mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-22 15:43:30 +01:00
Allow allow REJECT to take a parameter
Signed-off-by: Tom Eastep <teastep@shorewall.net>
This commit is contained in:
parent
9a7f6512a1
commit
e9467326f3
@ -619,7 +619,7 @@ our %builtin_target = ( ACCEPT => STANDARD + FILTER_TABLE + NAT_TABLE + MAN
|
|||||||
RAWDNAT => STANDARD + RAW_TABLE,
|
RAWDNAT => STANDARD + RAW_TABLE,
|
||||||
RAWSNAT => STANDARD + RAW_TABLE,
|
RAWSNAT => STANDARD + RAW_TABLE,
|
||||||
REDIRECT => STANDARD + NAT_TABLE,
|
REDIRECT => STANDARD + NAT_TABLE,
|
||||||
REJECT => STANDARD + FILTER_TABLE,
|
REJECT => STANDARD + FILTER_TABLE + OPTIONS,
|
||||||
RETURN => STANDARD + MANGLE_TABLE + RAW_TABLE,
|
RETURN => STANDARD + MANGLE_TABLE + RAW_TABLE,
|
||||||
SAME => STANDARD,
|
SAME => STANDARD,
|
||||||
SECMARK => STANDARD + MANGLE_TABLE,
|
SECMARK => STANDARD + MANGLE_TABLE,
|
||||||
|
@ -243,6 +243,8 @@ our %options = ( inline => INLINE_OPT ,
|
|||||||
terminating => TERMINATING_OPT ,
|
terminating => TERMINATING_OPT ,
|
||||||
audit => AUDIT_OPT ,
|
audit => AUDIT_OPT ,
|
||||||
);
|
);
|
||||||
|
|
||||||
|
our %reject_options;
|
||||||
################################################################################
|
################################################################################
|
||||||
# Declarations moved from the Tc module in 5.0.7 #
|
# Declarations moved from the Tc module in 5.0.7 #
|
||||||
################################################################################
|
################################################################################
|
||||||
@ -353,8 +355,27 @@ sub initialize( $ ) {
|
|||||||
|
|
||||||
if ( $family == F_IPV4 ) {
|
if ( $family == F_IPV4 ) {
|
||||||
@builtins = qw/dropBcast allowBcast dropNotSyn rejNotSyn allowinUPnP forwardUPnP Limit/;
|
@builtins = qw/dropBcast allowBcast dropNotSyn rejNotSyn allowinUPnP forwardUPnP Limit/;
|
||||||
|
%reject_options = ( 'icmp-net-unreachable' => 1,
|
||||||
|
'icmp-host-unreachable' => 1,
|
||||||
|
'icmp-port-unreachable' => 1,
|
||||||
|
'icmp-proto-unreachable' => 1,
|
||||||
|
'icmp-net-prohibited' => 1,
|
||||||
|
'icmp-host-prohibited' => 1,
|
||||||
|
'icmp-admin-prohibited' => 1,
|
||||||
|
'icmp-tcp-reset' => 2,
|
||||||
|
);
|
||||||
|
|
||||||
} else {
|
} else {
|
||||||
@builtins = qw/dropBcast allowBcast dropNotSyn rejNotSyn/;
|
@builtins = qw/dropBcast allowBcast dropNotSyn rejNotSyn/;
|
||||||
|
%reject_options = ( 'icmp6-no-route' => 1,
|
||||||
|
'no-route' => 1,
|
||||||
|
'icmp6-adm-prohibited' => 1,
|
||||||
|
'adm-prohibited' => 1,
|
||||||
|
'icmp6-addr-unreachable' => 1,
|
||||||
|
'addr-unreach' => 1,
|
||||||
|
'icmp6-port-unreachable' => 1,
|
||||||
|
'tcp-reset' => 2,
|
||||||
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
############################################################################
|
############################################################################
|
||||||
@ -2654,7 +2675,7 @@ sub process_rule ( $$$$$$$$$$$$$$$$$$$$ ) {
|
|||||||
$loglevel = supplied $loglevel ? join( ':', $action, $loglevel ) : $action;
|
$loglevel = supplied $loglevel ? join( ':', $action, $loglevel ) : $action;
|
||||||
$action = 'LOG';
|
$action = 'LOG';
|
||||||
} elsif ( ! ( $actiontype & (ACTION | INLINE | IPTABLES | TARPIT ) ) ) {
|
} elsif ( ! ( $actiontype & (ACTION | INLINE | IPTABLES | TARPIT ) ) ) {
|
||||||
fatal_error "'builtin' actions may only be used in INLINE rules" if $actiontype == USERBUILTIN;
|
fatal_error "'builtin' actions may only be used in INLINE or IP[6]TABLES rules" if $actiontype == USERBUILTIN;
|
||||||
fatal_error "The $basictarget TARGET does not accept a parameter" unless $param eq '' || $actiontype & OPTIONS;
|
fatal_error "The $basictarget TARGET does not accept a parameter" unless $param eq '' || $actiontype & OPTIONS;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -2728,7 +2749,22 @@ sub process_rule ( $$$$$$$$$$$$$$$$$$$$ ) {
