2002-05-01 01:13:15 +02:00
|
|
|
#!/bin/sh
|
|
|
|
#
|
2003-02-15 01:09:44 +01:00
|
|
|
# The Shoreline Firewall (Shorewall) Packet Filtering Firewall - V1.4 3/14/2003
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
2003-02-23 15:10:37 +01:00
|
|
|
# This program is under GPL [http://www.gnu.org/copyleft/gpl.htm]
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
2003-01-31 19:04:57 +01:00
|
|
|
# (c) 1999,2000,2001,2002,2003 - Tom Eastep (teastep@shorewall.net)
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
|
|
|
# On most distributions, this file should be called:
|
|
|
|
# /etc/rc.d/init.d/shorewall or /etc/init.d/shorewall
|
|
|
|
#
|
|
|
|
# Complete documentation is available at http://shorewall.net
|
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or modify
|
2003-02-23 15:10:37 +01:00
|
|
|
# it under the terms of Version 2 of the GNU General Public License
|
2002-05-01 01:13:15 +02:00
|
|
|
# as published by the Free Software Foundation.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program; if not, write to the Free Software
|
|
|
|
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
|
|
|
|
#
|
|
|
|
# If an error occurs while starting or restarting the firewall, the
|
|
|
|
# firewall is automatically stopped.
|
|
|
|
#
|
|
|
|
# Commands are:
|
|
|
|
#
|
2003-02-23 15:10:37 +01:00
|
|
|
# shorewall start Starts the firewall
|
2002-05-01 01:13:15 +02:00
|
|
|
# shorewall restart Restarts the firewall
|
|
|
|
# shorewall stop Stops the firewall
|
|
|
|
# shorewall status Displays firewall status
|
|
|
|
# shorewall reset Resets iptabless packet and
|
|
|
|
# byte counts
|
2003-02-23 15:10:37 +01:00
|
|
|
# shorewall clear Remove all Shorewall chains
|
2002-05-01 01:13:15 +02:00
|
|
|
# and rules/policies.
|
|
|
|
# shorewall refresh . Rebuild the common chain
|
2003-03-10 01:47:12 +01:00
|
|
|
# shorewall check Verify the more heavily-used
|
|
|
|
# configuration files.
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Search a list looking for a match -- returns zero if a match found
|
|
|
|
# 1 otherwise
|
|
|
|
#
|
2002-05-30 14:55:47 +02:00
|
|
|
list_search() # $1 = element to search for , $2-$n = list
|
|
|
|
{
|
|
|
|
local e=$1
|
|
|
|
|
|
|
|
while [ $# -gt 1 ]; do
|
|
|
|
shift
|
|
|
|
[ "x$e" = "x$1" ] && return 0
|
|
|
|
done
|
|
|
|
|
|
|
|
return 1
|
|
|
|
}
|
2002-10-23 18:48:40 +02:00
|
|
|
|
|
|
|
#
|
2003-10-25 02:54:01 +02:00
|
|
|
# Functions to count list elements
|
|
|
|
# - - - - - - - - - - - - - - - -
|
|
|
|
# Whitespace-separated list
|
|
|
|
#
|
|
|
|
list_count1() {
|
|
|
|
echo $#
|
|
|
|
}
|
|
|
|
#
|
|
|
|
# Comma-separated list
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-09-15 01:40:46 +02:00
|
|
|
list_count() {
|
2003-10-25 02:54:01 +02:00
|
|
|
list_count1 `separate_list $1`
|
2002-09-15 01:40:46 +02:00
|
|
|
}
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Mutual exclusion -- These functions are jackets for the mutual exclusion
