2002-07-24 17:03:06 +02:00
|
|
|
#!/bin/sh
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
2008-05-04 02:18:47 +02:00
|
|
|
# Shorewall 4.2 -- /usr/share/shorewall/lib.base
|
2006-05-06 18:26:05 +02:00
|
|
|
#
|
2007-09-08 18:09:51 +02:00
|
|
|
# This program is under GPL [http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt]
|
2006-05-06 18:26:05 +02:00
|
|
|
#
|
2007-01-12 23:06:29 +01:00
|
|
|
# (c) 1999,2000,2001,2002,2003,2004,2005,2006,2007 - Tom Eastep (teastep@shorewall.net)
|
2006-05-06 18:26:05 +02:00
|
|
|
#
|
|
|
|
# Complete documentation is available at http://shorewall.net
|
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or modify
|
|
|
|
# it under the terms of Version 2 of the GNU General Public License
|
|
|
|
# as published by the Free Software Foundation.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program; if not, write to the Free Software
|
2007-09-08 18:09:51 +02:00
|
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
2006-09-09 17:03:44 +02:00
|
|
|
#
|
2007-07-03 00:51:36 +02:00
|
|
|
# This library contains the code common to all Shorewall components.
|
|
|
|
#
|
|
|
|
# - It is copied into the compiled script with the -e compiler flag is specified to
|
|
|
|
# shorewall-shell.
|
|
|
|
# - It is loaded by /sbin/shorewall.
|
|
|
|
# - It is loaded by /usr/share/shorewall/firewall.
|
|
|
|
# - It is loaded by /usr/share/shorewall-shell/compiler.
|
|
|
|
# - It is released as part of Shorewall Lite where it is used by /sbin/shorewall-lite
|
|
|
|
# and /usr/share/shorewall-lite/shorecap.
|
|
|
|
# - It is released as part of Shorewall Perl where it is copied into the compiled script
|
|
|
|
# by the compiler.
|
2006-09-09 17:03:44 +02:00
|
|
|
#
|
2005-07-09 07:45:05 +02:00
|
|
|
|
2007-06-16 17:43:14 +02:00
|
|
|
SHOREWALL_LIBVERSION=40000
|
2008-10-08 18:54:08 +02:00
|
|
|
SHOREWALL_CAPVERSION=40200
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
[ -n "${VARDIR:=/var/lib/shorewall}" ]
|
|
|
|
[ -n "${SHAREDIR:=/usr/share/shorewall}" ]
|
|
|
|
[ -n "${CONFDIR:=/etc/shorewall}" ]
|
2007-06-18 22:22:57 +02:00
|
|
|
SHELLSHAREDIR=/usr/share/shorewall-shell
|
2007-04-03 18:26:05 +02:00
|
|
|
PERLSHAREDIR=/usr/share/shorewall-perl
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
#
|
|
|
|
# Message to stderr
|
|
|
|
#
|
|
|
|
error_message() # $* = Error Message
|
|
|
|
{
|
|
|
|
echo " $@" >&2
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Conditionally produce message
|
|
|
|
#
|
|
|
|
progress_message() # $* = Message
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local timestamp
|
|
|
|
timestamp=
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
if [ $VERBOSE -gt 1 ]; then
|
|
|
|
[ -n "$TIMESTAMP" ] && timestamp="$(date +%H:%M:%S) "
|
|
|
|
echo "${timestamp}$@"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
progress_message2() # $* = Message
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local timestamp
|
|
|
|
timestamp=
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
if [ $VERBOSE -gt 0 ]; then
|
|
|
|
[ -n "$TIMESTAMP" ] && timestamp="$(date +%H:%M:%S) "
|
|
|
|
echo "${timestamp}$@"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
progress_message3() # $* = Message
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local timestamp
|
|
|
|
timestamp=
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
if [ $VERBOSE -ge 0 ]; then
|
|
|
|
[ -n "$TIMESTAMP" ] && timestamp="$(date +%H:%M:%S) "
|
|
|
|
echo "${timestamp}$@"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2006-09-07 01:07:29 +02:00
|
|
|
#
|
|
|
|
# Split a colon-separated list into a space-separated list
|
|
|
|
#
|
|
|
|
split() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local ifs
|
|
|
|
ifs=$IFS
|
2006-09-07 01:07:29 +02:00
|
|
|
IFS=:
|
|
|
|
echo $*
|
|
|
|
IFS=$ifs
|
|
|
|
}
|
|
|
|
|
2006-09-07 17:17:42 +02:00
|
|
|
#
|
|
|
|
# Search a list looking for a match -- returns zero if a match found
|
|
|
|
# 1 otherwise
|
|
|
|
#
|
|
|
|
list_search() # $1 = element to search for , $2-$n = list
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local e
|
|
|
|
e=$1
|
2006-09-07 17:17:42 +02:00
|
|
|
|
|
|
|
while [ $# -gt 1 ]; do
|
|
|
|
shift
|
|
|
|
[ "x$e" = "x$1" ] && return 0
|
|
|
|
done
|
|
|
|
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2007-04-27 20:14:52 +02:00
|
|
|
#
|
|
|
|
# Undo the effect of 'separate_list()'
|
|
|
|
#
|
|
|
|
combine_list()
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local f
|
|
|
|
local o
|
|
|
|
o=
|
2007-04-27 20:14:52 +02:00
|
|
|
|
|
|
|
for f in $* ; do
|
|
|
|
o="${o:+$o,}$f"
|
|
|
|
done
|
|
|
|
|
|
|
|
echo $o
|
|
|
|
}
|
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# Suppress all output for a command
|
|
|
|
#
|
|
|
|
qt()
|
|
|
|
{
|
|
|
|
"$@" >/dev/null 2>&1
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Determine if Shorewall is "running"
|
|
|
|
#
|
|
|
|
shorewall_is_started() {
|
|
|
|
qt $IPTABLES -L shorewall -n
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Echos the fully-qualified name of the calling shell program
|
|
|
|
#
|
|
|
|
my_pathname() {
|
|
|
|
cd $(dirname $0)
|
|
|
|
echo $PWD/$(basename $0)
|
|
|
|
}
|
|
|
|
|
2006-11-23 01:58:38 +01:00
|
|
|
#
|
2006-08-27 19:27:48 +02:00
|
|
|
# Source a user exit file if it exists
|
|
|
|
#
|
|
|
|
run_user_exit() # $1 = file name
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local user_exit
|
|
|
|
user_exit=$(find_file $1)
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
if [ -f $user_exit ]; then
|
|
|
|
progress_message "Processing $user_exit ..."
|
|
|
|
. $user_exit
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Set a standard chain's policy
|
|
|
|
#
|
|
|
|
setpolicy() # $1 = name of chain, $2 = policy
|
|
|
|
{
|
|
|
|
run_iptables -P $1 $2
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Set a standard chain to enable established and related connections
|
|
|
|
#
|
2006-09-07 01:07:29 +02:00
|
|
|
setcontinue() # $1 = name of chain
|
2006-08-27 19:27:48 +02:00
|
|
|
{
|
2006-09-07 01:07:29 +02:00
|
|
|
run_iptables -A $1 -m state --state ESTABLISHED,RELATED -j ACCEPT
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
2006-09-07 01:07:29 +02:00
|
|
|
# Flush one of the NAT table chains
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
2006-09-07 01:07:29 +02:00
|
|
|
flushnat() # $1 = name of chain
|
2006-08-27 19:27:48 +02:00
|
|
|
{
|
2006-09-07 01:07:29 +02:00
|
|
|
run_iptables -t nat -F $1
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
2006-09-07 01:07:29 +02:00
|
|
|
# Flush one of the Mangle table chains
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
2006-09-07 01:07:29 +02:00
|
|
|
flushmangle() # $1 = name of chain
|
2006-08-27 19:27:48 +02:00
|
|
|
{
|
2006-09-07 01:07:29 +02:00
|
|
|
run_iptables -t mangle -F $1
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Flush and delete all user-defined chains in the filter table
