mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-24 16:43:21 +01:00
Handle the case where a single host exclusion specifies multiple nets
Also reorganize the exclusion code to make it self-contained within add_common_rules() Signed-off-by: Tom Eastep <teastep@shorewall.net>
This commit is contained in:
parent
0855bc4187
commit
895428c7c1
@ -710,42 +710,6 @@ sub create_docker_rules() {
|
||||
|
||||
sub setup_mss();
|
||||
|
||||
sub add_ipset_dbl_ijump( $$$@) {
|
||||
my ( $chainref, $target, $ipset_dir ) = ( shift, shift, shift );
|
||||
|
||||
add_ijump_extended( $chainref, j => $target, $origin{DYNAMIC_BLACKLIST}, @_, "set --match-set" => $ipset_dir );
|
||||
}
|
||||
|
||||
sub add_host_exclusion_ijump( $$$@ ) {
|
||||
my ( $chainref, $dest, $hostref, $src ) = ( shift, shift, shift, shift );
|
||||
|
||||
my $nets = $hostref->{hosts};
|
||||
my $origin = $hostref->{origin};
|
||||
|
||||
for my $net ( @$nets ) {
|
||||
if ( $src ) {
|
||||
add_ijump_extended( $chainref , j => $dest, $origin, imatch_source_net( $net ), @_ )
|
||||
} else {
|
||||
add_ijump_extended( $chainref , j => $dest, $origin, imatch_dest_net( $net ), @_ );
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
sub add_dbl_exclusion_ijump( $$$$@ ) {
|
||||
my ( $chainref, $dest, $hostref, $ipset, $src ) = ( shift, shift, shift, shift, shift );
|
||||
|
||||
my $nets = $hostref->{hosts};
|
||||
my $origin = $hostref->{origin};
|
||||
|
||||
for my $net ( @$nets ) {
|
||||
if ( $src ) {
|
||||
add_ijump_extended( $chainref , j => $dest, $origin, imatch_source_net( "!$net" ), @_, "set --match-set" => "$ipset src" );
|
||||
} else {
|
||||
add_ijump_extended( $chainref , j => $dest, $origin, imatch_dest_net( "!$net" ), @_, "set --match-set" => "$ipset dst" );
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#
|
||||
# Add rules generated by .conf options and interface options
|
||||
#
|
||||
@ -901,7 +865,8 @@ sub add_common_rules ( $ ) {
|
||||
$level = $config{SFILTER_LOG_LEVEL};
|
||||
$tag = $config{SFILTER_LOG_TAG};
|
||||
my $audit = $policy =~ s/^A_//;
|
||||
my @ipsec = have_ipsec ? ( policy => '--pol none --dir in' ) : ();
|
||||
my $have_ipsec = have_ipsec;
|
||||
my @ipsec = $have_ipsec ? ( policy => '--pol none --dir in' ) : ();
|
||||
my $origin = $origin{SFILTER_DISPOSITION};
|
||||
|
||||
if ( $level || $audit ) {
|
||||
@ -1015,9 +980,55 @@ sub add_common_rules ( $ ) {
|
||||
#
|
||||
# Dynamic blacklisting
|
||||
#
|
||||
my @nodbl = @{$interfaceref->{nodbl}};
|
||||
|
||||
my $have_ipsec = have_ipsec;
|
||||
#
|
||||
# Generate a rule to match the DBL ipset - called when there is no exclusion
|
||||
#
|
||||
sub add_ipset_dbl_ijump( $$$@) {
|
||||
my ( $chainref, $target, $ipset_dir ) = ( shift, shift, shift );
|
||||
|
||||
add_ijump_extended( $chainref, j => $target, $origin{DYNAMIC_BLACKLIST}, @_, "set --match-set" => $ipset_dir );
