2004-02-14 19:06:39 +01:00
<?xml version="1.0" encoding="UTF-8"?>
2008-07-07 22:42:54 +02:00
< !DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
2004-02-14 19:06:39 +01:00
<article >
<!-- $Id$ -->
<articleinfo >
2013-11-28 16:13:47 +01:00
<title > Extension Scripts (User Exits)</title>
2004-02-14 19:06:39 +01:00
<authorgroup >
<author >
<firstname > Tom</firstname>
<surname > Eastep</surname>
</author>
</authorgroup>
2006-07-07 03:04:16 +02:00
<pubdate > <?dbtimestamp format="Y/m/d"?> </pubdate>
2004-02-14 19:06:39 +01:00
<copyright >
2010-08-17 18:23:43 +02:00
<year > 2001-2010</year>
2004-02-14 19:06:39 +01:00
<holder > Thomas M. Eastep</holder>
</copyright>
<legalnotice >
<para > Permission is granted to copy, distribute and/or modify this
document under the terms of the GNU Free Documentation License, Version
1.2 or any later version published by the Free Software Foundation; with
2023-01-19 23:17:25 +01:00
no Invariant Sections, no Front-Cover Texts, and no Back-Cover
2004-02-14 19:06:39 +01:00
Texts. A copy of the license is included in the section entitled
2005-04-07 18:35:59 +02:00
<quote > <ulink url= "GnuCopyright.htm" > GNU Free Documentation
License</ulink> </quote> .</para>
2004-02-14 19:06:39 +01:00
</legalnotice>
</articleinfo>
2007-09-15 18:02:57 +02:00
<caution >
2009-02-28 04:45:43 +01:00
<para > <emphasis role= "bold" > This article applies to Shorewall 4.3 and
later. If you are running a version of Shorewall earlier than Shorewall
4.3.5 then please see the documentation for that
release.</emphasis> </para>
2007-09-15 18:02:57 +02:00
</caution>
2007-07-05 16:22:08 +02:00
<section id= "Scripts" >
<title > Extension Scripts</title>
2005-09-12 01:39:52 +02:00
2007-07-05 16:22:08 +02:00
<para > Extension scripts are user-provided scripts that are invoked at
2013-11-28 16:13:47 +01:00
various points during firewall start, restart, stop and clear. For each
script, the Shorewall compiler creates a Bourne Shell function with the
extension script as its body and calls the function at runtime.</para>
2004-02-14 19:06:39 +01:00
2007-07-05 16:22:08 +02:00
<caution >
<orderedlist >
<listitem >
<para > Be sure that you actually need to use an extension script to
do what you want. Shorewall has a wide range of features that cover
most requirements.</para>
</listitem>
<listitem >
<para > DO NOT SIMPLY COPY RULES THAT YOU FIND ON THE NET INTO AN
EXTENSION SCRIPT AND EXPECT THEM TO WORK AND TO NOT BREAK SHOREWALL.
TO USE SHOREWALL EXTENSION SCRIPTS YOU MUST KNOW WHAT YOU ARE DOING
WITH RESPECT TO iptables/Netfilter AND SHOREWALL.</para>
</listitem>
</orderedlist>
</caution>
<para > The following scripts can be supplied:</para>
<itemizedlist >
2009-06-19 23:39:45 +02:00
<listitem >
2009-06-20 18:35:08 +02:00
<para > <filename > lib.private</filename> -- Intended to contain
2009-06-19 23:39:45 +02:00
declarations of shell functions to be called by other run-time
2009-06-20 18:35:08 +02:00
extension scripts. See<ulink url= "MultiISP.html#lsm" > this
article</ulink> for an example of its use.</para>
2009-06-19 23:39:45 +02:00
</listitem>
2007-10-28 00:34:18 +02:00
<listitem >
2009-02-28 04:45:43 +01:00
<para > <filename > compile</filename> -- Invoked by the rules compiler
early in the compilation process. Must be written in Perl.</para>
2007-10-28 00:34:18 +02:00
</listitem>
2004-02-14 19:06:39 +01:00
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > init</filename> -- invoked early in <quote > shorewall
start</quote> and <quote > shorewall restart</quote> </para>
2004-02-14 19:06:39 +01:00
</listitem>
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > initdone</filename> -- invoked after Shorewall has
