diff --git a/Shorewall/action.Established b/Shorewall/action.Established new file mode 100644 index 000000000..0ef8aa086 --- /dev/null +++ b/Shorewall/action.Established @@ -0,0 +1,57 @@ +# +# Shorewall 4 - Established Action +# +# /usr/share/shorewall/action.Established +# +# This program is under GPL [http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt] +# +# (c) 2011,2012 - Tom Eastep (teastep@shorewall.net) +# +# Complete documentation is available at http://shorewall.net +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of Version 2 of the GNU General Public License +# as published by the Free Software Foundation. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. +# +# Established[([|-[,{audit|-}])] +# +# Default action is DROP +# +########################################################################################## +?FORMAT 2 + +DEFAULTS DROP,- + +?BEGIN PERL; + +use Shorewall::IPAddrs; +use Shorewall::Config; +use Shorewall::Chains; + +my ( $action, $audit ) = get_action_params( 2 ); + +fatal_error "Established parameter ($audit) to action Established" if supplied $audit && $audit ne 'audit'; +fatal_error "Established parameter ($action) to action Established" unless $action =~ /^(?:ACCEPT|DROP|REJECT)$/; + +my $chainref = get_action_chain; + +my ( $level, $tag ) = get_action_logging; +my $target = require_audit ( $action , $audit ); + +log_rule_limit $level, $chainref, 'Established' , $action, '', $tag, 'add', "$globals{STATEMATCH} ESTABLISHED " if $level ne ''; +add_jump $chainref , $target, 0, "$globals{STATEMATCH} ESTABLISHED "; + +allow_optimize( $chainref ); + +1; + +?END PERL; diff --git a/Shorewall/actions.std b/Shorewall/actions.std index 73fc36599..2e94f4844 100644 --- a/Shorewall/actions.std +++ b/Shorewall/actions.std @@ -35,13 +35,14 @@ #ACTION A_Drop # Audited Default Action for DROP policy A_Reject # Audited Default action for REJECT policy -Broadcast noinline # Handles Broadcast/Multicast/Anycast +Broadcast noinline # Handles Broadcast/Multicast/Anycast Drop # Default Action for DROP policy -DropSmurfs noinline # Drop smurf packets -Invalid noinline # Handles packets in the INVALID conntrack state -NotSyn noinline # Handles TCP packets which do not have SYN=1 and ACK=0 +DropSmurfs noinline # Drop smurf packets +Established nolinline # Handles packets in the ESTABLISHED state +Invalid noinline # Handles packets in the INVALID conntrack state +NotSyn noinline # Handles TCP packets which do not have SYN=1 and ACK=0 Reject # Default Action for REJECT policy -Related noinline # Handles packets in the RELATED conntrack state -RST noinline # Handle packets with RST set -TCPFlags noinline # Handle bad flag combinations. -Untracked noinline # Handles packets in the UNTRACKED conntrack state +Related noinline # Handles packets in the RELATED conntrack state +RST noinline # Handle packets with RST set +TCPFlags noinline # Handle bad flag combinations. +Untracked noinline # Handles packets in the UNTRACKED conntrack state diff --git a/Shorewall6/actions.std b/Shorewall6/actions.std index 149dca304..b7c95ddd6 100644 --- a/Shorewall6/actions.std +++ b/Shorewall6/actions.std @@ -23,13 +23,14 @@ A_Drop # Audited Default Action for DROP policy A_Reject # Audited Default Action for REJECT policy A_AllowICMPs # Audited Accept needed ICMP6 types AllowICMPs # Accept needed ICMP6 types -Broadcast noinline # Handles Broadcast/Multicast/Anycast +Broadcast noinline # Handles Broadcast/Multicast/Anycast Drop # Default Action for DROP policy -DropSmurfs noinline # Handles packets with a broadcast source address -Invalid noinline # Handles packets in the INVALID conntrack state -NotSyn noinline # Handles TCP packets that do not have SYN=1 and ACK=0 +DropSmurfs noinline # Handles packets with a broadcast source address +Established nolinline # Handles packets in the ESTABLISHED state +Invalid noinline # Handles packets in the INVALID conntrack state +NotSyn noinline # Handles TCP packets that do not have SYN=1 and ACK=0 Reject # Default Action for REJECT policy -Related noinline # Handles packets in the RELATED conntrack state -RST noinline # Handle packets with RST set -TCPFlags noinline # Handles bad flags combinations -Untracked noinline # Handles packets in the UNTRACKED conntrack state +Related noinline # Handles packets in the RELATED conntrack state +RST noinline # Handle packets with RST set +TCPFlags noinline # Handles bad flags combinations +Untracked noinline # Handles packets in the UNTRACKED conntrack state