# # Shorewall-perl 4.2 -- /usr/share/shorewall-perl/Shorewall/Config.pm # # This program is under GPL [http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt] # # (c) 2007 - Tom Eastep (teastep@shorewall.net) # # Complete documentation is available at http://shorewall.net # # This program is free software; you can redistribute it and/or modify # it under the terms of Version 2 of the GNU General Public License # as published by the Free Software Foundation. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. # # This module is responsible for lower level configuration file handling. # It also exports functions for generating warning and error messages. # The get_configuration function parses the shorewall.conf, capabilities and # modules files during compiler startup. The module also provides the basic # output file services such as creation of temporary 'object' files, writing # into those files (emitters) and finalizing those files (renaming # them to their final name and setting their mode appropriately). # package Shorewall::Config; use strict; use warnings; use File::Basename; use File::Temp qw/ tempfile tempdir /; use Cwd qw(abs_path getcwd); use autouse 'Carp' => qw(longmess confess); use Scalar::Util 'reftype'; our @ISA = qw(Exporter); # # Imported variables should be treated as read-only by importers # our @EXPORT = qw( warning_message fatal_error progress_message progress_message2 progress_message3 ); our @EXPORT_OK = qw( $shorewall_dir initialize read_a_line1 set_config_path shorewall); our %EXPORT_TAGS = ( internal => [ qw( create_temp_object finalize_object numeric_value numeric_value1 in_hex in_hex2 in_hex3 in_hex4 in_hex8 emit emit_unindented save_progress_message save_progress_message_short set_timestamp set_verbose set_log close_log set_command push_indent pop_indent copy create_temp_aux_config finalize_aux_config set_shorewall_dir set_debug find_file split_list split_line split_line1 first_entry open_file close_file push_open pop_open read_a_line validate_level qt ensure_config_path get_configuration require_capability report_capabilities propagateconfig append_file run_user_exit run_user_exit1 run_user_exit2 generate_aux_config $command $doing $done $currentline %config %globals %capabilities MIN_VERBOSITY MAX_VERBOSITY ) ] ); Exporter::export_ok_tags('internal'); our $VERSION = 4.1.5; # # describe the current command, it's present progressive, and it's completion. # our ($command, $doing, $done ); # # VERBOSITY # our $verbose; # # Logging # our ( $log, $log_verbose ); # # Timestamp each progress message, if true. # our $timestamp; # # Object file handle # our $object; # # True, if last line emitted is blank # our $lastlineblank; # # Number of columns to indent the output # our $indent; # # Object's Directory and File # our ( $dir, $file ); # # Temporary output file's name # our $tempfile; # # Misc Globals # our %globals; # # From shorewall.conf file # our %config; # # Config options and global settings that are to be copied to object script # our @propagateconfig = qw/ DISABLE_IPV6 MODULESDIR MODULE_SUFFIX LOGFORMAT SUBSYSLOCK LOCKFILE /; our @propagateenv = qw/ LOGLIMIT LOGTAGONLY LOGRULENUMBERS /; # # From parsing the capabilities file # our %capabilities; # # Capabilities # our %capdesc = ( NAT_ENABLED => 'NAT', MANGLE_ENABLED => 'Packet Mangling', MULTIPORT => 'Multi-port Match' , XMULTIPORT => 'Extended Multi-port Match', CONNTRACK_MATCH => 'Connection Tracking Match', USEPKTTYPE => 'Packet Type Match', POLICY_MATCH => 'Policy Match', PHYSDEV_MATCH => 'Physdev Match', PHYSDEV_BRIDGE => 'Physdev-is-bridged support', LENGTH_MATCH => 'Packet length Match', IPRANGE_MATCH => 'IP Range Match', RECENT_MATCH => 'Recent Match', OWNER_MATCH => 'Owner Match', IPSET_MATCH => 'Ipset Match', CONNMARK => 'CONNMARK Target', XCONNMARK => 'Extended CONNMARK Target', CONNMARK_MATCH => 'Connmark Match', XCONNMARK_MATCH => 'Extended Connmark Match', RAW_TABLE => 'Raw Table', IPP2P_MATCH => 'IPP2P Match', CLASSIFY_TARGET => 'CLASSIFY Target', ENHANCED_REJECT => 'Extended Reject', KLUDGEFREE => 'Repeat match', MARK => 'MARK Target', XMARK => 'Extended Mark Target', MANGLE_FORWARD => 'Mangle FORWARD Chain', COMMENTS => 'Comments', ADDRTYPE => 'Address Type Match', TCPMSS_MATCH => 'TCPMSS Match', HASHLIMIT_MATCH => 'Hashlimit Match', NFQUEUE_TARGET => 'NFQUEUE Target', REALM_MATCH => 'Realm Match', CAPVERSION => 'Capability Version', ); # # Directories to search for configuration files # our @config_path; # # Stash away file references here when we encounter INCLUDE # our @includestack; # # Allow nested opens # our @openstack; our $currentline; # Current config file line image our $currentfile; # File handle reference our $currentfilename; # File NAME our $currentlinenumber; # Line number our $scriptfile; # File Handle Reference to current temporary file being written by an in-line Perl script our $scriptfilename; # Name of that file. our @tempfiles; # Files that need unlinking at END our $first_entry; # Message to output or function to call on first non-blank line of a file our $shorewall_dir; # Shorewall Directory our $debug; # If true, use Carp to report errors with stack trace. use constant { MIN_VERBOSITY => -1, MAX_VERBOSITY => 2 }; # # Initialize globals -- we take this novel approach to globals initialization to allow # the compiler to run multiple times in the same process. The # initialize() function does globals initialization for this # module and is called from an INIT block below. The function is # also called by Shorewall::Compiler::compiler at the beginning of # the second and subsequent calls to that function. # sub initialize() { ( $command, $doing, $done ) = qw/ compile Compiling Compiled/; #describe the current command, it's present progressive, and it's completion. $verbose = 0; # Verbosity setting. 