|
2003-01-07 00:01:23 +01:00
|
|
|
# routines in $FUNCTIONS. They invoke
|
2002-10-23 18:48:40 +02:00
|
|
|
# the corresponding function in that file if the user did
|
|
|
|
# not specify "nolock" on the runline.
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
my_mutex_on() {
|
|
|
|
[ -n "$nolock" ] || { mutex_on; have_mutex=Yes; }
|
|
|
|
}
|
|
|
|
|
|
|
|
my_mutex_off() {
|
|
|
|
[ -n "$have_mutex" ] && { mutex_off; have_mutex=; }
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Message to stderr
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
error_message() # $* = Error Message
|
|
|
|
{
|
2002-05-30 14:55:47 +02:00
|
|
|
echo " $@" >&2
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Fatal error -- stops the firewall after issuing the error message
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
fatal_error() # $* = Error Message
|
|
|
|
{
|
2003-02-08 21:58:44 +01:00
|
|
|
echo " Error: $@" >&2
|
2003-04-22 01:04:52 +02:00
|
|
|
if [ $command = check ]; then
|
2003-04-21 17:12:59 +02:00
|
|
|
[ -n "$TMP_DIR" ] && rm -rf $TMP_DIR
|
|
|
|
else
|
|
|
|
stop_firewall
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
exit 2
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Fatal error during startup -- generate an error message and abend with
|
|
|
|
# altering the state of the firewall
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
startup_error() # $* = Error Message
|
|
|
|
{
|
2003-02-08 21:58:44 +01:00
|
|
|
echo " Error: $@" >&2
|
2002-05-01 01:13:15 +02:00
|
|
|
my_mutex_off
|
|
|
|
[ -n "$TMP_DIR" ] && rm -rf $TMP_DIR
|
|
|
|
kill $$
|
|
|
|
exit 2
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Send a message to STDOUT and the System Log
|
|
|
|
#
|
2002-05-03 00:56:27 +02:00
|
|
|
report () { # $* = message
|
|
|
|
echo "$@"
|
|
|
|
logger "$@"
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Perform variable substitution on the passed argument and echo the result
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
expand() # $1 = contents of variable which may be the name of another variable
|
|
|
|
{
|
|
|
|
eval echo \"$1\"
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Perform variable substitition on the values of the passed list of variables
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
expandv() # $* = list of variable names
|
|
|
|
{
|
|
|
|
local varval
|
|
|
|
|
|
|
|
while [ $# -gt 0 ]; do
|
|
|
|
eval varval=\$${1}
|
|
|
|
eval $1=\"$varval\"
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2002-12-05 01:18:47 +01:00
|
|
|
#
|
2002-12-09 03:42:28 +01:00
|
|
|
# Replace all leading "!" with "! " in the passed argument list
|
2002-12-05 01:18:47 +01:00
|
|
|
#
|
|
|
|
|
|
|
|
fix_bang() {
|
|
|
|
local i;
|
2002-12-09 03:42:28 +01:00
|
|
|
|
2002-12-05 01:18:47 +01:00
|
|
|
for i in $@; do
|
|
|
|
case $i in
|
|
|
|
!*)
|
|
|
|
echo "! ${i#!}"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo $i
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Run iptables and if an error occurs, stop the firewall and quit
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
run_iptables() {
|
2002-12-09 03:42:28 +01:00
|
|
|
|
2002-12-18 22:26:03 +01:00
|
|
|
if ! iptables $@ ; then
|
|
|
|
[ -z "$stopping" ] && { stop_firewall; exit 2; }
|
|
|
|
fi
|
|
|
|
}
|
2002-12-18 22:58:21 +01:00
|
|
|
|
2002-12-18 22:26:03 +01:00
|
|
|
#
|
|
|
|
# Version of 'run_iptables' that inserts white space after "!" in the arg list
|
|
|
|
#
|
|
|
|
run_iptables2() {
|
|
|
|
|
2002-12-09 03:42:28 +01:00
|
|
|
if [ "x${*%!*}" = "x$*" ]; then
|
2002-12-10 17:03:26 +01:00
|
|
|
#
|
|
|
|
# No "!" in the command -- just execute it
|
|
|
|
#
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables $@
|
2002-12-09 03:42:28 +01:00
|
|
|
return
|
|
|
|
fi
|
2002-12-10 17:03:26 +01:00
|
|
|
#
|
|
|
|
# Need to insert white space before each "!"
|
|
|
|
#
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables `fix_bang $@`
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Run ip and if an error occurs, stop the firewall and quit
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
run_ip() {
|
|
|
|
if ! ip $@ ; then
|
|
|
|
[ -z "$stopping" ] && { stop_firewall; exit 2; }
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Run arp and if an error occurs, stop the firewall and quit
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
run_arp() {
|
|
|
|
if ! arp $@ ; then
|
|
|
|
[ -z "$stopping" ] && { stop_firewall; exit 2; }
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Run tc and if an error occurs, stop the firewall and quit
