2010-05-17 00:35:22 +02:00
|
|
|
#!/bin/sh
|
|
|
|
#
|
2015-09-06 19:02:41 +02:00
|
|
|
# The Shoreline Firewall (Shorewall) Packet Filtering Firewall - V5.0
|
2010-05-17 00:35:22 +02:00
|
|
|
#
|
|
|
|
# This program is under GPL [http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt]
|
|
|
|
#
|
2012-04-03 16:52:39 +02:00
|
|
|
# (c) 2010,2012 - Tom Eastep (teastep@shorewall.net)
|
2010-05-17 00:35:22 +02:00
|
|
|
#
|
|
|
|
# On most distributions, this file should be called /etc/init.d/shorewall.
|
|
|
|
#
|
|
|
|
# Complete documentation is available at http://shorewall.net
|
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or modify
|
|
|
|
# it under the terms of Version 2 of the GNU General Public License
|
|
|
|
# as published by the Free Software Foundation.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program; if not, write to the Free Software
|
|
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
|
|
#
|
|
|
|
### BEGIN INIT INFO
|
|
|
|
# Provides: shorewall-init
|
2010-05-26 01:02:57 +02:00
|
|
|
# Required-Start: $local_fs
|
2010-05-28 19:18:00 +02:00
|
|
|
# X-Start-Before: $network
|
|
|
|
# Required-Stop: $local_fs
|
|
|
|
# X-Stop-After: $network
|
2010-05-17 00:35:22 +02:00
|
|
|
# Default-Start: S
|
2016-07-04 23:37:00 +02:00
|
|
|
# Default-Stop: 0 1 6
|
2010-05-17 00:35:22 +02:00
|
|
|
# Short-Description: Initialize the firewall at boot time
|
|
|
|
# Description: Place the firewall in a safe state at boot time prior to
|
|
|
|
# bringing up the network
|
|
|
|
### END INIT INFO
|
|
|
|
|
2013-10-05 22:31:45 +02:00
|
|
|
. /lib/lsb/init-functions
|
|
|
|
|
2010-05-26 01:02:57 +02:00
|
|
|
export VERBOSITY=0
|
|
|
|
|
2010-05-17 00:35:22 +02:00
|
|
|
if [ "$(id -u)" != "0" ]
|
|
|
|
then
|
|
|
|
echo "You must be root to start, stop or restart \"Shorewall \"."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo_notdone () {
|
|
|
|
echo "not done."
|
|
|
|
exit 1
|
|
|
|
}
|
|
|
|
|
|
|
|
not_configured () {
|
2013-05-12 01:38:09 +02:00
|
|
|
echo "#### WARNING ####"
|
|
|
|
echo "the firewall won't be initialized unless it is configured"
|
|
|
|
if [ "$1" != "stop" ]
|
|
|
|
then
|
|
|
|
echo ""
|
|
|
|
echo "Please read about Debian specific customization in"
|
|
|
|
echo "/usr/share/doc/shorewall-init/README.Debian.gz."
|
|
|
|
fi
|
|
|
|
echo "#################"
|
|
|
|
exit 0
|
2010-05-17 00:35:22 +02:00
|
|
|
}
|
|
|
|
|
2012-09-02 22:43:43 +02:00
|
|
|
# set the STATEDIR variable
|
|
|
|
setstatedir() {
|
|
|
|
local statedir
|
2012-09-05 16:37:12 +02:00
|
|
|
if [ -f ${CONFDIR}/${PRODUCT}/vardir ]; then
|
|
|
|
statedir=$( . /${CONFDIR}/${PRODUCT}/vardir && echo $VARDIR )
|
2012-09-02 22:43:43 +02:00
|
|
|
fi
|
2012-09-05 16:37:12 +02:00
|
|
|
|
2014-11-24 08:43:32 +01:00
|
|
|
[ -n "$statedir" ] && STATEDIR=${statedir} || STATEDIR=${VARLIB}/${PRODUCT}
|
2012-09-02 22:43:43 +02:00
|
|
|
|
2016-12-01 00:04:40 +01:00
|
|
|
if [ $PRODUCT = shorewall ]; then
|
|
|
|
${SBINDIR}/shorewall compile
|
|
|
|
elif [ $PRODUCT = shorewall6 ]; then
|
|
|
|
${SBINDIR}/shorewall -6 compile
|
2015-05-07 21:31:46 +02:00
|
|
|
else
|
|
|
|
return 0
|
2012-09-02 22:43:43 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2012-03-31 01:21:37 +02:00
|
|
|
#
|
|
|
|
# The installer may alter this
|
|
|
|
#
|
|
|
|
. /usr/share/shorewall/shorewallrc
|
2012-03-24 21:05:39 +01:00
|
|
|
|
2010-05-17 00:35:22 +02:00
|