0 = almost silent, 1 = major progress messages only, 2 = all progress messages (very noisy) $log = undef; # File reference for log file $log_verbose = -1; # Verbosity of log. $timestamp = ''; # If true, we are to timestamp each progress message $object = 0; # Object (script) file Handle Reference $lastlineblank = 0; # Avoid extra blank lines in the output $indent = ''; # Current indentation ( $dir, $file ) = ('',''); # Object's Directory and File $tempfile = ''; # Temporary File Name # # Misc Globals # %globals = ( SHAREDIR => '/usr/share/shorewall' , CONFDIR => '/etc/shorewall', SHAREDIRPL => '/usr/share/shorewall-perl/', ORIGINAL_POLICY_MATCH => '', LOGPARMS => '', TC_SCRIPT => '', VERSION => "4.2.0-Beta2", CAPVERSION => 40100 , ); # # From shorewall.conf file # %config = ( STARTUP_ENABLED => undef, VERBOSITY => undef, # # Logging # LOGFILE => undef, LOGFORMAT => undef, LOGTAGONLY => undef, LOGRATE => undef, LOGBURST => undef, LOGALLNEW => undef, BLACKLIST_LOGLEVEL => undef, MACLIST_LOG_LEVEL => undef, TCP_FLAGS_LOG_LEVEL => undef, RFC1918_LOG_LEVEL => undef, SMURF_LOG_LEVEL => undef, LOG_MARTIANS => undef, LOG_VERBOSITY => undef, STARTUP_LOG => undef, # # Location of Files # IPTABLES => undef, # #PATH is inherited # PATH => undef, SHOREWALL_SHELL => undef, SUBSYSLOCK => undef, MODULESDIR => undef, # #CONFIG_PATH is inherited # CONFIG_PATH => undef, RESTOREFILE => undef, IPSECFILE => undef, LOCKFILE => undef, # # Default Actions/Macros # DROP_DEFAULT => undef, REJECT_DEFAULT => undef, ACCEPT_DEFAULT => undef, QUEUE_DEFAULT => undef, NFQUEUE_DEFAULT => undef, # # RSH/RCP Commands # RSH_COMMAND => undef, RCP_COMMAND => undef, # # Firewall Options # BRIDGING => undef, IP_FORWARDING => undef, ADD_IP_ALIASES => undef, ADD_SNAT_ALIASES => undef, RETAIN_ALIASES => undef, TC_ENABLED => undef, TC_EXPERT => undef, CLEAR_TC => undef, MARK_IN_FORWARD_CHAIN => undef, CLAMPMSS => undef, ROUTE_FILTER => undef, DETECT_DNAT_IPADDRS => undef, MUTEX_TIMEOUT => undef, ADMINISABSENTMINDED => undef, BLACKLISTNEWONLY => undef, DELAYBLACKLISTLOAD => undef, MODULE_SUFFIX => undef, DISABLE_IPV6 => undef, DYNAMIC_ZONES => undef, PKTTYPE=> undef, RFC1918_STRICT => undef, MACLIST_TABLE => undef, MACLIST_TTL => undef, SAVE_IPSETS => undef, MAPOLDACTIONS => undef, FASTACCEPT => undef, IMPLICIT_CONTINUE => undef, HIGH_ROUTE_MARKS => undef, USE_ACTIONS=> undef, OPTIMIZE => undef, EXPORTPARAMS => undef, SHOREWALL_COMPILER => undef, EXPAND_POLICIES => undef, KEEP_RT_TABLES => undef, DELETE_THEN_ADD => undef, MULTICAST => undef, DONT_LOAD => '', AUTO_COMMENT => undef , MANGLE_ENABLED => undef , NULL_ROUTE_RFC1918 => undef , # # Packet Disposition # MACLIST_DISPOSITION => undef, TCP_FLAGS_DISPOSITION => undef, BLACKLIST_DISPOSITION => undef, ); # # From parsing the capabilities file # %capabilities = ( NAT_ENABLED => undef, MANGLE_ENABLED => undef, MULTIPORT => undef, XMULTIPORT => undef, CONNTRACK_MATCH => undef, USEPKTTYPE => undef, POLICY_MATCH => undef, PHYSDEV_MATCH => undef, PHYSDEV_BRIDGE => undef, LENGTH_MATCH => undef, IPRANGE_MATCH => undef, RECENT_MATCH => undef, OWNER_MATCH => undef, IPSET_MATCH => undef, CONNMARK => undef, XCONNMARK => undef, CONNMARK_MATCH => undef, XCONNMARK_MATCH => undef, RAW_TABLE => undef, IPP2P_MATCH => undef, CLASSIFY_TARGET => undef, ENHANCED_REJECT => undef, KLUDGEFREE => undef, MARK => undef, XMARK => undef, MANGLE_FORWARD => undef, COMMENTS => undef, ADDRTYPE => undef, TCPMSS_MATCH => undef, HASHLIMIT_MATCH => undef, NFQUEUE_TARGET => undef, REALM_MATCH => undef, CAPVERSION => undef, ); # # Directories to search for configuration files # @config_path = (); # # Stash away file references here when we encounter INCLUDE # @includestack = (); # # Allow nested opens # @openstack = (); $currentline = ''; # Line image $currentfile = undef; # File handle reference $currentfilename = ''; # File NAME $currentlinenumber = 0; # Line number $first_entry = 0; # Message to output or function to call on first non-blank file entry $shorewall_dir = ''; #Shorewall Directory $debug = 0; } INIT { initialize; # # These variables appear within single quotes in shorewall.conf -- add them to ENV # so that read_a_line doesn't have to be smart enough to parse that usage. # for ( qw/root system command files destination/ ) { $ENV{$_} = '' unless exists $ENV{$_}; } } my @abbr = qw( Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec ); # # Issue a Warning Message # sub warning_message { my $linenumber = $currentlinenumber || 1; my $currentlineinfo = $currentfile ? " : $currentfilename (line $linenumber)" : ''; our @localtime; $| = 1; if ( $log ) { @localtime = localtime; printf $log '%s %2d %02d:%02d:%02d ', $abbr[$localtime[4]], @localtime[3,2,1,0]; } if ( $debug ) { print STDERR longmess( " WARNING: @_$currentlineinfo" ); print $log longmess( " WARNING: @_$currentlineinfo\n" ) if $log; } else { print STDERR " WARNING: @_$currentlineinfo\n"; print $log " WARNING: @_$currentlineinfo\n" if $log; } $| = 0; } # # Issue fatal error message and die # sub fatal_error { my $linenumber = $currentlinenumber || 1; my $currentlineinfo = $currentfile ? " : $currentfilename (line $linenumber)" : ''; $| = 1; if ( $log ) { our @localtime = localtime; printf $log '%s %2d %02d:%02d:%02d ', $abbr[$localtime[4]], @localtime[3,2,1,0]; if ( $debug ) { print $log longmess( " ERROR: @_$currentlineinfo\n" ); } else { print $log " ERROR: @_$currentlineinfo\n"; } close $log; $log = undef; } confess " ERROR: @_$currentlineinfo" if $debug; die " ERROR: @_$currentlineinfo\n"; } sub fatal_error1 { $| = 1; if ( $log ) { our @localtime = localtime; printf $log '%s %2d %02d:%02d:%02d ', $abbr[$localtime[4]], @localtime[3,2,1,0]; if ( $debug ) { print $log longmess( " ERROR: @_\n" ); } else { print $log " ERROR: @_\n"; } close $log; $log = undef; } confess " ERROR: @_" if $debug; die " ERROR: @_\n"; } # # Convert value to decimal number # sub numeric_value ( $ ) { my $mark = lc $_[0]; return undef unless $mark =~ /^-?(0x[a-f0-9]+|0[0-7]*|[1-9]\d*)$/; $mark =~ /^0/ ? oct $mark : $mark; } sub numeric_value1 ( $ ) { my $val = numeric_value $_[0]; fatal_error "Invalid Number ($_[0])" unless defined $val; $val; } # # Return the argument expressed in Hex # sub in_hex( $ ) { sprintf '0x%x', $_[0]; } sub in_hex2( $ ) { sprintf '0x%02x', $_[0]; } sub in_hex3( $ ) { sprintf '0x%03x', $_[0]; } sub in_hex4( $ ) { sprintf '0x%04x', $_[0]; } sub in_hex8( $ ) { sprintf '0x%08x', $_[0]; } # # Write the arguments to the object file (if any) with the current indentation. # # Replaces leading spaces with tabs as appropriate and suppresses consecutive blank lines. # sub emit { if ( $object ) { # # 'compile' as opposed to 'check' # for ( @_ ) { unless ( /^\s*$/ ) { my $line = $_; # This copy is necessary because the actual arguments are almost always read-only. $line =~ s/^\n// if $lastlineblank; $line =~ s/^/$indent/gm if $indent; $line =~ s/ /\t/gm; print $object "$line\n"; $lastlineblank = ( substr( $line, -1, 1 ) eq "\n" ); } else { print $object "\n" unless $lastlineblank; $lastlineblank = 1; } } } } # # Write passed message to the object