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
run_tc() {
|
|
|
|
if ! tc $@ ; then
|
|
|
|
[ -z "$stopping" ] && { stop_firewall; exit 2; }
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Create a filter chain
|
|
|
|
#
|
|
|
|
# If the chain isn't one of the common chains then add a rule to the chain
|
|
|
|
# allowing packets that are part of an established connection. Create a
|
2003-10-30 16:42:45 +01:00
|
|
|
# variable exists_${1} and set its value to Yes to indicate that the chain now
|
2002-10-23 18:48:40 +02:00
|
|
|
# exists.
|
|
|
|
#
|
2003-02-08 21:58:44 +01:00
|
|
|
createchain() # $1 = chain name, $2 = If "yes", create default rules
|
2002-05-01 01:13:15 +02:00
|
|
|
{
|
2003-10-25 02:54:01 +02:00
|
|
|
local c=`chain_base $1`
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
run_iptables -N $1
|
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
if [ $2 = yes ]; then
|
2003-06-18 20:26:05 +02:00
|
|
|
run_iptables -A $1 -m state --state ESTABLISHED,RELATED -j ACCEPT
|
2002-08-23 20:51:55 +02:00
|
|
|
[ -z "$NEWNOTSYN" ] && \
|
2002-12-19 21:14:10 +01:00
|
|
|
run_iptables -A $1 -m state --state NEW -p tcp ! --syn -j newnotsyn
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
|
2003-10-30 16:42:45 +01:00
|
|
|
eval exists_${c}=Yes
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2003-08-10 18:01:21 +02:00
|
|
|
createchain2() # $1 = chain name, $2 = If "yes", create default rules
|
|
|
|
{
|
2003-10-25 02:54:01 +02:00
|
|
|
local c=`chain_base $1`
|
|
|
|
|
2003-08-10 18:01:21 +02:00
|
|
|
if iptables -N $1; then
|
|
|
|
|
|
|
|
if [ $2 = yes ]; then
|
|
|
|
run_iptables -A $1 -m state --state ESTABLISHED,RELATED -j ACCEPT
|
|
|
|
[ -z "$NEWNOTSYN" ] && \
|
|
|
|
run_iptables -A $1 -m state --state NEW -p tcp ! --syn -j newnotsyn
|
|
|
|
fi
|
|
|
|
|
2003-10-30 16:42:45 +01:00
|
|
|
eval exists_${c}=Yes
|
2003-08-10 18:01:21 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Determine if a chain exists
|
|
|
|
#
|
2003-10-30 16:42:45 +01:00
|
|
|
# When we create a chain "chain", we create a variable named exists_chain and
|
|
|
|
# set its value to Yes. This function tests for the "exists_" variable
|
2002-10-23 18:48:40 +02:00
|
|
|
# corresponding to the passed chain having the value of "Yes".
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
havechain() # $1 = name of chain
|
|
|
|
{
|
2003-10-25 02:54:01 +02:00
|
|
|
local c=`chain_base $1`
|
|
|
|
|
2003-10-30 16:42:45 +01:00
|
|
|
eval test \"\$exists_${c}\" = Yes
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-12-04 22:17:14 +01:00
|
|
|
#
|
|
|
|
# Query NetFilter about the existence of a filter chain
|
|
|
|
#
|
|
|
|
chain_exists() # $1 = chain name
|
|
|
|
{
|
|
|
|
qt iptables -L $1 -n
|
|
|
|
}
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-12-04 22:17:14 +01:00
|
|
|
#
|
|
|
|
# Query NetFilter about the existence of a mangle chain
|
|
|
|
#
|
|
|
|
mangle_chain_exists() # $1 = chain name
|
|
|
|
{
|
|
|
|
qt iptables -t mangle -L $1 -n
|
|
|
|
}
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Ensure that a chain exists (create it if it doesn't)
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
ensurechain() # $1 = chain name
|
|
|
|
{
|
2003-02-08 21:58:44 +01:00
|
|
|
havechain $1 || createchain $1 yes
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Add a rule to a chain creating the chain if necessary
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
addrule() # $1 = chain name, remainder of arguments specify the rule
|
|
|
|
{
|
|
|
|
ensurechain $1
|
|
|
|
run_iptables -A $@
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Create a nat chain
|
|
|
|
#
|
2003-10-30 16:42:45 +01:00
|
|
|
# Create a variable exists_nat_${1} and set its value to Yes to indicate that
|
2002-10-23 18:48:40 +02:00
|
|
|
# the chain now exists.
|
|
|
|
#
|
2002-05-18 15:45:23 +02:00
|
|
|
createnatchain() # $1 = chain name
|
|
|
|
{
|
|
|
|
run_iptables -t nat -N $1
|
|
|
|
|
2003-10-30 16:42:45 +01:00
|
|
|
eval exists_nat_${1}=Yes
|
2002-05-18 15:45:23 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Determine if a nat chain exists
