iface eth1 dmz unsafe safe untrusted vpn sgo colobdry default
iface eth2 dmz unsafe safe untrusted vpn sgo colobdry
iface eth3 untrusted vpn default
+ iface ppp0 default
iface t6-he default
iface vpn-precision colobdry vpn sgo
iface vpn-chiark sgo
run iptables -t nat -X
run iptables -t nat -N outbound
-run iptables -t nat -A outbound -j RETURN ! -o eth0
+run iptables -t nat -A outbound -j RETURN ! -o ppp0
run iptables -t nat -A outbound -j RETURN ! -s 172.29.198.0/23
run iptables -t nat -A outbound -j RETURN -d 62.49.204.144/28
run iptables -t nat -A outbound -j RETURN -d 172.29.198.0/23
run iptables -t nat -A outbound -j SNAT --to-source 62.49.204.158
run iptables -t nat -A POSTROUTING -j outbound
+## TCP MSS clamping to help given Demon's sluggish approach to fragmentation-
+## needed errors.
+run ip46tables -t mangle -A FORWARD -o ppp0 -p tcp --tcp-flags SYN,RST SYN \
+ -j TCPMSS --clamp-mss-to-pmtu
+
## Set up NAT protocol helpers. In particular, SIP needs some special
## twiddling.
run modprobe nf_conntrack_sip \