with newline but no indentation. # sub emit_unindented( $ ) { print $object "$_[0]\n" if $object; } # # Write a progress_message2 command with surrounding blank lines to the output file. # sub save_progress_message( $ ) { emit "\nprogress_message2 @_\n" if $object; } # # Write a progress_message command to the output file. # sub save_progress_message_short( $ ) { emit "progress_message $_[0]" if $object; } # # Set $timestamp # sub set_timestamp( $ ) { $timestamp = shift; } # # Set $verbose # sub set_verbose( $ ) { $verbose = shift; } # # Set $log and $log_verbose # sub set_log ( $$ ) { my ( $l, $v ) = @_; if ( defined $v ) { my $value = numeric_value( $v ); fatal_error "Invalid Log Verbosity ( $v )" unless defined($value) && ( $value >= -1 ) && ( $value <= 2); $log_verbose = $value; } if ( $l && $log_verbose >= 0 ) { unless ( open $log , '>>' , $l ) { $log = undef; fatal_error "Unable to open STARTUP_LOG ($l) for writing: $!"; } } else { $log_verbose = -1; } } sub close_log() { close $log, $log = undef if $log; } # # Set $command, $doing and $done # sub set_command( $$$ ) { ($command, $doing, $done) = @_; } # # Print the current TOD to STDOUT. # sub timestamp() { our @localtime = localtime; printf '%02d:%02d:%02d ', @localtime[2,1,0]; } # # Write a message if $verbose >= 2 # sub progress_message { my $havelocaltime = 0; if ( $verbose > 1 ) { timestamp, $havelocaltime = 1 if $timestamp; # # We use this function to display messages containing raw config file images which may contains tabs (including multiple tabs in succession). # The following makes such messages look more readable and uniform # my $line = "@_"; $line =~ s/\s+/ /g; print "$line\n"; } if ( $log_verbose > 1 ) { our @localtime; @localtime = localtime unless $havelocaltime; printf $log '%s %2d %2d:%02d:%02d ', $abbr[$localtime[4]], @localtime[3,2,1,0]; my $line = "@_"; $line =~ s/\s+/ /g; print $log "$line\n"; } } # # Write a message if $verbose >= 1 # sub progress_message2 { my $havelocaltime = 0; if ( $verbose > 0 ) { timestamp, $havelocaltime = 1 if $timestamp; print "@_\n"; } if ( $log_verbose > 0 ) { our @localtime; @localtime = localtime unless $havelocaltime; printf $log '%s %2d %02d:%02d:%02d ', $abbr[$localtime[4]], @localtime[3,2,1,0]; print $log "@_\n"; } } # # Write a message if $verbose >= 0 # sub progress_message3 { my $havelocaltime = 0; if ( $verbose >= 0 ) { timestamp, $havelocaltime = 1 if $timestamp; print "@_\n"; } if ( $log_verbose >= 0 ) { our @localtime; @localtime = localtime unless $havelocaltime; printf $log '%s %2d %02d:%02d:%02d ', $abbr[$localtime[4]], @localtime[3,2,1,0]; print $log "@_\n"; } } # # Push/Pop Indent # sub push_indent() { $indent = "$indent "; } sub pop_indent() { $indent = substr( $indent , 0 , ( length $indent ) - 4 ); } # # Functions for copying files into the object # sub copy( $ ) { if ( $object ) { my $file = $_[0]; open IF , $file or fatal_error "Unable to open $file: $!"; while ( ) { if ( /^\s*$/ ) { print $object "\n" unless $lastlineblank; $lastlineblank = 1; } else { s/^/$indent/ if $indent; print $object $_; $lastlineblank = 0; } } close IF; } } # # This one handles line continuation. sub copy1( $ ) { if ( $object ) { my $file = $_[0]; open IF , $file or fatal_error "Unable to open $file: $!"; my $do_indent = 1; while ( ) { if ( /^\s*$/ ) { print $object "\n"; $do_indent = 1; next; } s/^/$indent/ if $indent && $do_indent; print $object $_; $do_indent = ! ( /\\$/ ); } close IF; } } # # Create the temporary object file -- the passed file name is the name of the final file. # We create a temporary file in the same directory so that we can use rename to finalize it. # sub create_temp_object( $ ) { my $objectfile = $_[0]; my $suffix; eval { ( $file, $dir, $suffix ) = fileparse( $objectfile ); }; die if $@; fatal_error "$dir is a Symbolic Link" if -l $dir; fatal_error "Directory $dir does not exist" unless -d _; fatal_error "Directory $dir is not writable" unless -w _; fatal_error "$objectfile is a Symbolic Link" if -l $objectfile; fatal_error "$objectfile is a Directory" if -d _; fatal_error "$objectfile exists and is not a compiled script" if -e _ && ! -x _; eval { $dir = abs_path $dir; ( $object, $tempfile ) = tempfile ( 'tempfileXXXX' , DIR => $dir ); }; fatal_error "Unable to create temporary file in directory $dir" if $@; $file = "$file.$suffix" if $suffix; $dir .= '/' unless substr( $dir, -1, 1 ) eq '/'; $file = $dir . $file; } # # Finalize the object file # sub finalize_object( $ ) { my $export = $_[0]; close $object; $object = 0; rename $tempfile, $file or fatal_error "Cannot Rename $tempfile to $file: $!"; chmod 0700, $file or fatal_error "Cannot secure $file for execute access"; progress_message3 "Shorewall configuration compiled to $file" unless $export; } # # Create the temporary aux config file. # sub create_temp_aux_config() { eval { ( $object, $tempfile ) = tempfile ( 'tempfileXXXX' , DIR => $dir ); }; die if $@; } # # Finalize the aux config file. # sub finalize_aux_config() { close $object; $object = 0; rename $tempfile, "$file.conf" or fatal_error "Cannot Rename $tempfile to $file.conf: $!"; progress_message3 "Shorewall configuration compiled to $file"; } # # Set $config{CONFIG_PATH} # sub set_config_path( $ ) { $config{CONFIG_PATH} = shift; } # # Set $debug # sub set_debug( $ ) { $debug = shift; } # # Search the CONFIG_PATH for the passed file # sub find_file($) { my $filename=$_[0]; return $filename if $filename =~ '/'; my $directory; for $directory ( @config_path ) { my $file = "$directory$filename"; return $file if -f $file; } "$globals{CONFDIR}/$filename"; } sub split_list( $$ ) { my ($list, $type ) = @_; fatal_error "Invalid $type list ($list)" if $list =~ /^,|,$|,,|!,|,!