|
||||
}
|
||||
|
||||
#
|
||||
# Add a simple exclusion rule - called when there is more than one excluded subnet. Excluded subnets cause the
|
||||
# current chain to be exited.
|
||||
#
|
||||
sub add_host_exclusion_ijump( $$$@ ) {
|
||||
my ( $chainref, $hostref, $src ) = ( shift, shift, shift );
|
||||
|
||||
my $nets = $hostref->{hosts};
|
||||
my $origin = $hostref->{origin};
|
||||
|
||||
for my $net ( @$nets ) {
|
||||
if ( $src ) {
|
||||
add_ijump_extended( $chainref , j => 'RETURN', $origin, imatch_source_net( $net ), @_ )
|
||||
} else {
|
||||
add_ijump_extended( $chainref , j => 'RETURN', $origin, imatch_dest_net( $net ), @_ );
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#
|
||||
# This one is called when there is a single excluded network. The generated rule tests against the DBL ipset
|
||||
# unless the source or destination address matches the set
|
||||
#
|
||||
sub add_dbl_exclusion_ijump( $$$$@ ) {
|
||||
my ( $chainref, $dest, $hostref, $ipset, $src ) = ( shift, shift, shift, shift, shift );
|
||||
|
||||
my $nets = $hostref->{hosts};
|
||||
my $origin = $hostref->{origin};
|
||||
|
||||
for my $net ( @$nets ) {
|
||||
if ( $src ) {
|
||||
add_ijump_extended( $chainref , j => $dest, $origin, imatch_source_net( "!$net" ), @_, "set --match-set" => "$ipset src" );
|
||||
} else {
|
||||
add_ijump_extended( $chainref , j => $dest, $origin, imatch_dest_net( "!$net" ), @_, "set --match-set" => "$ipset dst" );
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
my @nodbl = @{$interfaceref->{nodbl}};
|
||||
|
||||
my @in_policy = $have_ipsec ? ( policy => "--pol none --dir in" ) : ();
|
||||
my @out_policy = $have_ipsec ? ( policy => "--pol none --dir out" ) : ();
|
||||
@ -1026,13 +1037,15 @@ sub add_common_rules ( $ ) {
|
||||
#
|
||||
# We have blacklisting exclusions defined in the hosts file
|
||||
#
|
||||
if ( @nodbl > 1 ) {
|
||||
my $hostref = $nodbl[0];
|
||||
|
||||
if ( @nodbl > 1 || @{$hostref->{hosts}} > 1 ) {
|
||||
#
|
||||
# Complex case - we need to create an intermediate chain
|
||||
#
|
||||
$chainref = new_standard_chain( nodbl_src_chain( $interface ));
|
||||
|
||||
for my $hostref (@nodbl) {
|
||||
for $hostref (@nodbl) {
|
||||
add_host_exclusion_ijump( $chainref, 'RETURN', $hostref, 1 );
|
||||
}
|
||||
|
||||
@ -1044,7 +1057,7 @@ sub add_common_rules ( $ ) {
|
||||
if ( $dbl_src_target ne $dbl_dst_target ) {
|
||||
$chainref = new_standard_chain( nodbl_dst_chain( $interface ));
|
||||
|
||||
for my $hostref (@nodbl) {
|
||||
for $hostref (@nodbl) {
|
||||
add_host_exclusion_ijump( $chainref, 'RETURN', $hostref, 0 );
|
||||
}
|
||||
|
||||
@ -1060,8 +1073,6 @@ sub add_common_rules ( $ ) {
|
||||
#
|
||||
# Easy case
|
||||
#
|
||||
my $hostref = $nodbl[0];
|
||||
|
||||
if ( $setting & DBL_SRC ) {
|
||||
add_dbl_exclusion_ijump( $input_option_chainref, $dbl_src_target, $hostref, $dbl_ipset, 1, @state , @in_policy );
|
||||
add_dbl_exclusion_ijump( $forward_option_chainref, $dbl_src_target, $hostref, $dbl_ipset, 1, @state , @in_policy );
|
||||
@ -1271,7 +1282,7 @@ sub add_common_rules ( $ ) {
|
||||
$interface = $hostref->[0];
|
||||
my $ipsec = $hostref->[1];
|
||||
my $net = $hostref->[2];
|
||||
my @policy = $ipsec && have_ipsec ? ( policy => "--pol $ipsec --dir in" ) : ();
|
||||
my @policy = $ipsec && $have_ipsec ? ( policy => "--pol $ipsec --dir in" ) : ();
|
||||
my $target = source_exclusion( $hostref->[3], $chainref );
|
||||
my $origin = $hostref->[5];
|
||||
|
||||
@ -1379,7 +1390,7 @@ sub add_common_rules ( $ ) {
|
||||
my $interface = $hostref->[0];
|
||||
my $target = source_exclusion( $hostref->[3], $chainref );
|
||||
my $ipsec = $hostref->[1];
|
||||
my @policy = $ipsec && have_ipsec ? ( policy => "--pol $ipsec --dir in" ) : ();
|
||||
my @policy = $ipsec && $have_ipsec ? ( policy => "--pol $ipsec --dir in" ) : ();
|
||||
my $origin = $hostref->[5];
|
||||
|
||||
for $chain ( option_chains $interface ) {
|
||||
|
Loading…
Reference in New Issue
Block a user