flushed all existing rules but before any rules have been added to the
builtin chains.</para>
2004-02-14 19:06:39 +01:00
</listitem>
2005-05-13 20:27:08 +02:00
2007-07-05 16:22:08 +02:00
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > start</filename> -- invoked after the firewall has
2009-02-28 04:45:43 +01:00
been started or restarted.</para>
2007-07-05 16:22:08 +02:00
</listitem>
2005-05-13 20:27:08 +02:00
2007-07-05 16:22:08 +02:00
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > started</filename> -- invoked after the firewall has
2009-02-28 04:45:43 +01:00
been marked as 'running'.</para>
2007-07-05 16:22:08 +02:00
</listitem>
2005-05-13 20:27:08 +02:00
2007-07-05 16:22:08 +02:00
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > stop</filename> -- invoked as a first step when the
firewall is being stopped.</para>
2007-07-05 16:22:08 +02:00
</listitem>
2005-05-13 20:27:08 +02:00
2007-07-05 16:22:08 +02:00
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > stopped</filename> -- invoked after the firewall has
been stopped.</para>
2007-07-05 16:22:08 +02:00
</listitem>
2005-05-13 20:27:08 +02:00
2007-07-05 16:22:08 +02:00
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > clear</filename> -- invoked after the firewall has
been cleared.</para>
2007-07-05 16:22:08 +02:00
</listitem>
2005-05-13 20:27:08 +02:00
2008-03-29 15:26:43 +01:00
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > tcclear</filename> -- invoked to clear traffic shaping
when CLEAR_TC=Yes in <ulink
2008-03-29 15:26:43 +01:00
url="manpages/shorewall.conf.html">shorewall.conf</ulink> .</para>
</listitem>
2007-07-05 16:22:08 +02:00
<listitem >
2010-01-31 21:12:55 +01:00
<para > <filename > refresh</filename> -- called in place of
<filename > init</filename> when the firewall is being refreshed rather
than started or restarted.</para>
2007-07-05 16:22:08 +02:00
</listitem>
2005-05-13 20:27:08 +02:00
2007-07-05 16:22:08 +02:00
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > refreshed</filename> -- invoked after the firewall has
been refreshed.</para>
2007-07-05 16:22:08 +02:00
</listitem>
<listitem >
2009-02-05 19:16:40 +01:00
<para > <filename > maclog</filename> -- invoked while mac filtering rules
are being created. It is invoked once for each interface having
'maclist' specified and it is invoked just before the logging rule is
added to the current chain (the name of that chain will be in
$CHAIN).</para>
2007-07-05 16:22:08 +02:00
</listitem>
2007-08-10 22:55:54 +02:00
<listitem >
2009-02-28 04:45:43 +01:00
<para > <filename > isusable</filename> -- invoked when Shorewall is
trying to determine the usability of the network interface associated
with an optional entry in
<filename > /etc/shorewall/providers</filename> . $1 is the name of the
interface which will have been determined to be up and configured
2007-08-10 23:36:08 +02:00
before the script is invoked. The return value from the script
indicates whether or not the interface is usable (0 = usable, other =
unusable).</para>
2007-08-10 22:55:54 +02:00
<para > Example:<programlisting > # Ping a gateway through the passed interface
case $1 in
eth0)
2007-08-10 23:36:08 +02:00
ping -c 4 -t 1 -I eth0 206.124.146.254 > /dev/null 2> & 1
2007-08-10 22:55:54 +02:00
return
;;
eth1)
2007-08-10 23:36:08 +02:00
ping -c 4 -t 1 -I eth1 192.168.12.254 > /dev/null 2> & 1
2007-08-10 22:55:54 +02:00
return
;;
*)
# No additional testing of other interfaces
return 0
;;
esac</programlisting> <caution >
2007-08-27 22:03:39 +02:00
<para > We recommend that this script only be used with
ADMINISABSENTMINDED=Yes.</para>