$/; split /,/, $list; } # # Pre-process a line from a configuration file. # ensure that it has an appropriate number of columns. # supply '-' in omitted trailing columns. # sub split_line( $$$ ) { my ( $mincolumns, $maxcolumns, $description ) = @_; fatal_error "Shorewall Configuration file entries may not contain single quotes, double quotes, single back quotes or backslashes" if $currentline =~ /["'`\\]/; fatal_error "Non-ASCII gunk in file" if $currentline =~ /[^\s[:print:]]/; my @line = split( ' ', $currentline ); my $line = @line; fatal_error "Invalid $description entry (too many columns)" if $line > $maxcolumns; $line-- while $line > 0 && $line[$line-1] eq '-'; fatal_error "Invalid $description entry (too few columns)" if $line < $mincolumns; push @line, '-' while @line < $maxcolumns; @line; } # # Version of 'split_line' used on files with exceptions # sub split_line1( $$$;$ ) { my ( $mincolumns, $maxcolumns, $description, $nopad) = @_; fatal_error "Shorewall Configuration file entries may not contain double quotes, single back quotes or backslashes" if $currentline =~ /["`\\]/; my @line = split( ' ', $currentline ); $nopad = { COMMENT => 0 } unless $nopad; my $first = $line[0]; my $columns = $nopad->{$first}; if ( defined $columns ) { fatal_error "Invalid $first entry" if $columns && @line != $columns; return @line } fatal_error "Shorewall Configuration file entries may not contain single quotes" if $currentline =~ /'/; my $line = @line; fatal_error "Invalid $description entry (too many columns)" if $line > $maxcolumns; $line-- while $line > 0 && $line[$line-1] eq '-'; fatal_error "Invalid $description entry (too few columns)" if $line < $mincolumns; push @line, '-' while @line < $maxcolumns; @line; } # # Open a file, setting $currentfile. Returns the file's absolute pathname if the file # exists, is non-empty and was successfully opened. Terminates with a fatal error # if the file exists, is non-empty, but the open fails. # sub do_open_file( $ ) { my $fname = $_[0]; open $currentfile, '<', $fname or fatal_error "Unable to open $fname: $!"; $currentlinenumber = 0; $currentfilename = $fname; } sub open_file( $ ) { my $fname = find_file $_[0]; fatal_error 'Internal Error in open_file()' if defined $currentfile; -f $fname && -s _ ? do_open_file $fname : ''; } # # Pop the include stack # sub pop_include() { my $arrayref = pop @includestack; if ( $arrayref ) { ( $currentfile, $currentfilename, $currentlinenumber ) = @$arrayref; } else { $currentfile = undef; } } # # This function is normally called below in read_a_line() when EOF is reached. Clients of the # module may also call the function to close the file before EOF # sub close_file() { if ( $currentfile ) { my $result = close $currentfile; pop_include; fatal_error "SHELL Script failed" unless $result; $first_entry = 0; } } # # The following two functions allow module clients to nest opens. This happens frequently # in the Actions module. # sub push_open( $ ) { push @includestack, [ $currentfile, $currentfilename, $currentlinenumber ]; my @a = @includestack; push @openstack, \@a; @includestack = (); $currentfile = undef; open_file( $_[0] ); } sub pop_open() { @includestack = @{pop @openstack}; pop_include; } sub shorewall { unless ( $scriptfile ) { fatal_error "shorewall() may not be called in this context" unless $currentfile; $dir ||= '/tmp/'; eval { ( $scriptfile, $scriptfilename ) = tempfile ( 'scriptfileXXXX' , DIR => $dir ); }; fatal_error "Unable to create temporary file in directory $dir" if $@; } print $scriptfile "@_\n"; } # # We don't announce that we are checking/compiling a file until we determine that the file contains # at least one non-blank, non-commentary line. # # The argument to this function may be either a scalar or a function reference. When the first # non-blank/non-commentary line is reached: # # - if a function reference was passed to first_entry(), that function is called # - otherwise, the argument to first_entry() is passed to progress_message2(). # # We do this processing in read_a_line() rather than in the higher-level routines because # Embedded Shell/Perl scripts are processed out of read_a_line(). If we were to defer announcement # until we get back to the caller of read_a_line(), we could issue error messages about parsing and # running scripts in the file before we'd even indicated that we are processing it. # sub first_entry( $ ) { $first_entry = $_[0]; my $reftype = reftype $first_entry; if ( $reftype ) { fatal_error "Invalid argument to first_entry()" unless $reftype eq 'CODE'; } } sub embedded_shell( $ ) { my $multiline = shift; fatal_error "INCLUDEs nested too deeply" if @includestack >= 4; my ( $command, $linenumber ) = ( "/bin/sh -c '$currentline", $currentlinenumber ); if ( $multiline ) { # # Multi-line script # fatal_error "Invalid BEGIN SHELL directive" unless $currentline =~ /^\s*$/; $command .= "\n"; my $last = 0; while ( <$currentfile> ) { $currentlinenumber++; last if $last = s/^\s*END(\s+SHELL)?\s*;?//; $command .= $_; } fatal_error ( "Missing END SHELL" ) unless $last; fatal_error ( "Invalid END SHELL directive" ) unless /^\s*$/; } $command .= q('); push @includestack, [ $currentfile, $currentfilename, $currentlinenumber ]; $currentfile = undef; open $currentfile , '-|', $command or fatal_error qq(Shell Command failed); $currentfilename = "SHELL\@$currentfilename:$currentlinenumber"; $currentline = ''; $currentlinenumber = 0; } sub embedded_perl( $ ) { my $multiline = shift; my ( $command , $linenumber ) = ( qq(package Shorewall::User;\nno strict;\nuse Shorewall::Config qw/shorewall/;\n# line $currentlinenumber "$currentfilename"\n$currentline), $currentlinenumber ); if ( $multiline ) { # # Multi-line script # fatal_error "Invalid BEGIN PERL directive" unless $currentline =~ /^\s*$/; $command .= "\n"; my $last = 0; while ( <$currentfile> ) { $currentlinenumber++; last if $last = s/^\s*END(\s+PERL)?\s*;?//; $command .= $_; } fatal_error ( "Missing END PERL" ) unless $last; fatal_error ( "Invalid END PERL directive" ) unless /^\s*$/; } unless (my $return = eval $command ) { if ( $@ ) { # # Perl found the script offensive or the script itself died # $@ =~ s/, <\$currentfile> line \d+//g; fatal_error1 "$@"; } unless ( defined $return ) { fatal_error "Perl Script failed: $!" if $!; fatal_error "Perl Script failed"; } fatal_error "Perl Script Returned False"; } if ( $scriptfile ) { fatal_error "INCLUDEs nested too deeply" if @includestack >= 4; close $scriptfile or fatal_error "Internal Error in embedded_perl()"; $scriptfile = undef; push @includestack, [ $currentfile, $currentfilename, $currentlinenumber ]; $currentfile = undef; open $currentfile, '<', $scriptfilename or fatal_error "Unable to open Perl Script $scriptfilename"; push @tempfiles, $scriptfilename unless unlink $scriptfilename; #unlink fails on Cygwin $scriptfilename = ''; $currentfilename = "PERL\@$currentfilename:$linenumber"; $currentline = ''; $currentlinenumber = 0; } } # # Read a line from the current include stack. # # - Ignore blank or comment-only lines. # - Remove trailing comments. # - Handle Line Continuation # - Handle embedded SHELL and PERL scripts # - Expand shell variables from $ENV. # - Handle INCLUDE # sub read_a_line() { while ( $currentfile ) { $currentline = ''; $currentlinenumber = 0; while ( <$currentfile> ) { $currentlinenumber = $. unless $currentlinenumber; chomp; # # Continuation # chop $currentline, next if substr( ( $currentline .