From 244b5170d0ad5be5bf1ef64b98532fa63e8538b8 Mon Sep 17 00:00:00 2001 From: teastep Date: Tue, 17 May 2005 19:02:12 +0000 Subject: [PATCH] ROUTES git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2130 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb --- Shorewall2/firewall | 147 +++++++++++++++++++++--------------- Shorewall2/interfaces | 19 ++--- Shorewall2/releasenotes.txt | 3 +- 3 files changed, 95 insertions(+), 74 deletions(-) diff --git a/Shorewall2/firewall b/Shorewall2/firewall index 454f3de85..93c36b880 100755 --- a/Shorewall2/firewall +++ b/Shorewall2/firewall @@ -974,9 +974,9 @@ validate_interfaces_file() { local found_obsolete_option= local z interface networks options r iface option - while read z interface networks options; do - expandv z interface networks options - r="$z $interface $networks $options" + while read z interface networks options gateway; do + expandv z interface networks options gateway + r="$z $interface $networks $options gateway" [ "x$z" = "x-" ] && z= @@ -1040,6 +1040,13 @@ validate_interfaces_file() { esac done + if [ -n "$gateway" ]; then + if ! list_search default $options; then + error_message "Warning: GATEWAY ignored when the 'default' option is not given: \"$r\"" + fi + + eval ${iface}_gateway=$gateway + fi done < $TMP_DIR/interfaces [ -z "$ALL_INTERFACES" ] && startup_error "No Interfaces Defined" @@ -5428,22 +5435,48 @@ add_a_route() progress_message " Routing Rule \"$rule\" Added." } -# -# Create routing chains -# -create_routing_chains() -{ - run_iptables -t mangle -N routefwd - run_iptables -t mangle -A FORWARD -j routefwd - run_iptables -t mangle -N routeout - run_iptables -t mangle -A OUTPUT -j routeout -} # # Set up Routing # setup_routes() # $1 = file name { + local created_chains= + # + # Create routing chains + # + create_routing_chains() + { + if [ -z "$created_chains" ]; then + run_iptables -t mangle -N routefwd + run_iptables -t mangle -A FORWARD -j routefwd + run_iptables -t mangle -N routeout + run_iptables -t mangle -A OUTPUT -j routeout + run_iptables -t mangle -A PREROUTING -m connmark ! --mark 0 -j CONNMARK --restore-mark + created_chains=Yes + fi + } + + # + # Duplicate routes for '$interface' from the main routing table to mangle table $chain + # Does not duplicate a default route but rather echo's the gateway from that route. + # + duplicate_routes() + { + ip route ls dev $interface 2> /dev/null | while read net rest; do + case $net in + default) + echo $(find_gateway $rest) + ;; + *) + for chain in routefwd routeout; do + run_iptables -t mangle -A $chain -d $net -o $interface -j RETURN + done + ;; + esac + done + } + strip_file routes $1 if [ -s $TMP_DIR/routes ]; then @@ -5458,9 +5491,42 @@ setup_routes() # $1 = file name rule="$source $dest $proto $port $sport testval $interface $gateway" add_a_route done < $TMP_DIR/routes - elif [ -n "$ROUTEMARK_INTERFACES" ]; then - create_routing_chains fi + + if [ -n "$ROUTEMARK_INTERFACES" ]; then + create_routing_chains + + run_iptables -t mangle -N routemark + + for interface in $ROUTEMARK_INTERFACES ; do + + iface=$(chain_base $interface) + eval mark_value=\$${iface}_routemark + + run_iptables -t mangle -A PREROUTING -i $interface -m mark --mark 0/3840 -j routemark + run_iptables -t mangle -A routemark -i $interface -j MARK --or-mark $mark_value + + eval gateway=\$$(chain_base $interface)_gateway + + temp=$(duplicate_routes) + + if [ -n "${gateway:=${temp}}" ]; then + for chain in routefwd routeout; do + for interface1 in $ROUTEMARK_INTERFACES; do + run_iptables -t mangle -A $chain -o $interface1 -m mark --mark $mark_value/3840 -j ROUTE --oif $interface --gw $gateway --continue + done + done + + progress_message " Default routing rule for dev $interface via $gateway Added" + else + fatal_error "No default gateway defined for interface $interface" + fi + done + + run_iptables -t mangle -A routemark -m mark ! --mark 0/3840 -j CONNMARK --save-mark --mask 3840 + run_iptables -t mangle -I POSTROUTING -j MARK --and-mark 255 + fi + } # @@ -6333,6 +6399,12 @@ initialize_netfilter () { # run_iptables -A INPUT -i lo -j ACCEPT run_iptables -A OUTPUT -o lo -j ACCEPT + + # + # [re]-Establish routing + # + + routes=$(find_file routes); setup_routes $routes # # Allow DNS lookups during startup for FQDNs @@ -7157,44 +7229,6 @@ activate_rules() done done - if [ -n "$CONNMARK" ]; then - run_iptables -t mangle -I PREROUTING -m connmark ! --mark 0 -j CONNMARK --restore-mark - fi - - if [ -n "$ROUTEMARK_INTERFACES" ]; then - run_iptables -t mangle -N routemark - - for interface in $ROUTEMARK_INTERFACES ; do - - iface=$(chain_base $interface) - eval mark_value=\$${iface}_routemark - - run_iptables -t mangle -A PREROUTING -i $interface -m mark --mark 0/3840 -j routemark - run_iptables -t mangle -A routemark -i $interface -j MARK --or-mark $mark_value - - ip route ls dev $interface 2> /dev/null | while read net rest; do - case $net in - default) - gateway=$(find_gateway $rest) - for chain in routefwd routeout; do - for interface1 in $ROUTEMARK_INTERFACES; do - run_iptables -t mangle -A $chain -o $interface1 -m mark --mark $mark_value/3840 -j ROUTE --oif $interface --gw $gateway --continue - done - done - ;; - *) - for chain in routefwd routeout; do - run_iptables -t mangle -A $chain -d $net -o $interface -j RETURN - done - ;; - esac - done - done - - run_iptables -t mangle -A routemark -m mark ! --mark 0/3840 -j CONNMARK --save-mark --mask 3840 - run_iptables -t mangle -I POSTROUTING -j MARK --and-mark 255 - fi - for interface in $ALL_INTERFACES ; do run_iptables -A FORWARD -i $interface -j $(forward_chain $interface) run_iptables -A INPUT -i $interface -j $(input_chain $interface) @@ -7342,13 +7376,6 @@ define_firewall() # $1 = Command (Start or Restart) [ -n "$TC_ENABLED" ] && setup_tc - routes=$(find_file routes) - if [ -f $routes ]; then - setup_routes $routes - elif [ -n "$ROUTEMARK_INTERFACES" ]; then - add_routing_chains - fi - echo "Activating Rules..."; activate_rules [ -n "$aliases_to_add" ] && \ diff --git a/Shorewall2/interfaces b/Shorewall2/interfaces index 8ed0031b9..623ab8bad 100644 --- a/Shorewall2/interfaces +++ b/Shorewall2/interfaces @@ -171,17 +171,6 @@ # upnp - Incoming requests from this interface may # be remapped via UPNP (upnpd). # -# default - This interface is one of two or more on the -# the firewall that have a default route. -# You should specify 'default' on all such -# interfaces, the interfaces should be up when -# Shorewall starts and each interface must have -# a default route configured in the main routing -# table. There are many restrictions on the use -# of this feature; see -# http://shorewall.net/Shorewall_and_Routing.html -# for details. -# # WARNING: DO NOT SET THE detectnets OPTION ON YOUR # INTERNET INTERFACE. # @@ -189,6 +178,12 @@ # significant but the list should have no embedded white # space. # +# GATEWAY This column is only meaningful if the 'default' OPTION +# is given -- it is ignored otherwise. You may specify +# the default gateway IP address for this interface here +# and Shorewall will use that IP address rather than any +# that it finds in the main routing table. +# # Example 1: Suppose you have eth0 connected to a DSL modem and # eth1 connected to your local network and that your # local subnet is 192.168.1.0/24. The interface gets @@ -217,6 +212,6 @@ # For additional information, see http://shorewall.net/Documentation.htm#Interfaces # ############################################################################## -#ZONE INTERFACE BROADCAST OPTIONS +#ZONE INTERFACE BROADCAST OPTIONS GATEWAY # #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE diff --git a/Shorewall2/releasenotes.txt b/Shorewall2/releasenotes.txt index c02171b91..99337aef4 100755 --- a/Shorewall2/releasenotes.txt +++ b/Shorewall2/releasenotes.txt @@ -103,9 +103,8 @@ New Features in version 2.3.2 - CONNMARK Target support and conntrack match support. Each interface with the 'default' option given must have a default - gateway route in the main routing table and must be up when + route in the main routing table and must be up when Shorewall is [re]started. - When you specify 'default' on two or more entries in /etc/shorewall/interfaces, replies to connections from these