2007-08-10 22:55:54 +02:00
<para > The firewall state when this script is invoked is
2008-08-15 07:03:24 +02:00
indeterminate. So if you have ADMINISABSENTMINDED=No in <ulink
2007-08-10 22:55:54 +02:00
url="manpages/shorewall.conf.html">shorewall.conf</ulink> (8) and
output on an interface is not allowed by <ulink
2015-10-05 16:51:43 +02:00
url="manpages/shorewall-stoppedrules.html">stoppedrules</ulink> (8)
2015-10-30 17:09:53 +01:00
then the isuasable script must blow it's own holes in the firewall
2007-09-15 18:02:57 +02:00
before probing.</para>
2007-08-10 22:55:54 +02:00
</caution> </para>
</listitem>
2008-05-31 15:41:28 +02:00
<listitem >
2009-02-28 04:45:43 +01:00
<para > <filename > save</filename> -- This script is invoked during
execution of the <command > shorewall save</command> and
<command > shorewall-lite save</command> commands.</para>
2009-02-05 19:16:40 +01:00
</listitem>
<listitem >
2009-02-28 04:45:43 +01:00
<para > <filename > restored</filename> -- This script is invoked at the
completion of a successful <command > shorewall restore</command> and
2009-02-05 19:16:40 +01:00
<command > shorewall-lite restore</command> .</para>
2008-05-31 15:41:28 +02:00
</listitem>
2009-06-18 01:46:20 +02:00
<listitem >
<para > findgw -- This script is invoked when Shorewall is attempting to
discover the gateway through a dynamic interface. The script is most
often used when the interface is managed by dhclient which has no
standardized location/name for its lease database. Scripts for use
with dhclient on several distributions are available at <ulink
2020-03-26 22:58:35 +01:00
url="https://shorewall.org/pub/shorewall/contrib/findgw/">https://shorewall.org/pub/shorewall/contrib/findgw/</ulink> </para>
2009-06-18 01:46:20 +02:00
</listitem>
2010-10-01 21:29:41 +02:00
<listitem >
<para > <filename > scfilter</filename> -- Added in Shorewall 4.4.14.
2010-10-03 21:52:30 +02:00
Unlike the other scripts, this script is executed by the command-line
2010-10-01 21:29:41 +02:00
tools (<filename > /sbin/shorewall</filename> ,
<filename > /sbin/shorewall6</filename> , etc) and can be used to
reformat the output of the <command > show connections</command>
command. The connection information is piped through this script so
that the script can drop information, add information or alter the
format of the information. When using Shorewall Lite or Shorewall6
2010-10-03 21:52:30 +02:00
Lite, the script is encapsulated in a function that is copied into the
generated auxillary configuration file. That function is invoked by
the 'show connections' command.</para>
<para > The default script is as follows and simply pipes the output
through unaltered.</para>
2010-10-01 21:29:41 +02:00
<programlisting > #! /bin/sh
cat -</programlisting>
</listitem>
2013-12-08 23:12:08 +01:00
<listitem >
<para > <filename > postcompile</filename> -- Added in Shorewall 4.5.8.
This shell script is invoked by<emphasis role= "bold" >
/sbin/shorewall</emphasis> after a script has been compiled. $1 is the
path name of the compiled script.</para>
</listitem>
2015-10-30 17:09:53 +01:00
<listitem >
<para > <filename > lib.cli-user</filename> -- Added in Shorewall 5.0.2.
This is actually a shell library (set of function declarations) that
can be used to augment or replace functions in the standard CLI
libraries.</para>
</listitem>
2017-08-03 00:44:48 +02:00
<listitem >
<para > <filename > enabled</filename> -- Added in Shorewall 5.1.6.
Invoked when an optional interface or provider is successfully enabled
using the <command > enable</command> command.</para>
</listitem>
<listitem >
<para > <filename > disabled</filename> -- Added in Shorewall 5.1.6.