= $_ ), -1, 1 ) eq '\\'; # # Remove Trailing Comments -- result might be a blank line # $currentline =~ s/#.*$//; # # Ignore ( concatenated ) Blank Lines # $currentline = '', $currentlinenumber = 0, next if $currentline =~ /^\s*$/; # # Line not blank -- Handle any first-entry message/capabilities check # if ( $first_entry ) { reftype( $first_entry ) ? $first_entry->() : progress_message2( $first_entry ); $first_entry = 0; } # # Must check for shell/perl before doing variable expansion # if ( $currentline =~ s/^\s*(BEGIN\s+)?SHELL\s*;?// ) { embedded_shell( $1 ); } elsif ( $currentline =~ s/^\s*(BEGIN\s+)?PERL\s*\;?// ) { embedded_perl( $1 ); } else { my $count = 0; # # Expand Shell Variables using %ENV # # $1 $2 $3 - $4 while ( $currentline =~ m( ^(.*?) \$({)? ([a-zA-Z]\w*) (?(2)}) (.*)$ )x ) { my $val = $ENV{$3}; unless ( defined $val ) { fatal_error "Undefined shell variable (\$$3)" unless exists $ENV{$3}; $val = ''; } $currentline = join( '', $1 , $val , $4 ); fatal_error "Variable Expansion Loop" if ++$count > 100; } if ( $currentline =~ /^\s*INCLUDE\s/ ) { my @line = split ' ', $currentline; fatal_error "Invalid INCLUDE command" if @line != 2; fatal_error "INCLUDEs/Scripts nested too deeply" if @includestack >= 4; my $filename = find_file $line[1]; fatal_error "INCLUDE file $filename not found" unless -f $filename; fatal_error "Directory ($filename) not allowed in INCLUDE" if -d _; if ( -s _ ) { push @includestack, [ $currentfile, $currentfilename, $currentlinenumber ]; $currentfile = undef; do_open_file $filename; } else { $currentlinenumber = 0; } $currentline = ''; } else { return 1; } } } close_file; } } # # Simple version of the above. Doesn't do line concatenation, shell variable expansion or INCLUDE processing # sub read_a_line1() { while ( $currentfile ) { while ( $currentline = <$currentfile> ) { next if $currentline =~ /^\s*#/; chomp $currentline; next if $currentline =~ /^\s*$/; $currentline =~ s/#.*$//; # Remove Trailing Comments fatal_error "Non-ASCII gunk in file" if $currentline =~ /[^\s[:print:]]/; $currentlinenumber = $.; return 1; } close_file; } } # # Provide the passed default value for the passed configuration variable # sub default ( $$ ) { my ( $var, $val ) = @_; $config{$var} = $val unless defined $config{$var} && $config{$var} ne ''; } # # Provide a default value for a yes/no configuration variable. # sub default_yes_no ( $$ ) { my ( $var, $val ) = @_; my $curval = "\L$config{$var}"; if ( defined $curval && $curval ne '' ) { if ( $curval eq 'no' ) { $config{$var} = ''; } else { fatal_error "Invalid value for $var ($val)" unless $curval eq 'yes'; } } else { $config{$var} = $val; } } my %validlevels = ( DEBUG => 7, INFO => 6, NOTICE => 5, WARNING => 4, WARN => 4, ERR => 3, ERROR => 3, CRIT => 2, ALERT => 1, EMERG => 0, PANIC => 0, NONE => '', ULOG => 'ULOG', NFLOG => 'NFLOG'); my @suffixes = qw(group range threshold nlgroup cprange qthreshold); # # Validate a log level -- Drop the trailing '!' and translate to numeric value if appropriate" # sub level_error( $ ) { fatal_error "Invalid log level ($_[0])"; } sub validate_level( $ ) { my $rawlevel = $_[0]; my $level = uc $rawlevel; if ( defined $level && $level ne '' ) { $level =~ s/!$//; my $value = $validlevels{$level}; return $value if defined $value; return $level if $level =~ /^[0-7]$/; if ( $level =~ /^(NFLOG|ULOG)[(](.*)[)]$/ ) { my $olevel = $1; my @options = split /,/, $2; my $prefix = lc $olevel; my $index = $prefix eq 'ulog' ? 3 : 0; level_error( $level ) if @options > 3; for ( @options ) { if ( defined $_ and $_ ne '' ) { level_error( $level ) unless /^\d+/; $olevel .= " --${prefix}-$suffixes[$index] $_"; } $index++; } return $olevel; } if ( $level =~ /^NFLOG --/ or $level =~ /^ULOG --/ ) { return $rawlevel; } level_error( $rawlevel ); } ''; } # # Validate a log level and supply default # sub default_log_level( $$ ) { my ( $level, $default ) = @_; my $value = $config{$level}; unless ( defined $value && $value ne '' ) { $config{$level} = $default; } else { $config{$level} = validate_level $value; } } # # Check a tri-valued variable # sub check_trivalue( $$ ) { my ( $var, $default) = @_; my $val = "\L$config{$var}"; if ( defined $val ) { if ( $val eq 'yes' || $val eq 'on' ) { $config{$var} = 'on'; } elsif ( $val eq 'no' || $val eq 'off' ) { $config{$var} = 'off'; } elsif ( $val eq 'keep' ) { $config{$var} = ''; } elsif ( $val eq '' ) { $config{$var} = $default } else { fatal_error "Invalid value ($val) for $var"; } } else { $config{var} = $default } } # # Produce a report of the detected capabilities # sub report_capabilities() { sub report_capability( $ ) { my $cap = $_[0]; print " $capdesc{$cap}: "; if ( $cap eq 'CAPVERSION' ) { my $version = $capabilities{CAPVERSION}; printf "%d.%d.%d\n", int( $version / 10000 ) , int ( ( $version % 10000 ) / 100 ) , int ( $version % 100 ); } else { print $capabilities{$cap} ? "Available\n" : "Not Available\n"; } } if ( $verbose > 1 ) { print "Shorewall has detected the following capabilities:\n"; for my $cap ( sort { $capdesc{$a} cmp $capdesc{$b} } keys %capabilities ) { report_capability $cap; } } } # # Search the current PATH for the passed executable # sub which( $ ) { my $prog = $_[0]; for ( split /:/, $config{PATH} ) { return "$_/$prog" if -x "$_/$prog"; } ''; } # # Load the kernel modules defined in the 'modules' file. # sub load_kernel_modules( ) { my $moduleloader = which( 'modprobe' ) || ( which 'insmod' ); my $modulesdir = $config{MODULESDIR}; unless ( $modulesdir ) { my $uname = `uname -r`; fatal_error "The command 'uname -r' failed" unless $? == 0; chomp $uname; $modulesdir = "/lib/modules/$uname/kernel/net/ipv4/netfilter:/lib/modules/$uname/kernel/net/netfilter"; } my @moduledirectories = split /:/, $modulesdir; if ( $moduleloader && open_file 'modules' ) { my %loadedmodules; $loadedmodules{$_}++ for split_list( $config{DONT_LOAD}, 'module' ); progress_message "Loading Modules..."; open LSMOD , '-|', 'lsmod' or fatal_error "Can't run lsmod"; while ( ) { my $module = ( split( /\s+/, $_, 2 ) )[0]; $loadedmodules{$module}++ unless $module eq 'Module' } close LSMOD; $config{MODULE_SUFFIX} = 'o gz ko o.gz ko.gz' unless $config{MODULES_SUFFIX}; my @suffixes = split /\s+/ , $config{MODULE_SUFFIX}; while ( read_a_line ) { fatal_error "Invalid modules file entry" unless ( $currentline =~ /^loadmodule\s+([a-zA-Z]\w*)\s*(.