|
|
|
|
#
|
|
|
|
deleteallchains() {
|
|
|
|
run_iptables -F
|
|
|
|
run_iptables -X
|
|
|
|
}
|
|
|
|
|
2006-09-09 01:53:49 +02:00
|
|
|
#
|
2006-10-31 20:01:23 +01:00
|
|
|
# Load a Kernel Module -- assumes that the variable 'moduledirectories' contains
|
2006-09-09 01:53:49 +02:00
|
|
|
# a space-separated list of directories to search for
|
2006-10-31 20:01:23 +01:00
|
|
|
# the module and that 'moduleloader' contains the
|
2006-09-09 01:53:49 +02:00
|
|
|
# module loader command.
|
|
|
|
#
|
|
|
|
loadmodule() # $1 = module name, $2 - * arguments
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local modulename
|
|
|
|
modulename=$1
|
2006-09-09 01:53:49 +02:00
|
|
|
local modulefile
|
|
|
|
local suffix
|
|
|
|
|
2007-11-16 00:24:54 +01:00
|
|
|
if ! list_search $modulename $MODULES $DONT_LOAD ; then
|
2006-09-09 01:53:49 +02:00
|
|
|
shift
|
|
|
|
|
|
|
|
for suffix in $MODULE_SUFFIX ; do
|
|
|
|
for directory in $moduledirectories; do
|
|
|
|
modulefile=$directory/${modulename}.${suffix}
|
|
|
|
|
|
|
|
if [ -f $modulefile ]; then
|
|
|
|
case $moduleloader in
|
|
|
|
insmod)
|
|
|
|
insmod $modulefile $*
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
modprobe $modulename $*
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
break 2
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
2006-09-07 23:55:46 +02:00
|
|
|
# Reload the Modules
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
2006-09-07 23:55:46 +02:00
|
|
|
reload_kernel_modules() {
|
|
|
|
|
2008-03-14 03:07:28 +01:00
|
|
|
local save_modules_dir
|
|
|
|
save_modules_dir=$MODULESDIR
|
2006-09-07 23:55:46 +02:00
|
|
|
local directory
|
2008-03-14 03:07:28 +01:00
|
|
|
local moduledirectories
|
|
|
|
moduledirectories=
|
|
|
|
local moduleloader
|
|
|
|
moduleloader=modprobe
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
if ! qt mywhich modprobe; then
|
|
|
|
moduleloader=insmod
|
|
|
|
fi
|
|
|
|
|
2007-04-07 18:22:31 +02:00
|
|
|
[ -n "${MODULE_SUFFIX:=o gz ko o.gz ko.gz}" ]
|
|
|
|
|
2006-09-07 23:55:46 +02:00
|
|
|
[ -z "$MODULESDIR" ] && MODULESDIR=/lib/modules/$(uname -r)/kernel/net/ipv4/netfilter:/lib/modules/$(uname -r)/kernel/net/netfilter
|
2006-08-27 19:27:48 +02:00
|
|
|
MODULES=$(lsmod | cut -d ' ' -f1)
|
|
|
|
|
2006-09-07 23:55:46 +02:00
|
|
|
for directory in $(split $MODULESDIR); do
|
|
|
|
[ -d $directory ] && moduledirectories="$moduledirectories $directory"
|
|
|
|
done
|
|
|
|
|
2006-09-08 00:30:17 +02:00
|
|
|
[ -n "$moduledirectories" ] && while read command; do
|
2006-08-27 19:27:48 +02:00
|
|
|
eval $command
|
|
|
|
done
|
|
|
|
|
2006-09-07 23:55:46 +02:00
|
|
|
MODULESDIR=$save_modules_dir
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Load kernel modules required for Shorewall
|
|
|
|
#
|
2007-01-25 19:56:24 +01:00
|
|
|
load_kernel_modules() # $1 = Yes, if we are to save moduleinfo in $VARDIR
|
2006-08-27 19:27:48 +02:00
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local save_modules_dir
|
|
|
|
save_modules_dir=$MODULESDIR
|
2006-09-07 23:55:46 +02:00
|
|
|
local directory
|
2008-03-14 03:07:28 +01:00
|
|
|
local moduledirectories
|
|
|
|
moduledirectories=
|
|
|
|
local moduleloader
|
|
|
|
moduleloader=modprobe
|
|
|
|
local savemoduleinfo
|
|
|
|
savemoduleinfo=${1:-Yes} # So old compiled scripts still work
|
2006-09-07 23:55:46 +02:00
|
|
|
|
|
|
|
if ! qt mywhich modprobe; then
|
|
|
|
moduleloader=insmod
|
|
|
|
fi
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2007-04-07 18:22:31 +02:00
|
|
|
[ -n "${MODULE_SUFFIX:=o gz ko o.gz ko.gz}" ]
|
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
[ -z "$MODULESDIR" ] && \
|
2006-09-07 23:55:46 +02:00
|
|
|
MODULESDIR=/lib/modules/$(uname -r)/kernel/net/ipv4/netfilter:/lib/modules/$(uname -r)/kernel/net/netfilter
|
|
|
|
|
|
|
|
for directory in $(split $MODULESDIR); do
|
|
|
|
[ -d $directory ] && moduledirectories="$moduledirectories $directory"
|
|
|
|
done
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
modules=$(find_file modules)
|
|
|
|
|
2006-09-07 23:55:46 +02:00
|
|
|
if [ -f $modules -a -n "$moduledirectories" ]; then
|
2006-08-27 19:27:48 +02:00
|
|
|
MODULES=$(lsmod | cut -d ' ' -f1)
|
|
|
|
progress_message "Loading Modules..."
|
|
|
|
. $modules
|
2007-01-26 00:23:57 +01:00
|
|
|
if [ $savemoduleinfo = Yes ]; then
|
2007-01-25 19:56:24 +01:00
|
|
|
[ -d ${VARDIR} ] || mkdir -p ${VARDIR}
|
|
|
|
echo MODULESDIR="$MODULESDIR" > ${VARDIR}/.modulesdir
|
|
|
|
cp -f $modules ${VARDIR}/.modules
|
|
|
|
fi
|
2007-01-26 00:23:57 +01:00
|
|
|
elif [ $savemoduleinfo = Yes ]; then
|
2007-01-25 17:37:05 +01:00
|
|
|
[ -d ${VARDIR} ] || mkdir -p ${VARDIR}
|
2006-11-15 05:16:59 +01:00
|
|
|
> ${VARDIR}/.modulesdir
|
|
|
|
> ${VARDIR}/.modules
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
MODULESDIR=$save_modules_dir
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Call this function to assert mutual exclusion with Shorewall. If you invoke the
|
|
|
|
# /sbin/shorewall program while holding mutual exclusion, you should pass "nolock" as
|
|
|
|
# the first argument. Example "shorewall nolock refresh"
|
|
|
|
#
|
|
|
|
# This function uses the lockfile utility from procmail if it exists.
|
|
|
|
# Otherwise, it uses a somewhat race-prone algorithm to attempt to simulate the
|
|
|
|
# behavior of lockfile.
|
|
|
|
#
|
|
|
|
mutex_on()
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local try
|
|
|
|
try=0
|
|
|
|
local lockf
|
|
|
|
lockf=${LOCKFILE:=${VARDIR}/lock}
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
MUTEX_TIMEOUT=${MUTEX_TIMEOUT:-60}
|
|
|
|
|
|
|
|
if [ $MUTEX_TIMEOUT -gt 0 ]; then
|
|
|
|
|
|
|
|
[ -d ${VARDIR} ] || mkdir -p ${VARDIR}
|
|
|
|
|
|
|
|
if qt mywhich lockfile; then
|
|
|
|
lockfile -${MUTEX_TIMEOUT} -r1 ${lockf}
|
|
|
|
else
|
|
|
|
while [ -f ${lockf} -a ${try} -lt ${MUTEX_TIMEOUT} ] ; do
|
|
|
|
sleep 1
|
|
|
|
try=$((${try} + 1))
|
|
|
|
done
|
|
|
|
|
|
|
|
if [ ${try} -lt ${MUTEX_TIMEOUT} ] ; then
|
|
|
|
# Create the lockfile
|
|
|
|
echo $$ > ${lockf}
|
|
|
|
else
|
|
|
|
echo "Giving up on lock file ${lockf}" >&2
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Call this function to release mutual exclusion
|
|
|
|
#
|
|
|
|
mutex_off()
|
|
|
|
{
|
2007-04-16 01:41:13 +02:00
|
|
|
rm -f ${LOCKFILE:=${VARDIR}/lock}
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
2006-08-27 20:16:55 +02:00
|
|
|
#
|
|
|
|
# Load an optional library
|
|
|
|
#
|
|
|
|
lib_load() # $1 = Name of the Library, $2 = Error Message heading if the library cannot be found
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local lib
|
|
|
|
lib=${SHAREDIR}/lib.$1
|
2006-08-27 20:16:55 +02:00
|
|
|
local loaded
|
|
|
|
|
|
|
|
eval loaded=\$LIB_${1}_LOADED
|
|
|
|
|
|
|
|
if [ -z "$loaded" ]; then
|
2007-04-03 18:26:05 +02:00
|
|
|
[ -f $lib ] || lib=${SHELLSHAREDIR}/lib.$1
|
|
|
|
|
2006-08-27 20:16:55 +02:00
|
|
|
if [ -f $lib ]; then
|
2006-08-28 18:13:36 +02:00
|
|
|
progress_message "Loading library $lib..."
|
2006-08-27 20:16:55 +02:00
|
|
|
. $lib
|
|
|
|
eval LIB_${1}_LOADED=Yes
|
|
|
|
else
|
|
|
|
startup_error "$2 requires the Shorewall library $1 ($lib) which is not installed"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Determine if an optional library is available
|
|
|
|
#
|
|
|
|
lib_avail() # $1 = Name of the Library
|
|
|
|
{
|
|
|
|
[ -f ${SHAREDIR}/lib.$1 ]
|
2006-10-31 20:01:23 +01:00
|
|
|
}
|
2006-08-27 20:16:55 +02:00
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# Note: The following set of IP address manipulation functions have anomalous
|
2007-07-12 17:45:26 +02:00
|
|
|
# behavior when the shell only supports 32-bit signed arithmetic and
|
2006-08-27 19:27:48 +02:00
|
|
|
# the IP address is 128.0.0.0 or 128.0.0.1.
|
|
|
|
#
|
|
|
|
|
|
|
|
LEFTSHIFT='<<'
|
|
|
|
|
2006-12-21 03:29:32 +01:00
|
|
|
#
|
|
|
|
# Validate an IP address
|
|
|
|
#
|
|
|
|
valid_address() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local x
|
|
|
|
local y
|
|
|
|
local ifs
|
|
|
|
ifs=$IFS
|
2006-12-21 03:29:32 +01:00
|
|
|
|
|
|
|
IFS=.
|
|
|
|
|
|
|
|
for x in $1; do
|
|
|
|
case $x in
|
|
|
|
[0-9]|[0-9][0-9]|[1-2][0-9][0-9])
|
|
|
|
[ $x -lt 256 ] || { IFS=$ifs; return 2; }
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
IFS=$ifs
|
|
|
|
return 2
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
|
|
|
|
IFS=$ifs
|
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# Convert an IP address in dot quad format to an integer
|
|
|
|
#
|
|
|
|
decodeaddr() {
|
|
|
|
local x
|
2008-03-14 03:07:28 +01:00
|
|
|
local temp
|
|
|
|
temp=0
|
|
|
|
local ifs
|
|
|
|
ifs=$IFS
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
IFS=.