Invoked when an optional interface or provider is successfully
disabled using the <command > disable</command> command.</para>
</listitem>
2007-07-05 16:22:08 +02:00
</itemizedlist>
<para > <emphasis role= "bold" > If your version of Shorewall doesn't have the
file that you want to use from the above list, you can simply create the
file yourself.</emphasis> You can also supply a script with the same name
as any of the filter chains in the firewall and the script will be invoked
after the /etc/shorewall/rules file has been processed but before the
/etc/shorewall/policy file has been processed.</para>
2009-02-06 04:40:44 +01:00
<para > The following table indicate which commands invoke the various
scripts.</para>
2009-02-10 23:10:24 +01:00
<informaltable frame= "none" rowheader= "firstcol" >
2009-02-28 04:45:43 +01:00
<tgroup cols= "2" >
2009-02-06 04:40:44 +01:00
<tbody >
<row >
2009-02-10 23:10:24 +01:00
<entry > <emphasis role= "bold" > script</emphasis> </entry>
2009-02-06 04:40:44 +01:00
2009-02-28 04:45:43 +01:00
<entry > <emphasis role= "bold" > Commands</emphasis> </entry>
2009-02-06 04:40:44 +01:00
</row>
<row >
<entry > clear</entry>
<entry > clear</entry>
</row>
<row >
<entry > compile</entry>
<entry > check, compile, export, load, refresh, reload, restart,
restore,start</entry>
</row>
<row >
<entry > continue</entry>
2015-10-30 17:09:53 +01:00
<entry />
2009-02-06 04:40:44 +01:00
</row>
2017-08-03 00:44:48 +02:00
<row >
<entry > disable</entry>
<entry > disable</entry>
</row>
<row >
<entry > enable</entry>
<entry > enable</entry>
</row>
2009-02-06 04:40:44 +01:00
<row >
<entry > init</entry>
<entry > load, refresh, reload, restart restore, start</entry>
</row>
<row >
<entry > initdone</entry>
<entry > check, compile, export, refresh, restart, start</entry>
</row>
<row >
<entry > isusable</entry>
<entry > refresh, restart, restore, start</entry>
</row>
<row >
<entry > maclog</entry>
<entry > check, compile, export, refresh, restart, start</entry>
</row>
2013-12-08 23:12:08 +01:00
<row >
<entry > postcompile</entry>
<entry > compile, export, load, refresh, reload, restart, restore,
start</entry>
</row>
2009-02-06 04:40:44 +01:00
<row >
<entry > refresh</entry>
<entry > refresh</entry>
</row>
<row >
<entry > refreshed</entry>
<entry > refresh</entry>
</row>
<row >
<entry > restored</entry>
<entry > restore</entry>
</row>
<row >
<entry > save</entry>
<entry > save</entry>
</row>
2010-10-01 21:29:41 +02:00
<row >
<entry > scfilter</entry>
<entry > show connections</entry>
</row>
2009-02-06 04:40:44 +01:00
<row >
<entry > start</entry>
<entry > load, reload, restart, start</entry>
</row>
<row >
<entry > started</entry>
<entry > load, reload, restart, start</entry>
</row>
<row >
<entry > stop</entry>
<entry > stop, clear</entry>
</row>
<row >
<entry > stopped</entry>
<entry > stop, clear</entry>
</row>
<row >
<entry > tcclear</entry>
<entry > load, reload, restart, restore, start</entry>
</row>
</tbody>
</tgroup>
</informaltable>
2007-07-05 16:22:08 +02:00
<para > There are a couple of special considerations for commands in
extension scripts:</para>
<itemizedlist >
<listitem >
<para > When you want to run <command > iptables</command> , use the
command <command > run_iptables</command> instead.
<command > run_iptables</command> will run the iptables utility passing
the arguments to <command > run_iptables</command> and if the command
fails, the firewall will be stopped (or restored from the last
2009-02-28 04:45:43 +01:00
<command > save</command> command, if any).