*)$/ ); my ( $module, $arguments ) = ( $1, $2 ); unless ( $loadedmodules{ $module } ) { for my $directory ( @moduledirectories ) { for my $suffix ( @suffixes ) { my $modulefile = "$directory/$module.$suffix"; if ( -f $modulefile ) { if ( $moduleloader eq 'insmod' ) { system ("insmod $modulefile $arguments" ); } else { system( "modprobe $module $arguments" ); } $loadedmodules{ $module } = 1; } } } } } } } # # Q[uie]t version of system(). Returns true for success # sub qt( $ ) { system( "@_ > /dev/null 2>&1" ) == 0; } sub qt1( $ ) { 1 while system( "@_ > /dev/null 2>&1" ) == 4; $? == 0; } # # Determine which optional facilities are supported by iptables/netfilter # sub determine_capabilities( $ ) { my $iptables = $_[0]; my $pid = $$; my $sillyname = "fooX$pid"; $capabilities{NAT_ENABLED} = qt1( "$iptables -t nat -L -n" ); $capabilities{MANGLE_ENABLED} = qt1( "$iptables -t mangle -L -n" ); qt1( "$iptables -N $sillyname" ); $capabilities{CONNTRACK_MATCH} = qt1( "$iptables -A $sillyname -m conntrack --ctorigdst 192.168.1.1 -j ACCEPT" ); if ( qt1( "$iptables -A $sillyname -p tcp -m multiport --dports 21,22 -j ACCEPT" ) ) { $capabilities{MULTIPORT} = 1; $capabilities{KLUDGEFREE} = qt1( "$iptables -A $sillyname -p tcp -m multiport --sports 60 -m multiport --dports 99 -j ACCEPT" ); } $capabilities{XMULTIPORT} = qt1( "$iptables -A $sillyname -p tcp -m multiport --dports 21:22 -j ACCEPT" ); $capabilities{POLICY_MATCH} = qt1( "$iptables -A $sillyname -m policy --pol ipsec --mode tunnel --dir in -j ACCEPT" ); if ( qt1( "$iptables -A $sillyname -m physdev --physdev-in eth0 -j ACCEPT" ) ) { $capabilities{PHYSDEV_MATCH} = 1; $capabilities{PHYSDEV_BRIDGE} = qt1( "$iptables -A $sillyname -m physdev --physdev-is-bridged --physdev-in eth0 --physdev-out eth1 -j ACCEPT" ); unless ( $capabilities{KLUDGEFREE} ) { $capabilities{KLUDGEFREE} = qt1( "$iptables -A $sillyname -m physdev --physdev-in eth0 -m physdev --physdev-out eth0 -j ACCEPT" ); } } if ( qt1( "$iptables -A $sillyname -m iprange --src-range 192.168.1.5-192.168.1.124 -j ACCEPT" ) ) { $capabilities{IPRANGE_MATCH} = 1; unless ( $capabilities{KLUDGEFREE} ) { $capabilities{KLUDGEFREE} = qt1( "$iptables -A $sillyname -m iprange --src-range 192.168.1.5-192.168.1.124 -m iprange --dst-range 192.168.1.5-192.168.1.124 -j ACCEPT" ); } } $capabilities{RECENT_MATCH} = qt1( "$iptables -A $sillyname -m recent --update -j ACCEPT" ); $capabilities{OWNER_MATCH} = qt1( "$iptables -A $sillyname -m owner --uid-owner 0 -j ACCEPT" ); if ( qt1( "$iptables -A $sillyname -m connmark --mark 2 -j ACCEPT" )) { $capabilities{CONNMARK_MATCH} = 1; $capabilities{XCONNMARK_MATCH} = qt1( "$iptables -A $sillyname -m connmark --mark 2/0xFF -j ACCEPT" ); } $capabilities{IPP2P_MATCH} = qt1( "$iptables -A $sillyname -p tcp -m ipp2p --ipp2p -j ACCEPT" ); $capabilities{LENGTH_MATCH} = qt1( "$iptables -A $sillyname -m length --length 10:20 -j ACCEPT" ); $capabilities{ENHANCED_REJECT} = qt1( "$iptables -A $sillyname -j REJECT --reject-with icmp-host-prohibited" ); $capabilities{COMMENTS} = qt1( qq($iptables -A $sillyname -j ACCEPT -m comment --comment "This is a comment" ) ); if ( $capabilities{MANGLE_ENABLED} ) { qt1( "$iptables -t mangle -N $sillyname" ); if ( qt1( "$iptables -t mangle -A $sillyname -j MARK --set-mark 1" ) ) { $capabilities{MARK} = 1; $capabilities{XMARK} = qt1( "$iptables -t mangle -A $sillyname -j MARK --and-mark 0xFF" ); } if ( qt1( "$iptables -t mangle -A $sillyname -j CONNMARK --save-mark" ) ) { $capabilities{CONNMARK} = 1; $capabilities{XCONNMARK} = qt1( "$iptables -t mangle -A $sillyname -j CONNMARK --save-mark --mask 0xFF" ); } $capabilities{CLASSIFY_TARGET} = qt1( "$iptables -t mangle -A $sillyname -j CLASSIFY --set-class 1:1" ); qt1( "$iptables -t mangle -F $sillyname" ); qt1( "$iptables -t mangle -X $sillyname" ); $capabilities{MANGLE_FORWARD} = qt1( "$iptables -t mangle -L FORWARD -n" ); } $capabilities{RAW_TABLE} = qt1( "$iptables -t raw -L -n" ); if ( which 'ipset' ) { qt( "ipset -X $sillyname" ); if ( qt( "ipset -N $sillyname iphash" ) ) { if ( qt1( "$iptables -A $sillyname -m set --set $sillyname src -j ACCEPT" ) ) { qt1( "$iptables -D $sillyname -m set --set $sillyname src -j ACCEPT" ); $capabilities{IPSET_MATCH} = 1; } qt( "ipset -X $sillyname" ); } } $capabilities{USEPKTTYPE} = qt1( "$iptables -A $sillyname -m pkttype --pkt-type broadcast -j ACCEPT" ); $capabilities{ADDRTYPE} = qt1( "$iptables -A $sillyname -m addrtype --src-type BROADCAST -j ACCEPT" ); $capabilities{TCPMSS_MATCH} = qt1( "$iptables -A $sillyname -p tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1000:1500 -j ACCEPT" ); $capabilities{HASHLIMIT_MATCH} = qt1( "$iptables -A $sillyname -m hashlimit --hashlimit 4 --hashlimit-burst 5 --hashlimit-name fooX1234 --hashlimit-mode dstip -j ACCEPT" ); $capabilities{NFQUEUE_TARGET} = qt1( "$iptables -A $sillyname -j NFQUEUE --queue-num 4" ); $capabilities{REALM_MATCH} = qt1( "$iptables -A $sillyname -m realm --realm 1" ); qt1( "$iptables -F $sillyname" ); qt1( "$iptables -X $sillyname" ); $capabilities{CAPVERSION} = $globals{CAPVERSION}; } # # Require the passed capability # sub require_capability( $$$ ) { my ( $capability, $description, $singular ) = @_; fatal_error "$description require${singular} $capdesc{$capability} in your kernel and iptables" unless $capabilities{$capability}; } # # Set default config path # sub ensure_config_path() { my $f = "$globals{SHAREDIR}/configpath"; $globals{CONFDIR} = '/usr/share/shorewall/configfiles/' if $> != 0; unless ( $config{CONFIG_PATH} ) { fatal_error "$f does not exist" unless -f $f; open_file $f; $ENV{CONFDIR} = $globals{CONFDIR}; while ( read_a_line ) { if ( $currentline =~ /^\s*([a-zA-Z]\w*)=(.*?)\s*$/ ) { my ($var, $val) = ($1, $2); $config{$var} = ( $val =~ /\"([^\"]*)\"$/ ? $1 : $val ) if exists $config{$var}; } else { fatal_error "Unrecognized entry"; } } fatal_error "CONFIG_PATH not found in $f" unless $config{CONFIG_PATH}; } @config_path = split /:/, $config{CONFIG_PATH}; for ( @config_path ) { $_ .= '/' unless m|/$|; } if ( $shorewall_dir ) { $shorewall_dir = getcwd if $shorewall_dir =~ m|^(\./*)+$|; $shorewall_dir .