|
|
|
|
#
|
2003-10-30 16:42:45 +01:00
|
|
|
# When we create a chain "chain", we create a variable named exists_nat_chain
|
|
|
|
# and set its value to Yes. This function tests for the "exists_" variable
|
2002-10-23 18:48:40 +02:00
|
|
|
# corresponding to the passed chain having the value of "Yes".
|
|
|
|
#
|
2002-05-18 15:45:23 +02:00
|
|
|
havenatchain() # $1 = name of chain
|
|
|
|
{
|
2003-10-30 16:42:45 +01:00
|
|
|
eval test \"\$exists_nat_${1}\" = Yes
|
2002-05-18 15:45:23 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-02-20 00:52:03 +01:00
|
|
|
# Ensure that a nat chain exists (create it if it doesn't)
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-18 15:45:23 +02:00
|
|
|
ensurenatchain() # $1 = chain name
|
|
|
|
{
|
|
|
|
havenatchain $1 || createnatchain $1
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Add a rule to a nat chain creating the chain if necessary
|
|
|
|
#
|
2002-05-18 15:45:23 +02:00
|
|
|
addnatrule() # $1 = chain name, remainder of arguments specify the rule
|
|
|
|
{
|
|
|
|
ensurenatchain $1
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables2 -t nat -A $@
|
2002-05-18 15:45:23 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Delete a chain if it exists
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
deletechain() # $1 = name of chain
|
|
|
|
{
|
|
|
|
qt iptables -L $1 -n && qt iptables -F $1 && qt iptables -X $1
|
|
|
|
}
|
|
|
|
|
2002-11-13 01:57:48 +01:00
|
|
|
#
|
|
|
|
# Determine if a chain is a policy chain
|
|
|
|
#
|
|
|
|
is_policy_chain() # $1 = name of chain
|
|
|
|
{
|
|
|
|
eval test \"\$${1}_is_policy\" = Yes
|
2003-02-23 15:10:37 +01:00
|
|
|
}
|
2002-11-13 01:57:48 +01:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Set a standard chain's policy
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
setpolicy() # $1 = name of chain, $2 = policy
|
|
|
|
{
|
|
|
|
run_iptables -P $1 $2
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-06-11 03:01:48 +02:00
|
|
|
# Set a standard chain to enable established and related connections
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
setcontinue() # $1 = name of chain
|
|
|
|
{
|
2003-06-11 03:01:48 +02:00
|
|
|
run_iptables -A $1 -m state --state ESTABLISHED,RELATED -j ACCEPT
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Flush one of the NAT table chains
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
flushnat() # $1 = name of chain
|
|
|
|
{
|
|
|
|
run_iptables -t nat -F $1
|
|
|
|
}
|
|
|
|
|
2003-02-24 16:24:55 +01:00
|
|
|
#
|
|
|
|
# Flush one of the Mangle table chains
|
|
|
|
#
|
|
|
|
flushmangle() # $1 = name of chain
|
|
|
|
{
|
|
|
|
run_iptables -t mangle -F $1
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-12-07 04:21:32 +01:00
|
|
|
# Find interfaces to a given zone
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-12-07 04:21:32 +01:00
|
|
|
# Search the variables representing the contents of the interfaces file and
|
2003-02-23 15:10:37 +01:00
|
|
|
# for each record matching the passed ZONE, echo the expanded contents of
|
2002-12-07 04:21:32 +01:00
|
|
|
# the "INTERFACE" column
|
|
|
|
#
|
|
|
|
find_interfaces() # $1 = interface zone
|
2002-05-18 15:45:23 +02:00
|
|
|
{
|
2002-12-07 04:21:32 +01:00
|
|
|
local zne=$1
|
|
|
|
local z
|
|
|
|
local interface
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
for interface in $all_interfaces; do
|
|
|
|
eval z=\$`chain_base ${interface}`_zone
|
|
|
|
[ "x${z}" = x${zne} ] && echo $interface
|
|
|
|
done
|
2002-05-18 15:45:23 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Forward Chain for an interface
|
|
|
|
#
|
2002-05-18 15:45:23 +02:00
|
|
|
forward_chain() # $1 = interface
|
|
|
|
{
|
2002-07-05 18:48:41 +02:00
|
|
|
echo `chain_base $1`_fwd
|
2002-05-18 15:45:23 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Input Chain for an interface
|
|
|
|
#
|
2002-05-18 15:45:23 +02:00
|
|
|
input_chain() # $1 = interface
|
|
|
|
{
|
2002-07-05 18:48:41 +02:00
|
|
|
echo `chain_base $1`_in
|
