Make a couple of the user-defined actions builtins

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1121 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2004-02-04 22:23:45 +00:00
parent 7316f20d8e
commit a4fc4c2ea0
12 changed files with 54 additions and 58 deletions

View File

@ -1,17 +0,0 @@
#!/bin/sh
#
# Shorewall 2.0 /etc/shorewall/DropBcast
#
# System-provided user exit for adding rules to the DropBcast chain
# created by the DropBcast action (action.DropBcast)
qt iptables -A DropBcast -m pkttype --pkt-type broadcast -j DROP
if ! qt iptables -A DropBcast -m pkttype --pkt-type multicast -j DROP; then
#
# No pkttype support -- do it the hard way
#
for address in $(find_broadcasts) 255.255.255.255 224.0.0.0/4 ; do
run_iptables -A DropBcast -d $address -j DROP
done
fi

View File

@ -1,7 +0,0 @@
#
# Shorewall 2.0 /etc/shorewall/DropNonSyn
#
# System-provided user exit for adding rules to the DropNonSyn chain
# created by the DropNonSyn action (action.DropNonSyn)
run_iptables -A DropNonSyn -p tcp ! --syn -j DROP

View File

@ -7,9 +7,9 @@
#TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/ #TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/
# PORT PORT(S) LIMIT GROUP # PORT PORT(S) LIMIT GROUP
RejectAuth RejectAuth
DropBcast dropBcast
DropSMB DropSMB
DropUPnP DropUPnP
DropNonSyn dropNonSyn
DropDNSrep DropDNSrep
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE

View File

@ -1,10 +0,0 @@
#
# Shorewall 2.0 /etc/shorewall/action.DropBcast
#
# This action silently drops Broadcast Traffic. The Chain is
# built by the extensions script /etc/shorewall/DropBcast
#
######################################################################################
#TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/
# PORT PORT(S) LIMIT GROUP
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE

View File

@ -1,10 +0,0 @@
#
# Shorewall 2.0 /etc/shorewall/action.DropNotSyn
#
# This action silently drops Non-Syn Packets. The file
# /etc/shorewall/DropNotSyn implements this action.
#
######################################################################################
#TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/
# PORT PORT(S) LIMIT GROUP
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE

View File

@ -7,9 +7,9 @@
#TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/ #TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/
# PORT PORT(S) LIMIT GROUP # PORT PORT(S) LIMIT GROUP
RejectAuth RejectAuth
DropBcast dropBcast
RejectSMB RejectSMB
DropUPnP DropUPnP
DropNonSyn dropNonSyn
DropDNSRep DropDNSRep
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE

View File

@ -2,11 +2,16 @@
# Shorewall 2.0 /etc/shorewall/actions.std # Shorewall 2.0 /etc/shorewall/actions.std
# #
# #
DropBcast #Silently Drops Broadcast Traffic # Builtin Actions are:
#
# dropBcast #Silently Drop Broadcast/multicast
# dropNonSyn #Silently Drop Non-syn TCP packets
#
#ACTION
DropSMB #Silently Drops Microsoft SMB Traffic DropSMB #Silently Drops Microsoft SMB Traffic
RejectSMB #Silently Reject Microsoft SMB Traffic RejectSMB #Silently Reject Microsoft SMB Traffic
DropUPnP #Silently Drop UPnP Probes DropUPnP #Silently Drop UPnP Probes
DropNonSyn #Silently Drop Non-syn TCP packets
RejectAuth #Silently Reject Auth RejectAuth #Silently Reject Auth
DropPing #Silently Drop Ping DropPing #Silently Drop Ping
DropDNSrep #Silently Drop DNS Replies DropDNSrep #Silently Drop DNS Replies
@ -30,6 +35,6 @@ AllowNNTP #Allow network news (Usenet).
AllowTrcrt #Allows Traceroute (20 hops) AllowTrcrt #Allows Traceroute (20 hops)
AllowSNMP #Allows SNMP (including traps) AllowSNMP #Allows SNMP (including traps)
Drop:DROP #Common rules for DROP policy Drop:DROP #Common Action for DROP policy
Reject:REJECT #Common Action for Reject policy Reject:REJECT #Common Action for REJECT policy
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE #LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE

View File

@ -29,3 +29,6 @@ Changes since 1.4.10
14) Add action.AllowSNMP 14) Add action.AllowSNMP
15) Move some code from firewall to functions 15) Move some code from firewall to functions
16) Removed the DropBcast and DropNonSyn actions and replaced them with
builtin actions dropBcast and dropNonSyn.