<command > run_iptables</command> should not be called from the
<filename > started</filename> or <filename > restored</filename>
scripts.</para>
2007-07-05 16:22:08 +02:00
</listitem>
<listitem >
<para > If you wish to generate a log message, use <emphasis
role="bold">log_rule_limit</emphasis> . Parameters are:</para>
<itemizedlist >
<listitem >
<para > Log Level</para>
</listitem>
<listitem >
<para > Chain to insert the rule into</para>
</listitem>
<listitem >
<para > Chain name to display in the message (this can be different
from the preceding argument — see the <ulink
url="PortKnocking.html">Port Knocking article</ulink> for an
example of how to use this).</para>
</listitem>
<listitem >
<para > Disposition to report in the message (ACCEPT, DROP,
etc)</para>
</listitem>
2006-03-24 19:39:36 +01:00
2007-07-05 16:22:08 +02:00
<listitem >
<para > Rate Limit (if passed as "" then $LOGLIMIT is assumed — see
the LOGLIMIT option in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink> )</para>
</listitem>
<listitem >
<para > Log Tag ("" if none)</para>
</listitem>
<listitem >
<para > Command (-A or -I for append or insert).</para>
</listitem>
<listitem >
<para > The remaining arguments are passed "as is" to
iptables</para>
</listitem>
</itemizedlist>
</listitem>
<listitem >
<para > Many of the extension scripts get executed for both the
shorewall start and shorewall restart commands. You can determine
which command is being executed using the contents of $COMMAND.</para>
<programlisting > if [ $COMMAND = start ]; then
2006-03-24 19:39:36 +01:00
...</programlisting>
2007-07-05 16:22:08 +02:00
</listitem>
2010-03-03 20:46:23 +01:00
<listitem >
<para > In addition to COMMAND, Shorewall defines three other variables
that may be used for locating Shorewall files:</para>
<itemizedlist >
<listitem >
<para > CONFDIR - The configuration directory. Will be <filename
2017-08-07 22:41:28 +02:00
class="directory">/etc/</filename> .
The running product is defined in the g_product variable.</para>
2010-03-03 20:46:23 +01:00
</listitem>
2017-08-07 22:41:28 +02:00
<listitem >
<para > SHAREDIR - The product shared directory. Will be <filename
class="directory">/usr/share</filename> .
The running product is defined in the g_product variable.</para>
2010-03-03 20:46:23 +01:00
</listitem>
<listitem >
2010-03-06 15:43:14 +01:00
<para > VARDIR - The product state directory. Defaults <filename
2015-03-02 16:27:03 +01:00
class="directory">/var/lib/shorewall</filename> , <filename
class="directory">/var/lib/shorewall6/</filename> , <filename
2015-10-30 17:09:53 +01:00
class="directory">/var/lib/shorewall-lite</filename> , or <filename
class="directory">/var/lib/shorewall6-lite</filename> depending on
which product is running, but may be overridden by an entry in
${CONFDIR}/vardir.</para>
2010-03-03 20:46:23 +01:00
</listitem>
</itemizedlist>
</listitem>
2014-08-22 01:00:58 +02:00
<listitem >
<para > Shell variables used in extension scripts must follow the same
rules as those in<filename > /etc/shorewall/params</filename> . See
<ulink url= "???" > this article</ulink> .</para>
</listitem>
2007-07-05 16:22:08 +02:00
</itemizedlist>
2015-10-30 17:09:53 +01:00
<para />
2007-07-05 16:22:08 +02:00
<section id= "Perl" >
2009-02-28 04:45:43 +01:00
<title > Compile-time vs Run-time Scripts</title>
2007-07-05 16:22:08 +02:00
2009-02-28 04:45:43 +01:00
<para > Shorewall runs some extension scripts at compile-time rather than
at run-time.</para>
2007-06-25 22:11:24 +02:00
<para > The following table summarizes when the various extension scripts
are run:<informaltable frame= "all" >
2009-02-28 04:45:43 +01:00
<tgroup cols= "2" >
2007-06-25 22:11:24 +02:00
<tbody >
<row >
<entry > <emphasis role= "bold" > Compile-time</emphasis> </entry>
<entry > <emphasis role= "bold" > Run-time</emphasis> </entry>