|
|
|
|
|
|
|
|
for x in $1; do
|
|
|
|
temp=$(( $(( $temp $LEFTSHIFT 8 )) | $x ))
|
|
|
|
done
|
|
|
|
|
|
|
|
echo $temp
|
|
|
|
|
|
|
|
IFS=$ifs
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# convert an integer to dot quad format
|
|
|
|
#
|
|
|
|
encodeaddr() {
|
|
|
|
addr=$1
|
|
|
|
local x
|
2008-03-14 03:07:28 +01:00
|
|
|
local y
|
|
|
|
y=$(($addr & 255))
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
for x in 1 2 3 ; do
|
|
|
|
addr=$(($addr >> 8))
|
|
|
|
y=$(($addr & 255)).$y
|
|
|
|
done
|
|
|
|
|
|
|
|
echo $y
|
|
|
|
}
|
|
|
|
|
2007-12-21 20:12:32 +01:00
|
|
|
#
|
|
|
|
# Miserable Hack to work around broken BusyBox ash in OpenWRT
|
|
|
|
#
|
|
|
|
addr_comp() {
|
|
|
|
test $(bc <<EOF
|
|
|
|
$1 > $2
|
|
|
|
EOF
|
|
|
|
) -eq 1
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# Enumerate the members of an IP range -- When using a shell supporting only
|
|
|
|
# 32-bit signed arithmetic, the range cannot span 128.0.0.0.
|
|
|
|
#
|
|
|
|
# Comes in two flavors:
|
|
|
|
#
|
|
|
|
# ip_range() - produces a mimimal list of network/host addresses that spans
|
|
|
|
# the range.
|
|
|
|
#
|
|
|
|
# ip_range_explicit() - explicitly enumerates the range.
|
|
|
|
#
|
|
|
|
ip_range() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local first
|
|
|
|
local last
|
|
|
|
local l
|
|
|
|
local x
|
|
|
|
local y
|
|
|
|
local z
|
|
|
|
local vlsm
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
case $1 in
|
|
|
|
!*)
|
|
|
|
#
|
|
|
|
# Let iptables complain if it's a range
|
|
|
|
#
|
|
|
|
echo $1
|
|
|
|
return
|
|
|
|
;;
|
|
|
|
[0-9]*.*.*.*-*.*.*.*)
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo $1
|
|
|
|
return
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
first=$(decodeaddr ${1%-*})
|
|
|
|
last=$(decodeaddr ${1#*-})
|
|
|
|
|
2007-12-21 20:12:32 +01:00
|
|
|
if addr_comp $first $last; then
|
2006-08-27 19:27:48 +02:00
|
|
|
fatal_error "Invalid IP address range: $1"
|
|
|
|
fi
|
|
|
|
|
|
|
|
l=$(( $last + 1 ))
|
|
|
|
|
2007-12-21 20:12:32 +01:00
|
|
|
while addr_comp $l $first; do
|
2006-08-27 19:27:48 +02:00
|
|
|
vlsm=
|
|
|
|
x=31
|
|
|
|
y=2
|
|
|
|
z=1
|
|
|
|
|
2007-12-21 20:12:32 +01:00
|
|
|
while [ $(( $first % $y )) -eq 0 ] && addr_comp $l $(( $first + $y )) ; do
|
2006-08-27 19:27:48 +02:00
|
|
|
vlsm=/$x
|
|
|
|
x=$(( $x - 1 ))
|
|
|
|
z=$y
|
|
|
|
y=$(( $y * 2 ))
|
|
|
|
done
|
|
|
|
|
|
|
|
echo $(encodeaddr $first)$vlsm
|
|
|
|
first=$(($first + $z))
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
ip_range_explicit() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local first
|
|
|
|
local last
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
case $1 in
|
|
|
|
[0-9]*.*.*.*-*.*.*.*)
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo $1
|
|
|
|
return
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
first=$(decodeaddr ${1%-*})
|
|
|
|
last=$(decodeaddr ${1#*-})
|
|
|
|
|
2007-12-21 20:12:32 +01:00
|
|
|
if addr_comp $first $last; then
|
2006-08-27 19:27:48 +02:00
|
|
|
fatal_error "Invalid IP address range: $1"
|
|
|
|
fi
|
|
|
|
|
2007-12-21 20:12:32 +01:00
|
|
|
while ! addr_comp $first $last; do
|
2006-08-27 19:27:48 +02:00
|
|
|
echo $(encodeaddr $first)
|
|
|
|
first=$(($first + 1))
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Netmask from CIDR
|
|
|
|
#
|
|
|
|
ip_netmask() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local vlsm
|
|
|
|
vlsm=${1#*/}
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
[ $vlsm -eq 0 ] && echo 0 || echo $(( -1 $LEFTSHIFT $(( 32 - $vlsm )) ))
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Network address from CIDR
|
|
|
|
#
|
|
|
|
ip_network() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local decodedaddr
|
|
|
|
decodedaddr=$(decodeaddr ${1%/*})
|
|
|
|
local netmask
|
|
|
|
netmask=$(ip_netmask $1)
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
echo $(encodeaddr $(($decodedaddr & $netmask)))
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# The following hack is supplied to compensate for the fact that many of
|
|
|
|
# the popular light-weight Bourne shell derivatives don't support XOR ("^").
|
|
|
|
#
|
|
|
|
ip_broadcast() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local x
|
|
|
|
x=$(( 32 - ${1#*/} ))
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2006-12-21 18:39:33 +01:00
|
|
|
[ $x -eq 32 ] && echo -1 || echo $(( $(( 1 $LEFTSHIFT $x )) - 1 ))
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Calculate broadcast address from CIDR
|
|
|
|
#
|
|
|
|
broadcastaddress() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local decodedaddr
|
|
|
|
decodedaddr=$(decodeaddr ${1%/*})
|
|
|
|
local netmask
|
|
|
|
netmask=$(ip_netmask $1)
|
|
|
|
local broadcast
|
|
|
|
broadcast=$(ip_broadcast $1)
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
echo $(encodeaddr $(( $(($decodedaddr & $netmask)) | $broadcast )))
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Test for network membership
|
|
|
|
#
|
|
|
|
in_network() # $1 = IP address, $2 = CIDR network
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local netmask
|
|
|
|
netmask=$(ip_netmask $2)
|
2007-12-21 20:12:32 +01:00
|
|
|
#
|
|
|
|
# We compare the values as strings rather than integers to work around broken BusyBox ash on OpenWRT
|
|
|
|
#
|
|
|
|
test $(( $(decodeaddr $1) & $netmask)) = $(( $(decodeaddr ${2%/*}) & $netmask ))
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Netmask to VLSM
|
|
|
|
#
|
|
|
|
ip_vlsm() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local mask
|
|
|
|
mask=$(decodeaddr $1)
|
|
|
|
local vlsm
|
|
|
|
vlsm=0
|
|
|
|
local x
|
|
|
|
x=$(( 128 << 24 )) # 0x80000000
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
while [ $(( $x & $mask )) -ne 0 ]; do
|
|
|
|
[ $mask -eq $x ] && mask=0 || mask=$(( $mask $LEFTSHIFT 1 )) # Not all shells shift 0x80000000 left properly.
|
|
|
|
vlsm=$(($vlsm + 1))
|
|
|
|
done
|
|
|
|
|
|
|
|
if [ $(( $mask & 2147483647 )) -ne 0 ]; then # 2147483647 = 0x7fffffff
|
|
|
|
echo "Invalid net mask: $1" >&2
|
|
|
|
else
|
|
|
|
echo $vlsm
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
# Chain name base for an interface -- replace all periods with underscores in the passed name.
|
|
|
|
# The result is echoed (less trailing "+").
|
|
|
|
#
|
|
|
|
chain_base() #$1 = interface
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local c
|
|
|
|
c=${1%%+}
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
while true; do
|
|
|
|
case $c in
|
2006-11-08 01:16:30 +01:00
|
|
|
@*)
|
|
|
|
c=at_${c#@}
|
2006-12-22 16:56:02 +01:00
|
|
|
;;
|
2006-08-27 19:27:48 +02:00
|
|
|
*.*)
|
|
|
|
c="${c%.*}_${c##*.}"
|
|
|
|
;;
|
|
|
|
*-*)
|
|
|
|
c="${c%-*}_${c##*-}"
|
|
|
|
;;
|
|
|
|
*%*)
|
|
|
|
c="${c%\%*}_${c##*%}"
|
|
|
|
;;
|
2007-01-09 16:53:01 +01:00
|
|
|
*@*)
|
|
|
|
c="${c%@*}_${c##*@}"
|
|
|
|
;;
|
2006-08-27 19:27:48 +02:00
|
|
|
*)
|
|
|
|
echo ${c:=common}
|
|
|
|
return
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Query NetFilter about the existence of a filter chain
|
|
|
|
#
|
|
|
|
chain_exists() # $1 = chain name
|
|
|
|
{
|
|
|
|
qt $IPTABLES -L $1 -n
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Find the value 'dev' in the passed arguments then echo the next value
|
|
|
|
#
|
|
|
|
|
|
|
|
find_device() {
|
|
|
|
while [ $# -gt 1 ]; do
|
|
|
|
[ "x$1" = xdev ] && echo $2 && return
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Find the value 'via' in the passed arguments then echo the next value
|
|
|
|
#
|
|
|
|
|
|
|
|
find_gateway() {
|
|
|
|
while [ $# -gt 1 ]; do
|
|
|
|
[ "x$1" = xvia ] && echo $2 && return
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Find the value 'mtu' in the passed arguments then echo the next value
|
|
|
|
#
|
|
|
|
|
|
|
|
find_mtu() {
|
|
|
|
while [ $# -gt 1 ]; do
|
|
|
|
[ "x$1" = xmtu ] && echo $2 && return
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Find the value 'peer' in the passed arguments then echo the next value up to
|
|
|
|
# "/"
|
|
|
|
#
|
|
|
|
|
|
|
|
find_peer() {
|
|
|
|
while [ $# -gt 1 ]; do
|
|
|
|
[ "x$1" = xpeer ] && echo ${2%/*} && return
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Find the interfaces that have a route to the passed address - the default