= '/' unless $shorewall_dir =~ m|/$|; unshift @config_path, $shorewall_dir if $shorewall_dir ne $config_path[0]; $config{CONFIG_PATH} = join ':', @config_path; } } # # Set $shorewall_dir # sub set_shorewall_dir( $ ) { $shorewall_dir = shift; ensure_config_path; } # # Small functions called by get_configuration. We separate them so profiling is more useful # sub process_shorewall_conf() { my $file = find_file 'shorewall.conf'; if ( -f $file ) { if ( -r _ ) { open_file $file; while ( read_a_line ) { if ( $currentline =~ /^\s*([a-zA-Z]\w*)=(.*?)\s*$/ ) { my ($var, $val) = ($1, $2); unless ( exists $config{$var} ) { warning_message "Unknown configuration option ($var) ignored"; next; } $config{$var} = ( $val =~ /\"([^\"]*)\"$/ ? $1 : $val ); } else { fatal_error "Unrecognized entry"; } } } else { fatal_error "Cannot read $file (Hint: Are you root?)"; } } else { fatal_error "$file does not exist!"; } } # # Process the records in the capabilities file # sub read_capabilities() { while ( read_a_line1 ) { if ( $currentline =~ /^([a-zA-Z]\w*)=(.*)$/ ) { my ($var, $val) = ($1, $2); unless ( exists $capabilities{$var} ) { warning_message "Unknown capability ($var) ignored"; next; } $capabilities{$var} = $val =~ /^\"([^\"]*)\"$/ ? $1 : $val; } else { fatal_error "Unrecognized capabilities entry"; } } if ( $capabilities{CAPVERSION} ) { warning_message "Your capabilities file is out of date -- it does not contain all of the capabilities defined by Shorewall version $globals{VERSION}" unless $capabilities{CAPVERSION} >= $globals{CAPVERSION}; } else { warning_message "Your capabilities file may not contain all of the capabilities defined by Shorewall version $globals{VERSION}"; } } # # Get the system's capabilities, either by probing or by reading a capabilities file # sub get_capabilities( $ ) { my $export = $_[0]; if ( ! $export && $> == 0 ) { # $> == $EUID my $iptables = $config{IPTABLES}; if ( $iptables ) { fatal_error "IPTABLES=$iptables does not exist or is not executable" unless -x $iptables; } else { fatal_error "Can't find iptables executable" unless $iptables = which 'iptables'; } my $iptables_restore=$iptables . '-restore'; fatal_error "$iptables_restore does not exist or is not executable" unless -x $iptables_restore; load_kernel_modules; if ( open_file 'capabilities' ) { read_capabilities; } else { determine_capabilities $iptables; } } else { unless ( open_file 'capabilities' ) { fatal_error "The -e compiler option requires a capabilities file" if $export; fatal_error "Compiling under non-root uid requires a capabilities file"; } read_capabilities; } } # # - Read the shorewall.conf file # - Read the capabilities file, if any # - establish global hashes %config , %globals and %capabilities # sub get_configuration( $ ) { my $export = $_[0]; our ( $once, @originalinc ); @originalinc = @INC unless $once++; ensure_config_path; process_shorewall_conf; ensure_config_path; @INC = @originalinc; unshift @INC, @config_path; default 'PATH' , '/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin'; default 'MODULE_PREFIX', 'o gz ko o.gz ko.gz'; get_capabilities( $export ); $globals{ORIGINAL_POLICY_MATCH} = $capabilities{POLICY_MATCH}; if ( $config{LOGRATE} || $config{LOGBURST} ) { $globals{LOGLIMIT} = '-m limit '; $globals{LOGLIMIT} .= "--limit $config{LOGRATE} " if $config{LOGRATE}; $globals{LOGLIMIT} .= "--limit-burst $config{LOGBURST} " if $config{LOGBURST}; } else { $globals{LOGLIMIT} = ''; } check_trivalue ( 'IP_FORWARDING', 'on' ); check_trivalue ( 'ROUTE_FILTER', '' ); check_trivalue ( 'LOG_MARTIANS', 'on' ); default 'STARTUP_LOG' , ''; if ( $config{STARTUP_LOG} ne '' ) { if ( defined $config{LOG_VERBOSITY} ) { if ( $config{LOG_VERBOSITY} eq '' ) { $config{LOG_VERBOSITY} = 2; } else { my $val = numeric_value( $config{LOG_VERBOSITY} ); fatal_error "Invalid LOG_VERBOSITY ($config{LOG_VERBOSITY} )" unless defined( $val ) && ( $val >= -1 ) && ( $val <= 2 ); $config{STARTUP_LOG} = '' if $config{LOG_VERBOSITY} < 0; } } else { $config{LOG_VERBOSITY} = 2; } } else { $config{LOG_VERBOSITY} = -1; } default_yes_no 'ADD_IP_ALIASES' , 'Yes'; default_yes_no 'ADD_SNAT_ALIASES' , ''; default_yes_no 'DETECT_DNAT_IPADDRS' , ''; default_yes_no 'DETECT_DNAT_IPADDRS' , ''; default_yes_no 'CLEAR_TC' , 'Yes'; if ( defined $config{CLAMPMSS} ) { default_yes_no 'CLAMPMSS' , '' unless $config{CLAMPMSS} =~ /^\d+$/; } else { $config{CLAMPMSS} = ''; } unless ( $config{ADD_IP_ALIASES} || $config{ADD_SNAT_ALIASES} ) { $config{RETAIN_ALIASES} = ''; } else { default_yes_no 'RETAIN_ALIASES' , ''; } default_yes_no 'ADMINISABSENTMINDED' , ''; default_yes_no 'BLACKLISTNEWONLY' , ''; default_yes_no 'DISABLE_IPV6' , ''; default_yes_no 'DYNAMIC_ZONES' , ''; fatal_error "DYNAMIC_ZONES=Yes is incompatible with the -e option" if $config{DYNAMIC_ZONES} && $export; default_yes_no 'BRIDGING' , ''; fatal_error 'BRIDGING=Yes is not supported by Shorewall-perl' . $globals{VERSION} if $config{BRIDGING}; default_yes_no 'STARTUP_ENABLED' , 'Yes'; default_yes_no 'DELAYBLACKLISTLOAD' , ''; warning_message 'DELAYBLACKLISTLOAD=Yes is not supported by Shorewall-perl ' . $globals{VERSION} if $config{DELAYBLACKLISTLOAD}; default_yes_no 'LOGTAGONLY' , ''; $globals{LOGTAGONLY} = $config{LOGTAGONLY}; default_yes_no 'RFC1918_STRICT' , ''; default_yes_no 'SAVE_IPSETS' , ''; warning_message 'SAVE_IPSETS=Yes is not supported by Shorewall-perl ' . $globals{VERSION} if $config{SAVE_IPSETS}; default_yes_no 'MAPOLDACTIONS' , ''; warning_message 'MAPOLDACTIONS=Yes is not supported by Shorewall-perl ' . $globals{VERSION} if $config{MAPOLDACTIONS}; default_yes_no 'FASTACCEPT' , ''; fatal_error "BLACKLISTNEWONLY=No may not be specified with FASTACCEPT=Yes" if $config{FASTACCEPT} && ! $config{BLACKLISTNEWONLY}; default_yes_no 'IMPLICIT_CONTINUE' , ''; default_yes_no 'HIGH_ROUTE_MARKS' , ''; default_yes_no 'TC_EXPERT' , ''; default_yes_no 'USE_ACTIONS' , 'Yes'; warning_message 'USE_ACTIONS=No is not supported by Shorewall-perl ' . $globals{VERSION} unless $config{USE_ACTIONS}; default_yes_no 'EXPORTPARAMS' , ''; default_yes_no 'EXPAND_POLICIES' , ''; default_yes_no 'KEEP_RT_TABLES' , ''; default_yes_no 'DELETE_THEN_ADD' , 'Yes'; default_yes_no 'AUTO_COMMENT' , 'Yes'; default_yes_no 'MULTICAST' , ''; default_yes_no 'MARK_IN_FORWARD_CHAIN' , ''; default_yes_no 'MANGLE_ENABLED' , 'Yes'; default_yes_no 'NULL_ROUTE_RFC1918' , ''; $capabilities{XCONNMARK} = '' unless $capabilities{XCONNMARK_MATCH} and $capabilities{XMARK}; default 'BLACKLIST_DISPOSITION' , 'DROP'; default_log_level 'BLACKLIST_LOGLEVEL', ''; default_log_level 'MACLIST_LOG_LEVEL', ''; default_log_level 'TCP_FLAGS_LOG_LEVEL', ''; default_log_level 'RFC1918_LOG_LEVEL', 