2002-05-18 15:45:23 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Output Chain for an interface
|
|
|
|
#
|
2002-07-05 17:56:02 +02:00
|
|
|
output_chain() # $1 = interface
|
|
|
|
{
|
2002-07-05 18:48:41 +02:00
|
|
|
echo `chain_base $1`_out
|
2002-07-05 17:56:02 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Masquerade Chain for an interface
|
|
|
|
#
|
2002-07-05 23:57:37 +02:00
|
|
|
masq_chain() # $1 = interface
|
|
|
|
{
|
|
|
|
echo `chain_base $1`_masq
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# MAC Verification Chain for an interface
|
|
|
|
#
|
2002-10-23 17:58:53 +02:00
|
|
|
mac_chain() # $1 = interface
|
|
|
|
{
|
|
|
|
echo `chain_base $1`_mac
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# DNAT Chain from a zone
|
|
|
|
#
|
2002-07-05 23:57:37 +02:00
|
|
|
dnat_chain() # $1 = zone
|
|
|
|
{
|
|
|
|
echo ${1}_dnat
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# SNAT Chain to a zone
|
|
|
|
#
|
2002-07-05 23:57:37 +02:00
|
|
|
snat_chain() # $1 = zone
|
|
|
|
{
|
2003-02-24 16:24:55 +01:00
|
|
|
echo `chain_base $1`_snat
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# ECN Chain to an interface
|
|
|
|
#
|
|
|
|
ecn_chain() # $1 = interface
|
|
|
|
{
|
2003-07-22 00:02:34 +02:00
|
|
|
echo `chain_base $1`_ecn
|
2002-07-05 23:57:37 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# First chains for an interface
|
|
|
|
#
|
2002-05-18 15:45:23 +02:00
|
|
|
first_chains() #$1 = interface
|
|
|
|
{
|
|
|
|
local c=`chain_base $1`
|
|
|
|
|
|
|
|
echo ${c}_fwd ${c}_in
|
|
|
|
}
|
|
|
|
|
2003-08-21 15:18:51 +02:00
|
|
|
#
|
|
|
|
# ACCEPT chain for a userset
|
|
|
|
#
|
|
|
|
accept_chain() # $1 = userset
|
|
|
|
{
|
|
|
|
echo ${1}_acc
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# DROP chain for a userset
|
|
|
|
#
|
|
|
|
drop_chain() # $1 = userset
|
|
|
|
{
|
|
|
|
echo ${1}_drp
|
|
|
|
}
|
|
|
|
#
|
|
|
|
# REJECT chain for a userset
|
|
|
|
#
|
|
|
|
reject_chain() # $1 = userset
|
|
|
|
{
|
|
|
|
echo ${1}_rej
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Find hosts in a given zone
|
|
|
|
#
|
|
|
|
# Read hosts file and for each record matching the passed ZONE,
|
|
|
|
# echo the expanded contents of the "HOST(S)" column
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
find_hosts() # $1 = host zone
|
|
|
|
{
|
2003-07-06 17:31:26 +02:00
|
|
|
local hosts interface address addresses
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
while read z hosts options; do
|
2003-07-06 17:31:26 +02:00
|
|
|
if [ "x`expand $z`" = "x$1" ]; then
|
|
|
|
expandv hosts
|
|
|
|
interface=${hosts%:*}
|
|
|
|
addresses=${hosts#*:}
|
|
|
|
for address in `separate_list $addresses`; do
|
|
|
|
echo $interface:$address
|
|
|
|
done
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
done < $TMP_DIR/hosts
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Determine the interfaces on the firewall
|
|
|
|
#
|
|
|
|
# For each zone, create a variable called ${zone}_interfaces. This
|
|
|
|
# variable contains a space-separated list of interfaces to the zone
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
determine_interfaces() {
|
2002-05-18 21:04:45 +02:00
|
|
|
for zone in $zones; do
|
2002-05-01 01:13:15 +02:00
|
|
|
interfaces=`find_interfaces $zone`
|
|
|
|
interfaces=`echo $interfaces` # Remove extra trash
|
2003-02-20 00:52:03 +01:00
|
|
|
eval ${zone}_interfaces=\"\$interfaces\"
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
}
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Determine the defined hosts in each zone and generate report
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
determine_hosts() {
|
2003-02-08 21:58:44 +01:00
|
|
|
|
|
|
|
for zone in $zones; do
|
|
|
|
hosts=`find_hosts $zone`
|
|
|
|
hosts=`echo $hosts` # Remove extra trash
|
|
|
|
|
2002-07-06 00:24:40 +02:00
|
|
|
eval interfaces=\$${zone}_interfaces
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
for interface in $interfaces; do
|
2004-01-24 00:48:30 +01:00
|
|
|
eval options=\$`chain_base ${interface}`_options
|
|
|
|
|
|
|
|
if list_search detectnets $options; then