</row>
<row >
2007-10-28 00:34:18 +02:00
<entry > compile</entry>
2007-06-25 22:11:24 +02:00
<entry > clear</entry>
</row>
<row >
2007-10-28 00:34:18 +02:00
<entry > initdone</entry>
2007-06-25 22:11:24 +02:00
2017-08-03 00:44:48 +02:00
<entry > disable</entry>
2007-06-25 22:11:24 +02:00
</row>
<row >
2007-10-28 00:34:18 +02:00
<entry > maclog</entry>
2007-06-25 22:11:24 +02:00
2017-08-03 00:44:48 +02:00
<entry > enable</entry>
2007-06-25 22:11:24 +02:00
</row>
<row >
2007-10-28 00:34:18 +02:00
<entry > Per-chain (including those associated with
actions)</entry>
2007-06-25 22:11:24 +02:00
2017-08-03 00:44:48 +02:00
<entry > init</entry>
2008-03-29 15:26:43 +01:00
</row>
<row >
2013-12-08 23:12:08 +01:00
<entry > postcompile</entry>
2008-03-29 15:26:43 +01:00
2017-08-03 00:44:48 +02:00
<entry > isusable</entry>
</row>
<row >
<entry />
<entry > start</entry>
</row>
<row >
<entry />
2007-06-25 22:11:24 +02:00
<entry > started</entry>
</row>
<row >
2015-10-30 17:09:53 +01:00
<entry />
2007-06-25 22:11:24 +02:00
<entry > stop</entry>
</row>
<row >
2015-10-30 17:09:53 +01:00
<entry />
2007-06-25 22:11:24 +02:00
<entry > stopped</entry>
</row>
<row >
2015-10-30 17:09:53 +01:00
<entry />
2007-06-25 22:11:24 +02:00
<entry > tcclear</entry>
</row>
2007-07-03 22:03:25 +02:00
<row >
2015-10-30 17:09:53 +01:00
<entry />
2007-07-03 22:03:25 +02:00
<entry > refresh</entry>
</row>
<row >
2015-10-30 17:09:53 +01:00
<entry />
2007-07-03 22:03:25 +02:00
<entry > refreshed</entry>
</row>
2009-02-05 21:07:05 +01:00
<row >
2015-10-30 17:09:53 +01:00
<entry />
2009-02-05 21:07:05 +01:00
<entry > restored</entry>
</row>
2010-10-01 21:29:41 +02:00
<row >
2015-10-30 17:09:53 +01:00
<entry />
2010-10-01 21:29:41 +02:00
<entry > scfilter</entry>
</row>
2007-06-25 22:11:24 +02:00
</tbody>
</tgroup>
</informaltable> </para>
2017-08-04 21:38:14 +02:00
<para > The contents of each run-time script is placed in a shell
function, so you can declare local variables and can use the
<command > return</command> command. The functions generated from the
<filename > enable</filename> and <filename > disable</filename> scripts are
passed three arguments:</para>
<variablelist >
<varlistentry >
<term > $1</term>
<listitem >
<para > Physical name of the interface that was enabled or
disabled.</para>
</listitem>
</varlistentry>
<varlistentry >
<term > $2</term>
<listitem >
<para > Logical name of the interface.</para>
</listitem>
</varlistentry>
<varlistentry >
<term > $3</term>
<listitem >
<para > Name of the Provider, if any, associated with the
interface.</para>
</listitem>
</varlistentry>
</variablelist>
<para > As described above, the function generated from the
<filename > isusable</filename> script is passed a single argument that
names a network interface.</para>
2013-12-08 23:12:08 +01:00
<para > With the exception of postcompile, compile-time extension scripts
are executed using the Perl 'eval `cat
< <emphasis > file</emphasis> > `' mechanism. Be sure that each script
returns a 'true' value; otherwise, the compiler will assume that the
script failed and will abort the compilation.</para>
2007-06-16 16:27:02 +02:00
2009-02-28 04:45:43 +01:00
<para > Each compile-time script is implicitly prefaced with:</para>
2007-10-28 00:34:18 +02:00
<programlisting > package Shorewall::User;</programlisting>
<para > Most scripts will need to begin with the following
2007-07-03 23:22:08 +02:00
line:<programlisting > use Shorewall::Chains;</programlisting> For more
2007-06-16 16:27:02 +02:00
complex scripts, you may need to 'use' other Shorewall Perl modules --
browse <filename
2009-02-28 04:45:43 +01:00
class="directory">/usr/share/shorewall/Shorewall/</filename> to see
2007-06-16 16:27:02 +02:00
what's available.</para>
2007-08-27 22:03:39 +02:00
<para > When a script is invoked, the <emphasis
