If you are using an inbound firewall on [IP]:
iptables -A INPUT -p tcp -m state --state NEW -d [IP] --dport 27199 -j ACCEPT
iptables -A INPUT -p tcp -m state --state NEW -m multiport -d [IP] --dports 80,443 -j ACCEPT
File generated: haproxy.conf
***********************************************************************************************
Caution: It's possible to run a (recursive) DNS forwarder on your remote server [IP].
If you leave the DNS port wide open to everyone, your server will most likely get terminated sooner or later
because of abuse (DDoS amplification attacks).
***********************************************************************************************
File generated: dnsmasq-haproxy.conf
File generated: hosts-haproxy.txt
In /output/ the following files exist:
dnsmasq-haproxy.conf haproxy.conf hosts-haproxy.txt
Pulled this repo, python dnsproxy.py -m non-sni
Output:
In /output/ the following files exist: dnsmasq-haproxy.conf haproxy.conf hosts-haproxy.txt
The file iptables-haproxy.sh is missing.