|
|
|
|
subnets=`get_routed_subnets $interface`
|
2002-05-01 01:13:15 +02:00
|
|
|
else
|
2004-01-24 00:48:30 +01:00
|
|
|
subnets=0.0.0.0/0
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
2004-01-24 00:48:30 +01:00
|
|
|
|
|
|
|
for subnet in $subnets; do
|
|
|
|
if [ -z "$hosts" ]; then
|
|
|
|
hosts=$interface:$subnet
|
|
|
|
else
|
|
|
|
hosts="$hosts $interface:$subnet"
|
|
|
|
fi
|
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
|
2002-07-09 17:44:49 +02:00
|
|
|
interfaces=
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-07-09 17:44:49 +02:00
|
|
|
for host in $hosts; do
|
|
|
|
interface=${host%:*}
|
|
|
|
if ! list_search $interface $interfaces; then
|
|
|
|
if [ -z "$interfaces" ]; then
|
|
|
|
interfaces=$interface
|
|
|
|
else
|
|
|
|
interfaces="$interfaces $interface"
|
|
|
|
fi
|
|
|
|
fi
|
2003-10-15 20:34:05 +02:00
|
|
|
|
|
|
|
[ "${host#*:}" = "0.0.0.0/0" ] || \
|
|
|
|
eval ${zone}_is_complex=Yes
|
2002-07-09 17:44:49 +02:00
|
|
|
done
|
|
|
|
|
|
|
|
eval ${zone}_interfaces="\$interfaces"
|
2002-05-01 01:13:15 +02:00
|
|
|
eval ${zone}_hosts="\$hosts"
|
|
|
|
|
|
|
|
if [ -n "$hosts" ]; then
|
|
|
|
eval display=\$${zone}_display
|
|
|
|
display_list "$display Zone:" $hosts
|
2002-05-18 21:04:45 +02:00
|
|
|
else
|
2002-05-30 14:55:47 +02:00
|
|
|
error_message "Warning: Zone $zone is empty"
|
2003-02-23 15:10:37 +01:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Ensure that the passed zone is defined in the zones file or is the firewall
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
validate_zone() # $1 = zone
|
|
|
|
{
|
2002-05-30 14:55:47 +02:00
|
|
|
list_search $1 $zones $FW
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Validate the zone names and options in the interfaces file
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
validate_interfaces_file() {
|
2004-01-24 00:48:30 +01:00
|
|
|
local wildcard
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
while read z interface subnet options; do
|
2002-07-06 00:24:40 +02:00
|
|
|
expandv z interface subnet options
|
|
|
|
r="$z $interface $subnet $options"
|
2002-12-07 04:21:32 +01:00
|
|
|
|
|
|
|
[ "x$z" = "x-" ] && z=
|
|
|
|
|
2003-02-23 15:10:37 +01:00
|
|
|
if [ -n "$z" ]; then
|
2002-12-07 04:21:32 +01:00
|
|
|
validate_zone $z || startup_error "Invalid zone ($z) in record \"$r\""
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-02-21 23:55:36 +01:00
|
|
|
if [ -n "`ip link show $interface 2> /dev/null | grep LOOPBACK`" ]; then
|
|
|
|
startup_error "The loopback interface ($interface) may not be defined in /etc/shorewall/interfaces"
|
|
|
|
fi
|
2002-12-05 18:29:56 +01:00
|
|
|
|
2002-06-18 17:44:17 +02:00
|
|
|
list_search $interface $all_interfaces && \
|
2003-02-08 21:58:44 +01:00
|
|
|
startup_error "Duplicate Interface $interface"
|
|
|
|
|
2004-01-24 00:48:30 +01:00
|
|
|
wildcard=
|
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
case $interface in
|
|
|
|
*:*)
|
|
|
|
startup_error "Invalid Interface Name: $interface"
|
|
|
|
;;
|
2004-01-24 00:48:30 +01:00
|
|
|
*+*)
|
|
|
|
wildcard=Yes
|
|
|
|
;;
|
2003-02-08 21:58:44 +01:00
|
|
|
esac
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-18 15:45:23 +02:00
|
|
|
all_interfaces="$all_interfaces $interface"
|
2002-12-07 04:21:32 +01:00
|
|
|
options=`separate_list $options`
|
2003-11-08 03:38:30 +01:00
|
|
|
iface=`chain_base $interface`
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-11-08 03:38:30 +01:00
|
|
|
eval ${iface}_broadcast="$subnet"
|
|
|
|
eval ${iface}_zone="$z"
|
|
|
|
eval ${iface}_options=\"$options\"
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-12-19 22:30:58 +01:00
|
|
|
for option in $options; do
|
2002-05-01 01:13:15 +02:00
|
|
|
case $option in
|
2003-08-24 03:24:23 +02:00
|
|
|
dhcp|norfc1918|tcpflags|newnotsyn|arp_filter|routefilter|blacklist|proxyarp|maclist|-)
|
2003-01-21 01:34:00 +01:00
|
|
|
;;
|
2004-01-24 00:48:30 +01:00
|
|
|
detectnets)
|
|
|
|
[ -n "$wildcard" ] && \
|
|
|
|
startup_error "The \"detectnets\" option may not be used with a wild-card interface"