role="bold">$chainref</emphasis> scalar variable will hold a reference
to a chain table entry.<simplelist >
<member > <emphasis role= "bold" > $chainref-> {name}</emphasis>
contains the name of the chain</member>
2007-06-16 16:27:02 +02:00
2007-08-27 22:03:39 +02:00
<member > <emphasis role= "bold" > $chainref-> {table}</emphasis> holds
the table name</member>
2007-07-05 16:22:08 +02:00
</simplelist> </para>
2009-05-31 19:11:23 +02:00
<para > To add a rule to the chain:<programlisting > add_rule( $chainref, < <emphasis > the rule</emphasis> > [ , < <emphasis > break lists</emphasis> > ] );</programlisting> Where<simplelist >
2007-08-27 22:03:39 +02:00
<member > < <emphasis > the rule</emphasis> > is a scalar argument
holding the rule text. Do not include "-A < <emphasis > chain
name</emphasis> > "</member>
2007-10-15 19:13:50 +02:00
</simplelist> Example:<programlisting > add_rule( $chainref, '-j ACCEPT' );</programlisting> </para>
2009-02-28 04:45:43 +01:00
<para > The add_rule() function accepts an optional third argument; If
that argument evaluates to true and the passed rule contains a <emphasis
2009-05-31 19:11:23 +02:00
role="bold">--dports</emphasis> or <emphasis
role="bold">--sports</emphasis> list with more than 15 ports (a port
2009-02-28 04:45:43 +01:00
range counts as two ports), the rule will be split into multiple rules
where each resulting rule has 15 or fewer ports in its <emphasis
2009-05-31 19:11:23 +02:00
role="bold">--dports</emphasis> and <emphasis
role="bold">--sports</emphasis> lists.</para>
2007-10-15 19:13:50 +02:00
<para > To insert a rule into the chain:<programlisting > insert_rule( $chainref, < <emphasis > rulenum</emphasis> > , < <emphasis > the rule</emphasis> > );</programlisting> The
2007-08-27 22:03:39 +02:00
<emphasis role= "bold" > log_rule_limit()</emphasis> function works like it
2009-05-31 19:11:23 +02:00
did in the shell compiler with three exceptions:<itemizedlist >
2007-06-16 16:27:02 +02:00
<listitem >
<para > You pass the chain reference rather than the name of the
chain.</para>
</listitem>
<listitem >
<para > The commands are 'add' and 'insert' rather than '-A' and
'-I'.</para>
</listitem>
<listitem >
<para > There is only a single "pass as-is to iptables" argument (so
you must quote that part).</para>
</listitem>
</itemizedlist> Example:<programlisting > log_rule_limit(
2009-05-31 19:11:23 +02:00
'info' , #Log Level
$chainref , #Chain to add the rule to
$chainref-> {name}, #Name of the chain as it will appear in the log prefix
'DROP' , #Disposition of the packet
'', #Limit
'' , #Log tag
'add', #Command
'-p tcp' #Added to the rule as-is
2007-07-05 16:06:36 +02:00
);</programlisting> Note that in the 'initdone' script, there is
2007-08-27 22:03:39 +02:00
no default chain (<emphasis role= "bold" > $chainref</emphasis> ). You can
obtain a reference to a standard chain by:<programlisting > my $chainref = $chain_table{< <emphasis > table</emphasis> > }{< <emphasis > chain name</emphasis> > };</programlisting> Example:<programlisting > my $chainref = $chain_table{filter}{INPUT};</programlisting> </para>
2007-07-03 23:22:08 +02:00
2007-08-27 22:03:39 +02:00
<para > You can also use the hash references <emphasis
role="bold">$filter_table</emphasis> , <emphasis
role="bold">$mangle_table</emphasis> and <emphasis
role="bold">$nat_table</emphasis> to access chain references in the
three main tables.</para>
2007-07-03 23:22:08 +02:00
<para > Example:</para>
<programlisting > my $chainref = $filter_table-> {INPUT}; #Same as above with a few less keystrokes; runs faster too</programlisting>
2010-08-17 18:23:43 +02:00
<para > For imformation about the 'compile' extension script, see the
<ulink url= "ManualChains.html" > Manual Chains article</ulink> .</para>
2007-07-05 16:22:08 +02:00
</section>
</section>
2008-07-07 22:42:54 +02:00
</article>