|
|
# check if shorewall-init is configured or not
|
2012-03-24 21:05:39 +01:00
|
|
|
if [ -f "$SYSCONFDIR/shorewall-init" ]
|
2010-05-17 00:35:22 +02:00
|
|
|
then
|
2013-05-12 01:38:09 +02:00
|
|
|
. $SYSCONFDIR/shorewall-init
|
|
|
|
if [ -z "$PRODUCTS" ]
|
|
|
|
then
|
2010-05-17 00:35:22 +02:00
|
|
|
not_configured
|
2013-05-12 01:38:09 +02:00
|
|
|
fi
|
|
|
|
else
|
|
|
|
not_configured
|
2010-05-17 00:35:22 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
# Initialize the firewall
|
|
|
|
shorewall_start () {
|
2012-09-02 19:23:11 +02:00
|
|
|
local PRODUCT
|
2012-09-02 22:43:43 +02:00
|
|
|
local STATEDIR
|
2010-05-17 00:35:22 +02:00
|
|
|
|
2016-12-28 20:09:08 +01:00
|
|
|
printf "Initializing \"Shorewall-based firewalls\": "
|
2013-05-12 01:38:09 +02:00
|
|
|
|
2012-09-02 19:23:11 +02:00
|
|
|
for PRODUCT in $PRODUCTS; do
|
2015-05-07 21:31:46 +02:00
|
|
|
if setstatedir; then
|
|
|
|
if [ -x ${STATEDIR}/firewall ]; then
|
|
|
|
#
|
|
|
|
# Run in a sub-shell to avoid name collisions
|
|
|
|
#
|
|
|
|
(
|
|
|
|
if ! ${STATEDIR}/firewall status > /dev/null 2>&1; then
|
|
|
|
${STATEDIR}/firewall ${OPTIONS} stop
|
|
|
|
fi
|
|
|
|
)
|
|
|
|
fi
|
2010-05-17 00:35:22 +02:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
2010-05-17 02:41:09 +02:00
|
|
|
echo "done."
|
|
|
|
|
2014-08-14 18:49:18 +02:00
|
|
|
if [ -n "$SAVE_IPSETS" -a -f "$SAVE_IPSETS" ]; then
|
|
|
|
|
2016-12-28 20:09:08 +01:00
|
|
|
printf "Restoring ipsets: "
|
2014-08-14 18:49:18 +02:00
|
|
|
|
|
|
|
if ! ipset -R < "$SAVE_IPSETS"; then
|
|
|
|
echo_notdone
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo "done."
|
|
|
|
fi
|
|
|
|
|
2010-05-17 00:35:22 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
# Clear the firewall
|
|
|
|
shorewall_stop () {
|
2012-09-02 19:23:11 +02:00
|
|
|
local PRODUCT
|
2013-08-24 18:37:56 +02:00
|
|
|
local STATEDIR
|
2010-05-17 00:35:22 +02:00
|
|
|
|
2016-12-28 20:09:08 +01:00
|
|
|
printf "Clearing \"Shorewall-based firewalls\": "
|
2012-09-02 19:23:11 +02:00
|
|
|
for PRODUCT in $PRODUCTS; do
|
2015-05-07 21:31:46 +02:00
|
|
|
if setstatedir; then
|
|
|
|
if [ -x ${STATEDIR}/firewall ]; then
|
|
|
|
${STATEDIR}/firewall ${OPTIONS} clear
|
|
|
|
fi
|
2010-05-17 00:35:22 +02:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
2010-05-17 02:41:09 +02:00
|
|
|
echo "done."
|
|
|
|
|
2014-08-14 18:49:18 +02:00
|
|
|
if [ -n "$SAVE_IPSETS" ]; then
|
|
|
|
|
|
|
|
echo "Saving ipsets: "
|
|
|
|
|
|
|
|
mkdir -p $(dirname "$SAVE_IPSETS")
|
|
|
|
if ipset -S > "${SAVE_IPSETS}.tmp"; then
|
2017-09-18 18:28:43 +02:00
|
|
|
grep -qE -- '^(-N|create )' "${SAVE_IPSETS}.tmp" && mv -f "${SAVE_IPSETS}.tmp" "$SAVE_IPSETS" || rm -f "${SAVE_IPSETS}.tmp"
|
2014-08-14 18:49:18 +02:00
|
|
|
else
|
2017-09-18 18:28:43 +02:00
|
|
|
rm -f "${SAVE_IPSETS}.tmp"
|
2014-08-14 18:49:18 +02:00
|
|
|
echo_notdone
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo "done."
|
|
|
|
fi
|
|
|
|
|
2010-05-17 00:35:22 +02:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
case "$1" in
|
|
|
|
start)
|
|
|
|
shorewall_start
|
|
|
|
;;
|
|
|
|
stop)
|
|
|
|
shorewall_stop
|
|
|
|
;;
|
2010-05-23 23:10:50 +02:00
|
|
|
reload|force-reload)
|
|
|
|
;;
|
2010-05-17 00:35:22 +02:00
|
|
|
*)
|
2013-05-12 01:38:09 +02:00
|
|
|
echo "Usage: $0 {start|stop|reload|force-reload}"
|
2010-05-17 00:35:22 +02:00
|
|
|
exit 1
|
|
|
|
esac
|
|
|
|
|
|
|
|
exit 0
|