|
|
|
|
;;
|
2003-08-24 03:24:23 +02:00
|
|
|
dropunclean|logunclean)
|
|
|
|
error_message \
|
|
|
|
"Warning: The 'dropunclean' and 'logunclean' options will be removed in a future release"
|
2003-01-21 01:34:00 +01:00
|
|
|
;;
|
2003-04-01 04:00:37 +02:00
|
|
|
routeback)
|
|
|
|
[ -n "$z" ] || startup_error "The routeback option may not be specified on a multi-zone interface"
|
|
|
|
eval ${z}_routeback=\"$interface:0.0.0.0/0 \$${z}_routeback\"
|
|
|
|
;;
|
2003-01-21 01:34:00 +01:00
|
|
|
*)
|
|
|
|
error_message "Warning: Invalid option ($option) in record \"$r\""
|
2003-01-27 03:54:43 +01:00
|
|
|
;;
|
2002-05-01 01:13:15 +02:00
|
|
|
esac
|
|
|
|
done
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
[ -z "$all_interfaces" ] && startup_error "No Interfaces Defined"
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
done < $TMP_DIR/interfaces
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Validate the zone names and options in the hosts file
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
validate_hosts_file() {
|
|
|
|
while read z hosts options; do
|
2002-07-06 00:24:40 +02:00
|
|
|
expandv z hosts options
|
2002-05-01 01:13:15 +02:00
|
|
|
r="$z $hosts $options"
|
|
|
|
validate_zone $z || startup_error "Invalid zone ($z) in record \"$r\""
|
|
|
|
|
2003-07-06 17:31:26 +02:00
|
|
|
interface=${hosts%:*}
|
|
|
|
|
|
|
|
list_search $interface $all_interfaces || \
|
|
|
|
startup_error "Unknown interface ($interface) in record \"$r\""
|
2002-06-29 01:42:00 +02:00
|
|
|
|
2003-07-06 17:31:26 +02:00
|
|
|
hosts=${hosts#*:}
|
2002-06-29 01:42:00 +02:00
|
|
|
|
2003-07-06 17:31:26 +02:00
|
|
|
for host in `separate_list $hosts`; do
|
2002-07-29 16:31:50 +02:00
|
|
|
for option in `separate_list $options`; do
|
|
|
|
case $option in
|
2003-02-08 21:58:44 +01:00
|
|
|
maclist|-)
|
2002-07-29 16:31:50 +02:00
|
|
|
;;
|
2003-04-01 04:00:37 +02:00
|
|
|
routeback)
|
2003-07-06 17:31:26 +02:00
|
|
|
eval ${z}_routeback=\"$interface:$host \$${z}_routeback\"
|
2003-04-01 04:00:37 +02:00
|
|
|
;;
|
2002-07-29 16:31:50 +02:00
|
|
|
*)
|
|
|
|
error_message "Warning: Invalid option ($option) in record \"$r\""
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
done < $TMP_DIR/hosts
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Format a match by the passed MAC address
|
|
|
|
# The passed address begins with "~" and uses "-" as a separator between bytes
|
|
|
|
# Example: ~01-02-03-04-05-06
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
mac_match() # $1 = MAC address formated as described above
|
|
|
|
{
|
|
|
|
echo "--match mac --mac-source `echo $1 | sed 's/~//;s/-/:/g'`"
|
2003-02-23 15:10:37 +01:00
|
|
|
}
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# validate the policy file
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
validate_policy()
|
|
|
|
{
|
2002-12-07 04:21:32 +01:00
|
|
|
local clientwild
|
|
|
|
local serverwild
|
|
|
|
local zone
|
|
|
|
local zone1
|
|
|
|
local pc
|
|
|
|
local chain
|
2002-12-31 02:10:28 +01:00
|
|
|
local policy
|
|
|
|
local loglevel
|
|
|
|
local synparams
|
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
print_policy() # $1 = source zone, $2 = destination zone
|
|
|
|
{
|
|
|
|
[ $command != check ] || \
|
2003-10-26 17:22:01 +01:00
|
|
|
[ $1 = $2 ] || \
|
2003-02-27 23:28:06 +01:00
|
|
|
[ $1 = all ] || \
|
|
|
|
[ $2 = all ] || \
|
2003-07-16 05:07:38 +02:00
|
|
|
echo " Policy for $1 to $2 is $policy using chain $chain"
|
2003-02-27 23:28:06 +01:00
|
|
|
}
|
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
all_policy_chains=
|
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
strip_file policy
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
while read client server policy loglevel synparams; do
|
2002-07-06 00:24:40 +02:00
|
|
|
expandv client server policy loglevel synparams
|
2002-12-07 04:21:32 +01:00
|
|
|
|
|
|
|
clientwild=
|
|
|
|
serverwild=
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
case "$client" in
|
|
|
|
all|ALL)
|