View File

@ -2325,6 +2325,31 @@ process_action() # $1 = action
# #
process_actions() { process_actions() {
#
# Add the builtin actions
#
add_builtin_actions() {
if [ "$command" != check ]; then
createchain dropBcast no
qt iptables -A dropBcast -m pkttype --pkt-type broadcast -j DROP
if ! qt iptables -A dropBcast -m pkttype --pkt-type multicast -j DROP; then
#
# No pkttype support -- do it the hard way
#
for address in $(find_broadcasts) 255.255.255.255 224.0.0.0/4 ; do
run_iptables -A dropBcast -d $address -j DROP
done
fi
createchain dropNonSyn no
run_iptables -A dropNonSyn -p tcp ! --syn -j DROP
fi
ACTIONS="dropBcast dropNonSyn"
}
# #
# Process a rule where the source or destination is "all" # Process a rule where the source or destination is "all"
# #
@ -2366,6 +2391,8 @@ process_actions() {
process_action $xaction $xtarget $xclients $xservers $xprotocol $xports $xcports $xratelimit $xuserspec process_action $xaction $xtarget $xclients $xservers $xprotocol $xports $xcports $xratelimit $xuserspec
} }
add_builtin_actions
strip_file actions strip_file actions
while read xaction rest; do while read xaction rest; do
@ -2613,7 +2640,7 @@ add_nat_rule() {
# Add one Filter Rule -- Helper function for the rules file processor # Add one Filter Rule -- Helper function for the rules file processor
# #
# The caller has established the following variables: # The caller has established the following variables:
# check = current command. If 'check', we're executing a 'check' # command = current command. If 'check', we're executing a 'check'
# which only goes through the motions. # which only goes through the motions.
# client = SOURCE IP or MAC # client = SOURCE IP or MAC
# server = DESTINATION IP or interface # server = DESTINATION IP or interface

View File

@ -24,6 +24,9 @@
# want to make an entry that applies to all PPP # want to make an entry that applies to all PPP
# interfaces, use 'ppp+'. # interfaces, use 'ppp+'.
# #
# There is no need to define the loopback interface (lo)
# in this file.
#
# BROADCAST The broadcast address for the subnetwork to which the # BROADCAST The broadcast address for the subnetwork to which the
# interface belongs. For P-T-P interfaces, this # interface belongs. For P-T-P interfaces, this
# column is left black.If the interface has multiple # column is left black.If the interface has multiple

View File

@ -42,8 +42,8 @@ Issues when migrating from Shorewall to Shorewall2:
1) The 'dropunclean' and 'logunclean' interface options are no longer 1) The 'dropunclean' and 'logunclean' interface options are no longer
supported. If either option is specified in supported. If either option is specified in
/etc/shorewall2/interfaces, an error message will be generated and /etc/shorewall2/interfaces, an threatening message will be
Shorewall2 will fail to start. generated.
2) The NAT_BEFORE_RULES option has been removed from 2) The NAT_BEFORE_RULES option has been removed from
shorewall.conf. The behavior of Shorewall2 is as if shorewall.conf. The behavior of Shorewall2 is as if
@ -114,6 +114,7 @@ Issues when migrating from Shorewall to Shorewall2:
AllowRdate #Allow remote time (rdate). AllowRdate #Allow remote time (rdate).
AllowNNTP #Allow network news (Usenet). AllowNNTP #Allow network news (Usenet).
AllowTrcrt #Allows Traceroute (20 hops) AllowTrcrt #Allows Traceroute (20 hops)
AllowSNMP #Allows SNMP (including traps)
Drop:DROP #Common rules for DROP policy Drop:DROP #Common rules for DROP policy
Reject:REJECT #Common Action for Reject policy Reject:REJECT #Common Action for Reject policy
@ -146,7 +147,7 @@ Issues when migrating from Shorewall to Shorewall2:
like in the rules file (see below). It is thus possible to create like in the rules file (see below). It is thus possible to create
actions that control traffic from a list of users and/or groups. actions that control traffic from a list of users and/or groups.
The last column in /etc/shorewall2/rules is now labeled /USER/GROUP The last column in /etc/shorewall2/rules is now labeled USER/GROUP
and may contain: and may contain:
[!]<user id>[:] [!]<user id>[:]

View File

@ -168,8 +168,9 @@ RFC1918_LOG_LEVEL=info
# #
# SMURF Log Level # SMURF Log Level
# #
# Specifies the logging level for smurf packets. If set to the empty # Specifies the logging level for smurf packets dropped by the
# value ( SMURF_LOG_LEVEL="" ) then smurfs are not logged. #'nosmurfs' interface option in /etc/shorewall/interfaces. If set to the empty
# value ( SMURF_LOG_LEVEL="" ) then dropped smurfs are not logged.
SMURF_LOG_LEVEL=info SMURF_LOG_LEVEL=info