|
|||||||
}
|
}
|
||||||
} ,
|
} ,
|
||||||
|
|
||||||
REJECT => sub { $action = 'reject'; } ,
|
REJECT => sub {
|
||||||
|
if ( supplied( $param ) ) {
|
||||||
|
my $option = $reject_options{$param};
|
||||||
|
fatal_error "Invalid REJECT option ($param)" unless $option;
|
||||||
|
if ( $option == 2 ) {
|
||||||
|
#
|
||||||
|
# tcp-reset
|
||||||
|
#
|
||||||
|
fatal_error "tcp-reset may only be used with PROTO tcp" unless ( resolve_proto( $proto ) || 0 ) == TCP;
|
||||||
|
}
|
||||||
|
|
||||||
|
$action = "REJECT --reject-with $param";
|
||||||
|
} else {
|
||||||
|
$action = 'reject';
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
CONTINUE => sub { $action = 'RETURN'; } ,
|
CONTINUE => sub { $action = 'RETURN'; } ,
|
||||||
|
|
||||||
|
@ -672,11 +672,37 @@
|
|||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><emphasis role="bold">REJECT</emphasis></term>
|
<term><emphasis
|
||||||
|
role="bold">REJECT[(<replaceable>option</replaceable>)]</emphasis></term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>disallow the request and return an icmp-unreachable or
|
<para>disallow the request and return an icmp-unreachable or
|
||||||
an RST packet.</para>
|
an RST packet. If no option is passed, Shorewall selects the
|
||||||
|
appropriate option based on the protocol of the packet.</para>
|
||||||
|
|
||||||
|
<para>Beginning with Shorewall 5.0.8, the type of reject may
|
||||||
|
be specified in the <replaceable>option</replaceable>
|
||||||
|
paramater. Valid <replaceable>option</replaceable> values
|
||||||
|
are:</para>
|
||||||
|
|
||||||
|
<simplelist>
|
||||||
|
<member><option>icmp-net-unreachable</option></member>
|
||||||
|
|
||||||
|
<member><option>icmp-host-unreachable</option></member>
|
||||||
|
|
||||||
|
<member><option>i</option><option>cmp-port-unreachable</option></member>
|
||||||
|
|
||||||
|
<member><option>icmp-proto-unreachable</option></member>
|
||||||
|
|
||||||
|
<member><option>icmp-net-prohibited</option></member>
|
||||||
|
|
||||||
|
<member><option>icmp-host-prohibited</option></member>
|
||||||
|
|
||||||
|
<member><option>icmp-admin-prohibited</option></member>
|
||||||
|
|
||||||
|
<member><option>icmp-tcp-reset</option> (the PROTO column
|
||||||
|
must specify TCP)</member>
|
||||||
|
</simplelist>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
@ -673,11 +673,37 @@
|
|||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><emphasis role="bold">REJECT</emphasis></term>
|
<term><emphasis
|
||||||
|
role="bold">REJECT[(<replaceable>option</replaceable>)]</emphasis></term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>disallow the request and return an icmp-unreachable or
|
<para>disallow the request and return an icmp-unreachable or
|
||||||
an RST packet.</para>
|
an RST packet. If no option is passed, Shorewall selects the
|
||||||
|
appropriate option based on the protocol of the packet.</para>
|
||||||
|
|
||||||
|
<para>Beginning with Shorewall 5.0.8, the type of reject may
|
||||||
|
be specified in the <replaceable>option</replaceable>
|
||||||
|
paramater. Valid <replaceable>option</replaceable> values
|
||||||
|
are:</para>
|
||||||
|
|
||||||
|
<simplelist>
|
||||||
|
<member><option>icmp6-no-route</option></member>
|
||||||
|
|
||||||
|
<member><option>no-route</option></member>
|
||||||
|
|
||||||
|
<member><option>i</option><option>cmp6-adm-prohibited</option></member>
|
||||||
|
|
||||||
|
<member><option>adm-prohibited</option></member>
|
||||||
|
|
||||||
|
<member><option>icmp6-addr-unreachable</option></member>
|
||||||
|
|
||||||
|
<member><option>addr-unreach</option></member>
|
||||||
|
|
||||||
|
<member><option>icmp6-port-unreachable</option></member>
|
||||||
|
|
||||||
|
<member><option>tcp-reset</option> (the PROTO column must
|
||||||
|
specify TCP)</member>
|
||||||
|
</simplelist>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user