|
|
|
|
# route is not used.
|
|
|
|
#
|
|
|
|
|
|
|
|
find_rt_interface() {
|
2007-07-22 15:44:06 +02:00
|
|
|
ip route list | while read addr rest; do
|
2006-08-27 19:27:48 +02:00
|
|
|
case $addr in
|
|
|
|
*/*)
|
|
|
|
in_network ${1%/*} $addr && echo $(find_device $rest)
|
|
|
|
;;
|
|
|
|
default)
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
if [ "$addr" = "$1" -o "$addr/32" = "$1" ]; then
|
|
|
|
echo $(find_device $rest)
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Try to find the gateway through an interface looking for 'nexthop'
|
|
|
|
|
|
|
|
find_nexthop() # $1 = interface
|
|
|
|
{
|
2007-07-22 15:44:06 +02:00
|
|
|
echo $(find_gateway `ip route list | grep "[[:space:]]nexthop.* $1"`)
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Find the default route's interface
|
|
|
|
#
|
|
|
|
find_default_interface() {
|
2007-07-22 15:44:06 +02:00
|
|
|
ip route list | while read first rest; do
|
2006-08-27 19:27:48 +02:00
|
|
|
[ "$first" = default ] && echo $(find_device $rest) && return
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Echo the name of the interface(s) that will be used to send to the
|
|
|
|
# passed address
|
|
|
|
#
|
|
|
|
|
|
|
|
find_interface_by_address() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local dev
|
|
|
|
dev="$(find_rt_interface $1)"
|
|
|
|
local first
|
|
|
|
local rest
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
[ -z "$dev" ] && dev=$(find_default_interface)
|
|
|
|
|
|
|
|
[ -n "$dev" ] && echo $dev
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Find the interface with the passed MAC address
|
|
|
|
#
|
|
|
|
|
|
|
|
find_interface_by_mac() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local mac
|
2008-03-14 04:33:32 +01:00
|
|
|
mac=$1
|
|
|
|
local first
|
|
|
|
local second
|
|
|
|
local rest
|
|
|
|
local dev
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2007-07-22 15:44:06 +02:00
|
|
|
ip link list | while read first second rest; do
|
2006-08-27 19:27:48 +02:00
|
|
|
case $first in
|
|
|
|
*:)
|
|
|
|
dev=$second
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
if [ "$second" = $mac ]; then
|
|
|
|
echo ${dev%:}
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Determine if Interface is up
|
|
|
|
#
|
|
|
|
interface_is_up() {
|
2007-07-22 15:44:06 +02:00
|
|
|
[ -n "$(ip link list dev $1 2> /dev/null | grep -e '[<,]UP[,>]')" ]
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Find interface address--returns the first IP address assigned to the passed
|
|
|
|
# device
|
|
|
|
#
|
|
|
|
find_first_interface_address() # $1 = interface
|
|
|
|
{
|
|
|
|
#
|
|
|
|
# get the line of output containing the first IP address
|
|
|
|
#
|
|
|
|
addr=$(ip -f inet addr show $1 2> /dev/null | grep 'inet .* global' | head -n1)
|
|
|
|
#
|
|
|
|
# If there wasn't one, bail out now
|
|
|
|
#
|
|
|
|
[ -n "$addr" ] || fatal_error "Can't determine the IP address of $1"
|
|
|
|
#
|
|
|
|
# Strip off the trailing VLSM mask (or the peer IP in case of a P-t-P link)
|
|
|
|
# along with everything else on the line
|
|
|
|
#
|
|
|
|
echo $addr | sed 's/\s*inet //;s/\/.*//;s/ peer.*//'
|
|
|
|
}
|
|
|
|
|
|
|
|
find_first_interface_address_if_any() # $1 = interface
|
|
|
|
{
|
|
|
|
#
|
|
|
|
# get the line of output containing the first IP address
|
|
|
|
#
|
|
|
|
addr=$(ip -f inet addr show $1 2> /dev/null | grep 'inet .* global' | head -n1)
|
|
|
|
#
|
|
|
|
# Strip off the trailing VLSM mask (or the peer IP in case of a P-t-P link)
|
|
|
|
# along with everything else on the line
|
|
|
|
#
|
|
|
|
[ -n "$addr" ] && echo $addr | sed 's/\s*inet //;s/\/.*//;s/ peer.*//' || echo 0.0.0.0
|
|
|
|
}
|
|
|
|
|
2006-10-31 20:01:23 +01:00
|
|
|
#
|
|
|
|
# Determine if interface is usable from a Netfilter prespective
|
|
|
|
#
|
|
|
|
interface_is_usable() # $1 = interface
|
|
|
|
{
|
2006-11-09 01:44:27 +01:00
|
|
|
interface_is_up $1 && [ "$(find_first_interface_address_if_any $1)" != 0.0.0.0 ]
|
2006-10-31 20:01:23 +01:00
|
|
|
}
|
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# Find interface addresses--returns the set of addresses assigned to the passed
|
|
|
|
# device
|
|
|
|
#
|
|
|
|
find_interface_addresses() # $1 = interface
|
|
|
|
{
|
2007-04-23 21:12:51 +02:00
|
|
|
ip -f inet addr show $1 2> /dev/null | grep inet\ | sed 's/\s*inet //;s/\/.*//;s/ peer.*//'
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# echo the list of networks routed out of a given interface
|
|
|
|
#
|
|
|
|
get_routed_networks() # $1 = interface name, $2-n = Fatal error message
|
|
|
|
{
|
|
|
|
local address
|
|
|
|
local rest
|
|
|
|
|
|
|
|
ip route show dev $1 2> /dev/null |
|
|
|
|
while read address rest; do
|
2007-05-19 18:06:01 +02:00
|
|
|
case "$address" in
|
|
|
|
default)
|
|
|
|
if [ $# -gt 1 ]; then
|
|
|
|
shift
|
|
|
|
fatal_error "$@"
|
|
|
|
else
|
2007-05-19 23:03:05 +02:00
|
|
|
echo "WARNING: default route ignored on interface $1" >&2
|
2007-05-19 18:06:01 +02:00
|
|
|
fi
|
|
|
|
;;
|
2007-05-20 17:14:40 +02:00
|
|
|
multicast|broadcast|prohibit|nat|throw|nexthop)
|
2007-05-19 18:06:01 +02:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
[ "$address" = "${address%/*}" ] && address="${address}/32"
|
|
|
|
echo $address
|
|
|
|
;;
|
|
|
|
esac
|
2006-08-27 19:27:48 +02:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2007-04-03 03:25:13 +02:00
|
|
|
get_interface_bcasts() # $1 = interface
|
|
|
|
{
|
|
|
|
ip -f inet addr show dev $1 2> /dev/null | grep 'inet.*brd' | sed 's/inet.*brd //; s/scope.*//;' | sort -u
|
|
|
|
}
|
2007-07-26 01:15:37 +02:00
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# Internal version of 'which'
|
|
|
|
#
|
|
|
|
mywhich() {
|
|
|
|
local dir
|
|
|
|
|
|
|
|
for dir in $(split $PATH); do
|
|
|
|
if [ -x $dir/$1 ]; then
|
|
|
|
echo $dir/$1
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
return 2
|
|
|
|
}
|
2006-02-03 22:11:02 +01:00
|
|
|
|
2006-09-07 01:07:29 +02:00
|
|
|
#
|
|
|
|
# Set default config path
|
|
|
|
#
|
|
|
|
ensure_config_path() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local F
|
|
|
|
F=${SHAREDIR}/configpath
|
2006-09-07 01:07:29 +02:00
|
|
|
if [ -z "$CONFIG_PATH" ]; then
|
|
|
|
[ -f $F ] || { echo " ERROR: $F does not exist"; exit 2; }
|
|
|
|
. $F
|
|
|
|
fi
|
2006-12-10 17:06:11 +01:00
|
|
|
|
|
|
|
if [ -n "$SHOREWALL_DIR" ]; then
|
|
|
|
[ "${CONFIG_PATH%%:*}" = "$SHOREWALL_DIR" ] || CONFIG_PATH=$SHOREWALL_DIR:$CONFIG_PATH
|
|
|
|
fi
|
2006-09-07 01:07:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
2006-12-10 02:03:03 +01:00
|
|
|
# Find a File -- For relative file name, look in each ${CONFIG_PATH} then ${CONFDIR}
|
2006-09-07 01:07:29 +02:00
|
|
|
#
|
|
|
|
find_file()
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local saveifs
|
2008-03-14 03:33:23 +01:00
|
|
|
saveifs=
|
|
|
|
local directory
|
2006-09-07 01:07:29 +02:00
|
|
|
|
|
|
|
case $1 in
|
|
|
|
/*)
|
|
|
|
echo $1
|
|
|
|
;;
|
|
|
|
*)
|
2006-12-10 02:03:03 +01:00
|
|
|
for directory in $(split $CONFIG_PATH); do
|
|
|
|
if [ -f $directory/$1 ]; then
|
|
|
|
echo $directory/$1
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
echo ${CONFDIR}/$1
|
2006-09-07 01:07:29 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
2006-09-07 17:17:42 +02:00
|
|
|
#
|
|
|
|
# Get fully-qualified name of file
|
|
|
|
#
|
|
|
|
resolve_file() # $1 = file name
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local pwd
|
|
|
|
pwd=$PWD
|
2006-09-07 17:17:42 +02:00
|
|
|
|
|
|
|
case $1 in
|
|
|
|
/*)
|
|
|
|
echo $1
|
|
|
|
;;
|
2006-12-10 06:09:11 +01:00
|
|
|
.)