6; default_log_level 'SMURF_LOG_LEVEL', ''; default_log_level 'LOGALLNEW', ''; my $val; $globals{MACLIST_TARGET} = 'reject'; if ( $val = $config{MACLIST_DISPOSITION} ) { unless ( $val eq 'REJECT' ) { if ( $val eq 'DROP' ) { $globals{MACLIST_TARGET} = 'DROP'; } elsif ( $val eq 'ACCEPT' ) { $globals{MACLIST_TARGET} = 'RETURN'; } else { fatal_error "Invalid value ($config{MACLIST_DISPOSITION}) for MACLIST_DISPOSITION" } } } else { $config{MACLIST_DISPOSITION} = 'REJECT'; } if ( $val = $config{MACLIST_TABLE} ) { if ( $val eq 'mangle' ) { fatal_error 'MACLIST_DISPOSITION=REJECT is not allowed with MACLIST_TABLE=mangle' if $config{MACLIST_DISPOSITION} eq 'REJECT'; } else { fatal_error "Invalid value ($val) for MACLIST_TABLE option" unless $val eq 'filter'; } } else { default 'MACLIST_TABLE' , 'filter'; } if ( $val = $config{TCP_FLAGS_DISPOSITION} ) { fatal_error "Invalid value ($config{TCP_FLAGS_DISPOSITION}) for TCP_FLAGS_DISPOSITION" unless $val =~ /^(REJECT|ACCEPT|DROP)$/; } else { $config{TCP_FLAGS_DISPOSITION} = 'DROP'; } default 'TC_ENABLED' , 'Internal'; $val = "\L$config{TC_ENABLED}"; if ( $val eq 'yes' ) { my $file = find_file 'tcstart'; fatal_error "Unable to find tcstart file" unless -f $file; $globals{TC_SCRIPT} = $file; } elsif ( $val eq 'internal' ) { $config{TC_ENABLED} = 'Internal'; } else { fatal_error "Invalid value ($config{TC_ENABLED}) for TC_ENABLED" unless $val eq 'no'; $config{TC_ENABLED} = ''; } fatal_error "TC_ENABLED=$config{TC_ENABLED} is not allowed with MANGLE_ENABLED=No" if $config{TC_ENABLED} && ! $config{MANGLE_ENABLED}; default 'RESTOREFILE' , 'restore'; default 'IPSECFILE' , 'zones'; default 'DROP_DEFAULT' , 'Drop'; default 'REJECT_DEFAULT' , 'Reject'; default 'QUEUE_DEFAULT' , 'none'; default 'NFQUEUE_DEFAULT' , 'none'; default 'ACCEPT_DEFAULT' , 'none'; default 'OPTIMIZE' , 0; fatal_error 'IPSECFILE=ipsec is not supported by Shorewall-perl ' . $globals{VERSION} unless $config{IPSECFILE} eq 'zones'; for my $default qw/DROP_DEFAULT REJECT_DEFAULT QUEUE_DEFAULT NFQUEUE_DEFAULT ACCEPT_DEFAULT/ { $config{$default} = 'none' if "\L$config{$default}" eq 'none'; } $val = $config{OPTIMIZE}; fatal_error "Invalid OPTIMIZE value ($val)" unless ( $val eq '0' ) || ( $val eq '1' ); fatal_error "Invalid IPSECFILE value ($config{IPSECFILE}" unless $config{IPSECFILE} eq 'zones'; $globals{MARKING_CHAIN} = $config{MARK_IN_FORWARD_CHAIN} ? 'tcfor' : 'tcpre'; if ( $val = $config{LOGFORMAT} ) { my $result; eval { if ( $val =~ /%d/ ) { $globals{LOGRULENUMBERS} = 'Yes'; $result = sprintf "$val", 'fooxx2barxx', 1, 'ACCEPT'; } else { $result = sprintf "$val", 'fooxx2barxx', 'ACCEPT'; } }; fatal_error "Invalid LOGFORMAT ($val)" if $@; fatal_error "LOGFORMAT string is longer than 29 characters ($val)" if length $result > 29; $globals{MAXZONENAMELENGTH} = int ( 5 + ( ( 29 - (length $result ) ) / 2) ); } else { $config{LOGFORMAT}='Shorewall:%s:%s:'; $globals{MAXZONENAMELENGTH} = 5; } if ( $config{LOCKFILE} ) { my ( $file, $dir, $suffix ); eval { ( $file, $dir, $suffix ) = fileparse( $config{LOCKFILE} ); }; die $@ if $@; fatal_error "LOCKFILE=$config{LOCKFILE}: Directory $dir does not exist" unless -d $dir; } else { $config{LOCKFILE} = ''; } } # # The values of the options in @propagateconfig are copied to the object file in OPTION= format. # sub propagateconfig() { for my $option ( @propagateconfig ) { my $value = $config{$option} || ''; emit "$option=\"$value\""; } for my $option ( @propagateenv ) { my $value = $globals{$option} || ''; emit "$option=\"$value\""; } } # # Add a shell script file to the output script -- Return true if the # file exists and is not in /usr/share/shorewall/. # sub append_file( $ ) { my $user_exit = find_file $_[0]; my $result = 0; unless ( $user_exit =~ /^($globals{SHAREDIR})/ ) { if ( -f $user_exit ) { $result = 1; save_progress_message "Processing $user_exit ..."; copy1 $user_exit; } } $result; } # # Run a Perl extension script # sub run_user_exit( $ ) { my $chainref = $_[0]; my $file = find_file $chainref->{name}; if ( -f $file ) { progress_message "Processing $file..."; my $command = qq(package Shorewall::User;\nno strict;\n# line 1 "$file"\n) . `cat $file`; unless (my $return = eval $command ) { fatal_error "Couldn't parse $file: $@" if $@; unless ( defined $return ) { fatal_error "Couldn't do $file: $!" if $!; fatal_error "Couldn't do $file"; } fatal_error "$file returned a false value"; } } } sub run_user_exit1( $ ) { my $file = find_file $_[0]; if ( -f $file ) { progress_message "Processing $file..."; # # File may be empty -- in which case eval would fail # push_open $file; if ( read_a_line ) { close_file; my $command = qq(package Shorewall::User;\n# line 1 "$file"\n) . `cat $file`; unless (my $return = eval $command ) { fatal_error "Couldn't parse $file: $@" if $@; unless ( defined $return ) { fatal_error "Couldn't do $file: $!" if $!; fatal_error "Couldn't do $file"; } fatal_error "$file returned a false value"; } } else { pop_open; } } } sub run_user_exit2( $$ ) { my ($file, $chainref) = ( find_file $_[0], $_[1] ); if ( -f $file ) { progress_message "Processing $file..."; # # File may be empty -- in which case eval would fail # push_open $file; if ( read_a_line ) { close_file; unless (my $return = eval `cat $file` ) { fatal_error "Couldn't parse $file: $@" if $@; unless ( defined $return ) { fatal_error "Couldn't do $file: $!" if $!; fatal_error "Couldn't do $file"; } fatal_error "$file returned a false value"; } } pop_open; } } # # Generate the aux config file for Shorewall Lite # sub generate_aux_config() { sub conditionally_add_option( $ ) { my $option = $_[0]; my $value = $config{$option}; emit "[ -n \"\${$option:=$value}\" ]" if $value ne ''; } sub conditionally_add_option1( $ ) { my $option = $_[0]; my $value = $config{$option}; emit "$option=\"$value\"" if $value; } create_temp_aux_config; my $date = localtime; emit "#\n# Shorewall auxiliary configuration file created by Shorewall-perl version $globals{VERSION} - $date\n#"; for my $option qw(VERBOSITY LOGFILE LOGFORMAT IPTABLES PATH SHOREWALL_SHELL SUBSYSLOCK LOCKFILE RESTOREFILE SAVE_IPSETS) { conditionally_add_option $option; } conditionally_add_option1 'TC_ENABLED'; finalize_aux_config; } END { # # Close files first in case we're running under Cygwin # close $object if $object; close $scriptfile if $scriptfile; close $log if $log; # # Unlink temporary files # unlink $tempfile if $tempfile; unlink $scriptfilename if $scriptfilename; unlink $_ for @tempfiles; } 1;