISP mode it will set ttl Outbound into 64 instead of 0
those iptables rules are for wireless isp mode only that will accept ttl=1 and broadcast ttl=64 for wireless clients
Test outside site not gw...