|
|
|
|
echo $pwd
|
|
|
|
;;
|
2006-09-07 17:17:42 +02:00
|
|
|
./*)
|
|
|
|
echo ${pwd}${1#.}
|
|
|
|
;;
|
2006-12-10 06:09:11 +01:00
|
|
|
..)
|
|
|
|
cd ..
|
|
|
|
echo $PWD
|
|
|
|
cd $pwd
|
|
|
|
;;
|
2006-09-07 17:17:42 +02:00
|
|
|
../*)
|
|
|
|
cd ..
|
|
|
|
resolve_file ${1#../}
|
|
|
|
cd $pwd
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo $pwd/$1
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
2007-02-08 17:51:40 +01:00
|
|
|
#
|
|
|
|
# Perform variable substitution on the passed argument and echo the result
|
|
|
|
#
|
|
|
|
expand() # $@ = contents of variable which may be the name of another variable
|
|
|
|
{
|
|
|
|
eval echo \"$@\"
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Function for including one file into another
|
|
|
|
#
|
|
|
|
INCLUDE() {
|
|
|
|
. $(find_file $(expand $@))
|
|
|
|
}
|
|
|
|
|
2006-08-22 22:20:42 +02:00
|
|
|
#
|
2006-08-27 19:27:48 +02:00
|
|
|
# Set the Shorewall state
|
2006-08-22 22:20:42 +02:00
|
|
|
#
|
2006-08-27 19:27:48 +02:00
|
|
|
set_state () # $1 = state
|
2006-08-22 22:20:42 +02:00
|
|
|
{
|
2006-08-27 19:27:48 +02:00
|
|
|
echo "$1 ($(date))" > ${VARDIR}/state
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Determine which optional facilities are supported by iptables/netfilter
|
|
|
|
#
|
|
|
|
determine_capabilities() {
|
|
|
|
qt $IPTABLES -t nat -L -n && NAT_ENABLED=Yes || NAT_ENABLED=
|
|
|
|
qt $IPTABLES -t mangle -L -n && MANGLE_ENABLED=Yes || MANGLE_ENABLED=
|
|
|
|
|
|
|
|
CONNTRACK_MATCH=
|
2008-10-14 21:37:35 +02:00
|
|
|
NEW_CONNTRACK_MATCH=
|
2006-08-27 19:27:48 +02:00
|
|
|
MULTIPORT=
|
|
|
|
XMULTIPORT=
|
|
|
|
POLICY_MATCH=
|
|
|
|
PHYSDEV_MATCH=
|
2007-11-16 00:24:54 +01:00
|
|
|
PHYSDEV_BRIDGE=
|
2006-08-27 19:27:48 +02:00
|
|
|
IPRANGE_MATCH=
|
|
|
|
RECENT_MATCH=
|
|
|
|
OWNER_MATCH=
|
|
|
|
IPSET_MATCH=
|
|
|
|
CONNMARK=
|
|
|
|
XCONNMARK=
|
|
|
|
CONNMARK_MATCH=
|
|
|
|
XCONNMARK_MATCH=
|
|
|
|
RAW_TABLE=
|
|
|
|
IPP2P_MATCH=
|
|
|
|
LENGTH_MATCH=
|
|
|
|
CLASSIFY_TARGET=
|
|
|
|
ENHANCED_REJECT=
|
|
|
|
USEPKTTYPE=
|
|
|
|
KLUDGEFREE=
|
|
|
|
MARK=
|
|
|
|
XMARK=
|
|
|
|
MANGLE_FORWARD=
|
2006-10-09 19:10:24 +02:00
|
|
|
COMMENTS=
|
2007-03-11 22:20:31 +01:00
|
|
|
ADDRTYPE=
|
2007-06-16 16:27:02 +02:00
|
|
|
TCPMSS_MATCH=
|
2007-08-26 17:09:27 +02:00
|
|
|
HASHLIMIT_MATCH=
|
|
|
|
NFQUEUE_TARGET=
|
2007-11-16 01:23:49 +01:00
|
|
|
REALM_MATCH=
|
2008-06-05 22:39:05 +02:00
|
|
|
HELPER_MATCH=
|
2008-10-08 18:54:08 +02:00
|
|
|
CONNLIMIT_MATCH=
|
2008-10-14 21:37:35 +02:00
|
|
|
TIME_MATCH=
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
chain=fooX$$
|
|
|
|
|
2007-12-17 23:36:08 +01:00
|
|
|
[ -n "$IPTABLES" ] || IPTABLES=$(mywhich iptables)
|
|
|
|
|
2007-12-18 21:59:11 +01:00
|
|
|
if [ -z "$IPTABLES" ]; then
|
|
|
|
echo " ERROR: No executable iptables binary can be found on your PATH" >&2
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -F $chain
|
|
|
|
qt $IPTABLES -X $chain
|
|
|
|
if ! $IPTABLES -N $chain; then
|
|
|
|
echo " ERROR: The command \"$IPTABLES -N $chain\" failed" >&2
|
2008-09-11 01:28:08 +02:00
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
if ! qt $IPTABLES -A $chain -m state --state ESTABLISHED,RELATED -j ACCEPT; then
|
|
|
|
echo " ERROR: Your kernel lacks connection tracking and/or state matching -- Shorewall will not run on this system" >&2
|
2007-12-18 21:59:11 +01:00
|
|
|
exit 1
|
2007-12-17 23:36:08 +01:00
|
|
|
fi
|
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -m conntrack --ctorigdst 192.168.1.1 -j ACCEPT && CONNTRACK_MATCH=Yes
|
2007-09-21 18:55:28 +02:00
|
|
|
|
2008-10-14 21:37:35 +02:00
|
|
|
if [ -n "$CONNTRACK_MATCH" ]; then
|
2008-10-22 04:14:45 +02:00
|
|
|
qt $IPTABLES -A $chain -m conntrack -p tcp --ctorigdstport 22 -j ACCEPT && NEW_CONNTRACK_MATCH=Yes
|
2008-10-14 21:37:35 +02:00
|
|
|
fi
|
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
if qt $IPTABLES -A $chain -p tcp -m multiport --dports 21,22 -j ACCEPT; then
|
2007-09-21 18:55:28 +02:00
|
|
|
MULTIPORT=Yes
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -p tcp -m multiport --sports 60 -m multiport --dports 99 -j ACCEPT && KLUDEFREE=Yes
|
2007-09-21 18:55:28 +02:00
|
|
|
fi
|
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -p tcp -m multiport --dports 21:22 -j ACCEPT && XMULTIPORT=Yes
|
|
|
|
qt $IPTABLES -A $chain -m policy --pol ipsec --mode tunnel --dir in -j ACCEPT && POLICY_MATCH=Yes
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
if qt $IPTABLES -A $chain -m physdev --physdev-out eth0 -j ACCEPT; then
|
2006-08-27 19:27:48 +02:00
|
|
|
PHYSDEV_MATCH=Yes
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -m physdev --physdev-is-bridged --physdev-in eth0 --physdev-out eth0 -j ACCEPT && PHYSDEV_BRIDGE=Yes
|
2007-09-21 18:55:28 +02:00
|
|
|
if [ -z "${KLUDGEFREE}" ]; then
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -m physdev --physdev-in eth0 -m physdev --physdev-out eth0 -j ACCEPT && KLUDGEFREE=Yes
|
2007-09-21 18:55:28 +02:00
|
|
|
fi
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
if qt $IPTABLES -A $chain -m iprange --src-range 192.168.1.5-192.168.1.124 -j ACCEPT; then
|
2006-08-27 19:27:48 +02:00
|
|
|
IPRANGE_MATCH=Yes
|
|
|
|
if [ -z "${KLUDGEFREE}" ]; then
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -m iprange --src-range 192.168.1.5-192.168.1.124 -m iprange --dst-range 192.168.1.5-192.168.1.124 -j ACCEPT && KLUDGEFREE=Yes
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -m recent --update -j ACCEPT && RECENT_MATCH=Yes
|
|
|
|
qt $IPTABLES -A $chain -m owner --uid-owner 0 -j ACCEPT && OWNER_MATCH=Yes
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
if qt $IPTABLES -A $chain -m connmark --mark 2 -j ACCEPT; then
|
2006-08-27 19:27:48 +02:00
|
|
|
CONNMARK_MATCH=Yes
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -m connmark --mark 2/0xFF -j ACCEPT && XCONNMARK_MATCH=Yes
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
2006-08-22 22:20:42 +02:00
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -p tcp -m ipp2p --ipp2p -j ACCEPT && IPP2P_MATCH=Yes
|
|
|
|
qt $IPTABLES -A $chain -m length --length 10:20 -j ACCEPT && LENGTH_MATCH=Yes
|
|
|
|
qt $IPTABLES -A $chain -j REJECT --reject-with icmp-host-prohibited && ENHANCED_REJECT=Yes
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -j ACCEPT -m comment --comment "This is a comment" && COMMENTS=Yes
|
2006-10-09 19:10:24 +02:00
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
if [ -n "$MANGLE_ENABLED" ]; then
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -t mangle -N $chain
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
if qt $IPTABLES -t mangle -A $chain -j MARK --set-mark 1; then
|
2006-08-27 19:27:48 +02:00
|
|
|
MARK=Yes
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -t mangle -A $chain -j MARK --and-mark 0xFF && XMARK=Yes
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
if qt $IPTABLES -t mangle -A $chain -j CONNMARK --save-mark; then
|
2006-08-27 19:27:48 +02:00
|
|
|
CONNMARK=Yes
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -t mangle -A $chain -j CONNMARK --save-mark --mask 0xFF && XCONNMARK=Yes
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -t mangle -A $chain -j CLASSIFY --set-class 1:1 && CLASSIFY_TARGET=Yes
|
|
|
|
qt $IPTABLES -t mangle -F $chain
|
|
|
|
qt $IPTABLES -t mangle -X $chain
|
2006-08-27 19:27:48 +02:00
|
|
|
qt $IPTABLES -t mangle -L FORWARD -n && MANGLE_FORWARD=Yes
|
|
|
|
fi
|
|
|
|
|
|
|
|
qt $IPTABLES -t raw -L -n && RAW_TABLE=Yes
|
|
|
|
|
|
|
|
if qt mywhich ipset; then
|
2007-12-17 23:52:34 +01:00
|
|
|
qt ipset -X $chain # Just in case something went wrong the last time
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
if qt ipset -N $chain iphash ; then
|
|
|
|
if qt $IPTABLES -A $chain -m set --set $chain src -j ACCEPT; then
|
|
|
|
qt $IPTABLES -D $chain -m set --set $chain src -j ACCEPT
|
2006-08-27 19:27:48 +02:00
|
|
|
IPSET_MATCH=Yes
|
|
|
|
fi
|
2007-12-17 23:52:34 +01:00
|
|
|
qt ipset -X $chain
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -A $chain -m pkttype --pkt-type broadcast -j ACCEPT && USEPKTTYPE=Yes
|
|
|
|
qt $IPTABLES -A $chain -m addrtype --src-type BROADCAST -j ACCEPT && ADDRTYPE=Yes
|
|
|
|
qt $IPTABLES -A $chain -p tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1000:1500 -j ACCEPT && TCPMSS_MATCH=Yes
|
|
|
|
qt $IPTABLES -A $chain -m hashlimit --hashlimit 4 --hashlimit-burst 5 --hashlimit-name $chain --hashlimit-mode dstip -j ACCEPT && HASHLIMIT_MATCH=Yes
|
|
|
|
qt $IPTABLES -A $chain -j NFQUEUE --queue-num 4 && NFQUEUE_TARGET=Yes
|
|
|
|
qt $IPTABLES -A $chain -m realm --realm 4 && REALM_MATCH=Yes
|
2008-06-05 22:39:05 +02:00
|
|
|
qt $IPTABLES -A $chain -m helper --helper "ftp" && HELPER_MATCH=Yes
|
2008-10-08 18:54:08 +02:00
|
|
|
qt $IPTABLES -A $chain -m connlimit --connlimit-above 8 -j DROP && CONNLIMIT_MATCH=Yes
|
2008-10-14 21:37:35 +02:00
|
|
|
qt $IPTABLES -A $chain -m time --timestart 23:00 -j DROP && TIME_MATCH=Yes
|
2006-08-27 19:27:48 +02:00
|
|
|
|
2007-12-17 23:52:34 +01:00
|
|
|
qt $IPTABLES -F $chain
|
|
|
|
qt $IPTABLES -X $chain
|
2007-06-17 23:39:01 +02:00
|
|
|
|
|
|
|
CAPVERSION=$SHOREWALL_CAPVERSION
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
report_capabilities() {
|
|
|
|
report_capability() # $1 = Capability Description , $2 Capability Setting (if any)
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local setting
|
|
|
|
setting=
|
2006-10-31 20:01:23 +01:00
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
[ "x$2" = "xYes" ] && setting="Available" || setting="Not available"
|
2006-10-31 20:01:23 +01:00
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
echo " " $1: $setting
|
|
|
|
}
|
|
|
|
|
|
|
|
if [ $VERBOSE -gt 1 ]; then
|
|
|
|
echo "Shorewall has detected the following iptables/netfilter capabilities:"
|
|
|
|
report_capability "NAT" $NAT_ENABLED
|
|
|
|
report_capability "Packet Mangling" $MANGLE_ENABLED
|
|
|
|
report_capability "Multi-port Match" $MULTIPORT
|
|
|
|
[ -n "$MULTIPORT" ] && report_capability "Extended Multi-port Match" $XMULTIPORT
|
|
|
|
report_capability "Connection Tracking Match" $CONNTRACK_MATCH
|
2008-10-22 04:14:45 +02:00
|
|
|
report_capability "Extended Connection Tracking Match Support" $NEW_CONNTRACK_MATCH
|
2006-08-27 19:27:48 +02:00
|
|
|
report_capability "Packet Type Match" $USEPKTTYPE
|
|
|
|
report_capability "Policy Match" $POLICY_MATCH
|
|
|
|
report_capability "Physdev Match" $PHYSDEV_MATCH
|
2007-11-16 00:24:54 +01:00
|
|
|
report_capability "Physdev-is-bridged Support" $PHYSDEV_BRIDGE
|
2006-08-27 19:27:48 +02:00
|
|
|
report_capability "Packet length Match" $LENGTH_MATCH
|
|
|
|
report_capability "IP range Match" $IPRANGE_MATCH
|
|
|
|
report_capability "Recent Match" $RECENT_MATCH
|
|
|
|
report_capability "Owner Match" $OWNER_MATCH
|
|
|
|
report_capability "Ipset Match" $IPSET_MATCH
|
|
|
|
report_capability "CONNMARK Target" $CONNMARK
|
|
|
|
[ -n "$CONNMARK" ] && report_capability "Extended CONNMARK Target" $XCONNMARK
|
|
|
|
report_capability "Connmark Match" $CONNMARK_MATCH
|
|
|
|
[ -n "$CONNMARK_MATCH" ] && report_capability "Extended Connmark Match" $XCONNMARK_MATCH
|
|
|
|
report_capability "Raw Table" $RAW_TABLE
|
|
|
|
report_capability "IPP2P Match" $IPP2P_MATCH
|
|
|
|
report_capability "CLASSIFY Target" $CLASSIFY_TARGET
|
|
|
|
report_capability "Extended REJECT" $ENHANCED_REJECT
|
|
|
|
report_capability "Repeat match" $KLUDGEFREE
|
|
|
|
report_capability "MARK Target" $MARK
|
|
|
|
[ -n "$MARK" ] && report_capability "Extended MARK Target" $XMARK
|
|
|
|
report_capability "Mangle FORWARD Chain" $MANGLE_FORWARD
|
2006-10-09 19:10:24 +02:00
|
|
|
report_capability "Comments" $COMMENTS
|
2007-03-11 22:20:31 +01:00
|
|
|
report_capability "Address Type Match" $ADDRTYPE
|
2007-06-16 16:27:02 +02:00
|
|
|
report_capability "TCPMSS Match" $TCPMSS_MATCH
|
2007-08-26 17:09:27 +02:00
|
|
|
report_capability "Hashlimit Match" $HASHLIMIT_MATCH
|
|
|
|
report_capability "NFQUEUE Target" $NFQUEUE_TARGET
|
2007-11-16 01:23:49 +01:00
|
|
|
report_capability "Realm Match" $REALM_MATCH
|
2008-06-05 22:39:05 +02:00
|
|
|
report_capability "Helper Match" $HELPER_MATCH
|
2008-10-08 18:54:08 +02:00
|
|
|
report_capability "Connlimit Match" $CONNLIMIT_MATCH
|
2008-10-14 21:37:35 +02:00
|
|
|
report_capability "Time Match" $TIME_MATCH
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
[ -n "$PKTTYPE" ] || USEPKTTYPE=
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
report_capabilities1() {
|
|
|
|
report_capability1() # $1 = Capability
|
|
|
|
{
|
|
|
|
eval echo $1=\$$1
|
|
|
|
}
|
|
|
|
|
|
|
|
echo "#"
|
|
|
|
echo "# Shorewall $VERSION detected the following iptables/netfilter capabilities - $(date)"
|
|
|
|
echo "#"
|
|
|
|
report_capability1 NAT_ENABLED
|
|
|
|
report_capability1 MANGLE_ENABLED
|
|
|
|
report_capability1 MULTIPORT
|
|
|
|
report_capability1 XMULTIPORT
|
|
|
|
report_capability1 CONNTRACK_MATCH
|
2008-10-14 21:37:35 +02:00
|
|
|
report_capability1 NEW_CONNTRACK_MATCH
|
2006-08-27 19:27:48 +02:00
|
|
|
report_capability1 USEPKTTYPE
|
|
|
|
report_capability1 POLICY_MATCH
|
|
|
|
report_capability1 PHYSDEV_MATCH
|
2007-11-16 00:24:54 +01:00
|
|
|
report_capability1 PHYSDEV_BRIDGE
|
2006-08-27 19:27:48 +02:00
|
|
|
report_capability1 LENGTH_MATCH
|
|
|
|
report_capability1 IPRANGE_MATCH
|
|
|
|
report_capability1 RECENT_MATCH
|
|
|
|
report_capability1 OWNER_MATCH
|
|
|
|
report_capability1 IPSET_MATCH
|
|
|
|
report_capability1 CONNMARK
|
|
|
|
report_capability1 XCONNMARK
|
|
|
|
report_capability1 CONNMARK_MATCH
|
|
|
|
report_capability1 XCONNMARK_MATCH
|
|
|
|
report_capability1 RAW_TABLE
|
|
|
|
report_capability1 IPP2P_MATCH
|
|
|
|
report_capability1 CLASSIFY_TARGET
|
|
|
|
report_capability1 ENHANCED_REJECT
|
|
|
|
report_capability1 KLUDGEFREE
|
|
|
|
report_capability1 MARK
|
|
|
|
report_capability1 XMARK
|
|
|
|
report_capability1 MANGLE_FORWARD
|
2006-10-09 19:10:24 +02:00
|
|
|
report_capability1 COMMENTS
|
2007-03-11 22:20:31 +01:00
|
|
|
report_capability1 ADDRTYPE
|
2007-08-26 17:09:27 +02:00
|
|
|
report_capability1 TCPMSS_MATCH
|
|
|
|
report_capability1 HASHLIMIT_MATCH
|
|
|
|
report_capability1 NFQUEUE_TARGET
|
2007-11-16 01:23:49 +01:00
|
|
|
report_capability1 REALM_MATCH
|
2008-10-08 18:54:08 +02:00
|
|
|
report_capability1 HELPER_MATCH
|
|
|
|
report_capability1 CONNLIMIT_MATCH
|
2008-10-14 21:37:35 +02:00
|
|
|
report_capability1 TIME_MATCH
|
2007-06-17 23:39:01 +02:00
|
|
|
|
|
|
|
echo CAPVERSION=$SHOREWALL_CAPVERSION
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Delete IP address
|
|
|
|
#
|
|
|
|
del_ip_addr() # $1 = address, $2 = interface
|
|
|
|
{
|
|
|
|
[ $(find_first_interface_address_if_any $2) = $1 ] || qt ip addr del $1 dev $2
|
|
|
|
}
|
|
|
|
|
|
|
|
# Add IP Aliases
|
|
|
|
#
|
|
|
|
add_ip_aliases() # $* = List of addresses
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local addresses
|
|
|
|
local external
|
|
|
|
local interface
|
|
|
|
local inet
|
|
|
|
local cidr
|
|
|
|
local rest
|
|
|
|
local val1
|
|
|
|
local arping
|
|
|
|
arping=$(mywhich arping)
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
address_details()
|
|
|
|
{
|
|
|
|
#
|
|
|
|
# Folks feel uneasy if they don't see all of the same
|
|
|
|
# decoration on these IP addresses that they see when their
|
|
|
|
# distro's net config tool adds them. In an attempt to reduce
|
|
|
|
# the anxiety level, we have the following code which sets
|
|
|
|
# the VLSM and BRD from an existing address in the same networks
|
|
|
|
#
|
|
|
|
# Get all of the lines that contain inet addresses with broadcast
|
|
|
|
#
|
|
|
|
ip -f inet addr show $interface 2> /dev/null | grep 'inet.*brd' | while read inet cidr rest ; do
|
|
|
|
case $cidr in
|
|
|
|
*/*)
|
|
|
|
if in_network $external $cidr; then
|
|
|
|
echo "/${cidr#*/} brd $(broadcastaddress $cidr)"
|
|
|
|
break
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
do_one()
|
|
|
|
{
|
|
|
|
val=$(address_details)
|
2006-08-23 01:31:27 +02:00
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
ip addr add ${external}${val} dev $interface $label
|
|
|
|
[ -n "$arping" ] && qt $arping -U -c 2 -I $interface $external
|
2007-04-26 21:28:47 +02:00
|
|
|
echo "$external $interface" >> $VARDIR/nat
|
2006-08-27 19:27:48 +02:00
|
|
|
[ -n "$label" ] && label="with $label"
|
|
|
|
progress_message " IP Address $external added to interface $interface $label"
|
|
|
|
}
|
|
|
|
|
|
|
|
progress_message "Adding IP Addresses..."
|
|
|
|
|
|
|
|
while [ $# -gt 0 ]; do
|
|
|
|
external=$1
|
|
|
|
interface=$2
|
|
|
|
label=
|
|
|
|
|
|
|
|
if [ "$interface" != "${interface%:*}" ]; then
|
|
|
|
label="${interface#*:}"
|
|
|
|
interface="${interface%:*}"
|
|
|
|
label="label $interface:$label"
|
|
|
|
fi
|
|
|
|
|
|
|
|
shift 2
|
|
|
|
|
|
|
|
list_search $external $(find_interface_addresses $interface) || do_one
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
detect_gateway() # $1 = interface
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local interface
|
|
|
|
interface=$1
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# First assume that this is some sort of point-to-point interface
|
|
|
|
#
|
2007-07-22 15:44:06 +02:00
|
|
|
gateway=$( find_peer $(ip addr list $interface ) )
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# Maybe there's a default route through this gateway already
|
|
|
|
#
|
2007-07-22 15:44:06 +02:00
|
|
|
[ -n "$gateway" ] || gateway=$(find_gateway $(ip route list dev $interface))
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# Last hope -- is there a load-balancing route through the interface?
|
|
|
|
#
|
|
|
|
[ -n "$gateway" ] || gateway=$(find_nexthop $interface)
|
|
|
|
#
|
|
|
|
# Be sure we found one
|
|
|
|
#
|
|
|
|
[ -n "$gateway" ] && echo $gateway
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Disable IPV6
|
|
|
|
#
|
|
|
|
disable_ipv6() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local foo
|
|
|
|
foo="$(ip -f inet6 addr list 2> /dev/null)"
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
if [ -n "$foo" ]; then
|
|
|
|
if qt mywhich ip6tables; then
|
|
|
|
ip6tables -P FORWARD DROP
|
|
|
|
ip6tables -P INPUT DROP
|
|
|
|
ip6tables -P OUTPUT DROP
|
|
|
|
ip6tables -F
|
|
|
|
ip6tables -X
|
|
|
|
ip6tables -A OUTPUT -o lo -j ACCEPT
|
|
|
|
ip6tables -A INPUT -i lo -j ACCEPT
|
2006-08-22 22:20:42 +02:00
|
|
|
else
|
2006-08-27 19:27:48 +02:00
|
|
|
error_message "WARNING: DISABLE_IPV6=Yes in shorewall.conf but this system does not appear to have ip6tables"
|
2006-08-22 22:20:42 +02:00
|
|
|
fi
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
2006-08-22 22:20:42 +02:00
|
|
|
}
|
|
|
|
|
2007-03-12 02:05:46 +01:00
|
|
|
# Function to truncate a string -- It uses 'cut -b -<n>'
|
|
|
|
# rather than ${v:first:last} because light-weight shells like ash and
|
|
|
|
# dash do not support that form of expansion.
|
|
|
|
#
|
|
|
|
|
|
|
|
truncate() # $1 = length
|
|
|
|
{
|
|
|
|
cut -b -${1}
|
|
|
|
}
|
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
|
|
|
# Add a logging rule.
|
|
|
|
#
|
2006-11-08 01:16:30 +01:00
|
|
|
do_log_rule_limit() # $1 = log level, $2 = chain, $3 = display Chain $4 = disposition , $5 = rate limit $6=log tag $7=command $... = predicates for the rule
|
2006-08-27 19:27:48 +02:00
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local level
|
|
|
|
level=$1
|
|
|
|
local chain
|
|
|
|
chain=$2
|
|
|
|
local displayChain
|
|
|
|
displayChain=$3
|
|
|
|
local disposition
|
|
|
|
disposition=$4
|
|
|
|
local rulenum
|
|
|
|
rulenum=
|
|
|
|
local limit
|
|
|
|
limit=
|
|
|
|
local tag
|
|
|
|
tag=
|
|
|
|
local command
|
|
|
|
command=
|
2006-08-27 19:27:48 +02:00
|
|
|
local prefix
|
2008-03-14 03:07:28 +01:00
|
|
|
local base
|
|
|
|
base=$(chain_base $displayChain)
|
2006-11-08 17:30:25 +01:00
|
|
|
local pf
|
2006-06-09 18:35:55 +02:00
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
limit="${5:-$LOGLIMIT}" # Do this here rather than in the declaration above to appease /bin/ash.
|
2006-12-26 21:31:40 +01:00
|
|
|
tag=${6:+$6 }
|
|
|
|
command=${7:--A}
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
shift 7
|
|
|
|
|
|
|
|
if [ -n "$tag" -a -n "$LOGTAGONLY" ]; then
|
|
|
|
displayChain=$tag
|
|
|
|
tag=
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$LOGRULENUMBERS" ]; then
|
2006-11-08 17:30:25 +01:00
|
|
|
#
|
|
|
|
# Hack for broken printf on some lightweight shells
|
|
|
|
#
|
|
|
|
[ $(printf "%d" 1) = "1" ] && pf=printf || pf=$(mywhich printf)
|
|
|
|
|
2006-08-27 19:27:48 +02:00
|
|
|
eval rulenum=\$${base}_logrules
|
|
|
|
|
|
|
|
rulenum=${rulenum:-1}
|
|
|
|
|
2006-11-08 17:30:25 +01:00
|
|
|
prefix="$($pf "$LOGFORMAT" $displayChain $rulenum $disposition)${tag}"
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
rulenum=$(($rulenum + 1))
|
|
|
|
eval ${base}_logrules=$rulenum
|
|
|
|
else
|
|
|
|
prefix="$(printf "$LOGFORMAT" $displayChain $disposition)${tag}"
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ ${#prefix} -gt 29 ]; then
|
2007-08-26 17:09:27 +02:00
|
|
|
prefix="`echo "$prefix" | truncate 28` "
|
2006-08-27 19:27:48 +02:00
|
|
|
error_message "WARNING: Log Prefix shortened to \"$prefix\""
|
|
|
|
fi
|
|
|
|
|
|
|
|
case $level in
|
|
|
|
ULOG)
|
2006-11-08 01:16:30 +01:00
|
|
|
$IPTABLES $command $chain $@ $limit -j ULOG $LOGPARMS --ulog-prefix "$prefix"
|
2006-08-27 19:27:48 +02:00
|
|
|
;;
|
|
|
|
*)
|
2006-11-08 01:16:30 +01:00
|
|
|
$IPTABLES $command $chain $@ $limit -j LOG $LOGPARMS --log-level $level --log-prefix "$prefix"
|
2006-08-27 19:27:48 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
if [ $? -ne 0 ] ; then
|
|
|
|
[ -z "$STOPPING" ] && { stop_firewall; exit 2; }
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2006-11-08 01:16:30 +01:00
|
|
|
do_log_rule() # $1 = log level, $2 = chain, $3 = disposition , $... = predicates for the rule
|
2006-08-27 19:27:48 +02:00
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local level
|
|
|
|
level=$1
|
|
|
|
local chain
|
|
|
|
chain=$2
|
|
|
|
local disposition
|
|
|
|
disposition=$3
|
2006-08-27 19:27:48 +02:00
|
|
|
|
|
|
|
shift 3
|
|
|
|
|
2006-11-08 01:16:30 +01:00
|
|
|
do_log_rule_limit $level $chain $chain $disposition "$LOGLIMIT" "" -A $@
|
2006-08-27 19:27:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
delete_tc1()
|
|
|
|
{
|
|
|
|
clear_one_tc() {
|
|
|
|
tc qdisc del dev $1 root 2> /dev/null
|
|
|
|
tc qdisc del dev $1 ingress 2> /dev/null
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
run_user_exit tcclear
|
|
|
|
|
|
|
|
run_ip link list | \
|
|
|
|
while read inx interface details; do
|
|
|
|
case $inx in
|
|
|
|
[0-9]*)
|
|
|
|
clear_one_tc ${interface%:}
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
2007-04-11 22:51:36 +02:00
|
|
|
# Detect a device's MTU -- echos the passed device's MTU
|
2006-08-27 19:27:48 +02:00
|
|
|
#
|
2006-09-07 17:17:42 +02:00
|
|
|
get_device_mtu() # $1 = device
|
2006-08-27 19:27:48 +02:00
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local output
|
|
|
|
output="$(ip link list dev $1 2> /dev/null)" # quotes required for /bin/ash
|
2006-01-12 19:21:16 +01:00
|
|
|
|
2006-09-07 17:17:42 +02:00
|
|
|
if [ -n "$output" ]; then
|
|
|
|
echo $(find_mtu $output)
|
2006-08-27 19:27:48 +02:00
|
|
|
else
|
2006-09-07 17:17:42 +02:00
|
|
|
echo 1500
|
2006-08-27 19:27:48 +02:00
|
|
|
fi
|
|
|
|
}
|
2006-10-29 18:19:11 +01:00
|
|
|
|
2007-04-11 20:36:10 +02:00
|
|
|
#
|
2007-04-11 22:51:36 +02:00
|
|
|
# Version of the above that doesn't generate any output for MTU 1500.
|
|
|
|
# Generates 'mtu <mtu+>' otherwise, where <mtu+> is the device's MTU + 100
|
2007-04-11 20:36:10 +02:00
|
|
|
#
|
|
|
|
get_device_mtu1() # $1 = device
|
|
|
|
{
|
2008-03-14 03:07:28 +01:00
|
|
|
local output
|
|
|
|
output="$(ip link list dev $1 2> /dev/null)" # quotes required for /bin/ash
|
2007-04-11 20:36:10 +02:00
|
|
|
local mtu
|
|
|
|
|
|
|
|
if [ -n "$output" ]; then
|
|
|
|
mtu=$(find_mtu $output)
|
|
|
|
if [ -n "$mtu" ]; then
|
|
|
|
[ $mtu = 1500 ] || echo mtu $(($mtu + 100))
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2006-10-29 18:19:11 +01:00
|
|
|
#
|
|
|
|
# Undo changes to routing
|
|
|
|
#
|
|
|
|
undo_routing() {
|
2006-10-31 20:01:23 +01:00
|
|
|
|
2006-10-30 20:17:20 +01:00
|
|
|
if [ -z "$NOROUTES" ]; then
|
|
|
|
#
|
|
|
|
# Restore rt_tables database
|
|
|
|
#
|
|
|
|
if [ -f ${VARDIR}/rt_tables ]; then
|
2007-08-16 18:08:53 +02:00
|
|
|
[ -w /etc/iproute2/rt_table -a -z "$KEEP_RT_TABLES" ] && cp -f ${VARDIR}/rt_tables /etc/iproute2/ && progress_message "/etc/iproute2/rt_tables database restored"
|
2006-10-30 20:17:20 +01:00
|
|
|
rm -f ${VARDIR}/rt_tables
|
|
|
|
fi
|
|
|
|
#
|
|
|
|
# Restore the rest of the routing table
|
|
|
|
#
|
|
|
|
if [ -f ${VARDIR}/undo_routing ]; then
|
|
|
|
. ${VARDIR}/undo_routing
|
|
|
|
progress_message "Shorewall-generated routing tables and routing rules removed"
|
|
|
|
rm -f ${VARDIR}/undo_routing
|
|
|
|
fi
|
2006-10-30 17:15:55 +01:00
|
|
|
fi
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
restore_default_route() {
|
2006-10-30 20:17:20 +01:00
|
|
|
if [ -z "$NOROUTES" -a -f ${VARDIR}/default_route ]; then
|
2008-03-14 03:07:28 +01:00
|
|
|
local default_route
|
|
|
|
default_route=
|
|
|
|
local route
|
2006-10-30 17:15:55 +01:00
|
|
|
|
|
|
|
while read route ; do
|
|
|
|
case $route in
|
|
|
|
default*)
|
|
|
|
if [ -n "$default_route" ]; then
|
|
|
|
case "$default_route" in
|
2006-10-30 20:24:31 +01:00
|
|
|
*metric*)
|
2006-10-30 17:15:55 +01:00
|
|
|
#
|
|
|
|
# Don't restore a route with a metric -- we only replace the one with metric == 0
|
|
|
|
#
|
|
|
|
qt ip route delete default metric 0 && \
|
|
|
|
progress_message "Default Route with metric 0 deleted"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
qt ip route replace $default_route && \
|
|
|
|
progress_message "Default Route (${default_route# }) restored"
|
|
|
|
;;
|
|
|
|
esac
|
2006-10-31 20:01:23 +01:00
|
|
|
|
2006-10-30 17:15:55 +01:00
|
|
|
break
|
|
|
|
fi
|
2006-10-31 20:01:23 +01:00
|
|
|
|
2006-10-30 17:15:55 +01:00
|
|
|
default_route="$default_route $route"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
default_route="$default_route $route"
|
2006-10-29 19:21:18 +01:00
|
|
|
;;
|
|
|
|
esac
|
2006-10-30 17:15:55 +01:00
|
|
|
done < ${VARDIR}/default_route
|
2006-10-31 20:01:23 +01:00
|
|
|
|
2006-10-30 17:15:55 +01:00
|
|
|
rm -f ${VARDIR}/default_route
|
2006-10-29 18:19:11 +01:00
|
|
|
fi
|
|
|
|
}
|
2006-10-31 22:50:21 +01:00
|
|
|
|
|
|
|
#
|
|
|
|
# Determine how to do "echo -e"
|
2006-11-01 01:29:10 +01:00
|
|
|
#
|
2006-10-31 22:50:21 +01:00
|
|
|
|
|
|
|
find_echo() {
|
|
|
|
local result
|
|
|
|
|
|
|
|
result=$(echo "a\tb")
|
2006-11-01 01:29:10 +01:00
|
|
|
[ ${#result} -eq 3 ] && { echo echo; return; }
|
2006-10-31 22:50:21 +01:00
|
|
|
|
|
|
|
result=$(echo -e "a\tb")
|
2006-11-01 01:29:10 +01:00
|
|
|
[ ${#result} -eq 3 ] && { echo "echo -e"; return; }
|
2006-10-31 22:50:21 +01:00
|
|
|
|
|
|
|
result=$(which echo)
|
2006-11-01 01:29:10 +01:00
|
|
|
[ -n "$result" ] && { echo "$result -e"; return; }
|
2006-10-31 22:50:21 +01:00
|
|
|
|
|
|
|
echo echo
|
|
|
|
}
|
2007-03-22 15:53:57 +01:00
|
|
|
|
|
|
|
# Determine which version of mktemp is present (if any) and set MKTEMP accortingly:
|
|
|
|
#
|
|
|
|
# None - No mktemp
|
|
|
|
# BSD - BSD mktemp (Mandrake)
|
|
|
|
# STD - mktemp.org mktemp
|
|
|
|
#
|
|
|
|
find_mktemp() {
|
2008-03-14 03:07:28 +01:00
|
|
|
local mktemp
|
|
|
|
mktemp=`mywhich mktemp 2> /dev/null`
|
2007-03-22 15:53:57 +01:00
|
|
|
|
|
|
|
if [ -n "$mktemp" ]; then
|
|
|
|
if qt mktemp -V ; then
|
|
|
|
MKTEMP=STD
|
|
|
|
else
|
|
|
|
MKTEMP=BSD
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
MKTEMP=None
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# create a temporary file. If a directory name is passed, the file will be created in
|
|
|
|
# that directory. Otherwise, it will be created in a temporary directory.
|
|
|
|
#
|
|
|
|
mktempfile() {
|
|
|
|
|
|
|
|
[ -z "$MKTEMP" ] && find_mktemp
|
|
|
|
|
|
|
|
if [ $# -gt 0 ]; then
|
|
|
|
case "$MKTEMP" in
|
|
|
|
BSD)
|
|
|
|
mktemp $1/shorewall.XXXXXX
|
|
|
|
;;
|
|
|
|
STD)
|
|
|
|
mktemp -p $1 shorewall.XXXXXX
|
|
|
|
;;
|
|
|
|
None)
|
|
|
|
> $1/shorewall-$$ && echo $1/shorewall-$$
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
error_message "ERROR:Internal error in mktempfile"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
else
|
|
|
|
case "$MKTEMP" in
|
|
|
|
BSD)
|
|
|
|
mktemp /tmp/shorewall.XXXXXX
|
|
|
|
;;
|
|
|
|
STD)
|
|
|
|
mktemp -t shorewall.XXXXXX
|
|
|
|
;;
|
|
|
|
None)
|
|
|
|
rm -f /tmp/shorewall-$$
|
|
|
|
> /tmp/shorewall-$$ && echo /tmp/shorewall-$$
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
error_message "ERROR:Internal error in mktempfile"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
}
|