2002-12-07 04:21:32 +01:00
|
|
|
clientwild=Yes
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
if ! validate_zone $client; then
|
2003-02-08 21:58:44 +01:00
|
|
|
startup_error "Undefined zone $client"
|
2002-07-06 00:24:40 +02:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
esac
|
|
|
|
|
|
|
|
case "$server" in
|
|
|
|
all|ALL)
|
2002-12-07 04:21:32 +01:00
|
|
|
serverwild=Yes
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
if ! validate_zone $server; then
|
2003-02-08 21:58:44 +01:00
|
|
|
startup_error "Undefined zone $server"
|
2002-07-06 00:24:40 +02:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
esac
|
|
|
|
|
|
|
|
case $policy in
|
2003-11-08 03:38:30 +01:00
|
|
|
ACCEPT|REJECT|DROP|CONTINUE)
|
|
|
|
;;
|
|
|
|
NONE)
|
|
|
|
[ "$client" = "$FW" -o "$server" = "$FW" ] && \
|
|
|
|
startup_error " $client $server $policy $loglevel $synparams: NONE policy not allowed to/from the $FW zone"
|
|
|
|
|
|
|
|
[ -n "$clientwild" -o -n "$serverwild" ] && \
|
|
|
|
startup_error " $client $server $policy $loglevel $synparams: NONE policy not allowed with \"all\""
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
|
|
|
*)
|
2003-02-08 21:58:44 +01:00
|
|
|
startup_error "Invalid policy $policy"
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
2002-07-06 00:24:40 +02:00
|
|
|
esac
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-11-13 01:57:48 +01:00
|
|
|
chain=${client}2${server}
|
|
|
|
|
2003-03-21 20:49:40 +01:00
|
|
|
[ "x$chain" = "x${FW}2${FW}" ] && \
|
|
|
|
startup_error "fw->fw policy not allowed: $policy"
|
|
|
|
|
2002-11-13 01:57:48 +01:00
|
|
|
if is_policy_chain $chain ; then
|
2003-02-08 21:58:44 +01:00
|
|
|
startup_error "Duplicate policy $policy"
|
2002-11-13 01:57:48 +01:00
|
|
|
fi
|
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
[ "x$loglevel" = "x-" ] && loglevel=
|
|
|
|
|
2003-03-21 05:14:20 +01:00
|
|
|
[ $policy = NONE ] || all_policy_chains="$all_policy_chains $chain"
|
2002-12-07 04:21:32 +01:00
|
|
|
|
|
|
|
eval ${chain}_is_policy=Yes
|
|
|
|
eval ${chain}_policy=$policy
|
|
|
|
eval ${chain}_loglevel=$loglevel
|
|
|
|
eval ${chain}_synparams=$synparams
|
|
|
|
|
|
|
|
if [ -n "${clientwild}" ]; then
|
|
|
|
if [ -n "${serverwild}" ]; then
|
2002-12-13 04:23:46 +01:00
|
|
|
for zone in $zones $FW all; do
|
|
|
|
for zone1 in $zones $FW all; do
|
2002-12-07 04:21:32 +01:00
|
|
|
eval pc=\$${zone}2${zone1}_policychain
|
|
|
|
|
2002-12-31 02:10:28 +01:00
|
|
|
if [ -z "$pc" ]; then
|
2002-12-07 04:21:32 +01:00
|
|
|
eval ${zone}2${zone1}_policychain=$chain
|
2003-03-21 05:14:20 +01:00
|
|
|
eval ${zone}2${zone1}_policy=$policy
|
2003-02-27 23:28:06 +01:00
|
|
|
print_policy $zone $zone1
|
2002-12-31 02:10:28 +01:00
|
|
|
fi
|
2002-12-07 04:21:32 +01:00
|
|
|
done
|
|
|
|
done
|
|
|
|
else
|
2002-12-13 04:23:46 +01:00
|
|
|
for zone in $zones $FW all; do
|
2002-12-07 04:21:32 +01:00
|
|
|
eval pc=\$${zone}2${server}_policychain
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-12-31 02:10:28 +01:00
|
|
|
if [ -z "$pc" ]; then
|
2002-12-07 04:21:32 +01:00
|
|
|
eval ${zone}2${server}_policychain=$chain
|
2003-03-21 05:14:20 +01:00
|
|
|
eval ${zone}2${server}_policy=$policy
|
2003-02-27 23:28:06 +01:00
|
|
|
print_policy $zone $server
|
2002-12-31 02:10:28 +01:00
|
|
|
fi
|
2002-12-07 04:21:32 +01:00
|
|
|
done
|
|
|
|
fi
|
|
|
|
elif [ -n "$serverwild" ]; then
|
2002-12-13 04:23:46 +01:00
|
|
|
for zone in $zones $FW all; do
|
2002-12-07 04:21:32 +01:00
|
|
|
eval pc=\$${client}2${zone}_policychain
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-12-31 02:10:28 +01:00
|
|
|
if [ -z "$pc" ]; then
|
2003-02-23 15:10:37 +01:00
|
|
|
eval ${client}2${zone}_policychain=$chain
|
2003-03-21 05:14:20 +01:00
|
|
|
eval ${client}2${zone}_policy=$policy
|
2003-02-27 23:28:06 +01:00
|
|
|
print_policy $client $zone
|
2002-12-31 02:10:28 +01:00
|
|
|
fi
|
2002-12-07 04:21:32 +01:00
|
|
|
done
|
|
|
|
else
|
|
|
|
eval ${chain}_policychain=${chain}
|
2003-02-27 23:28:06 +01:00
|
|
|
print_policy $client $server
|
2003-02-23 15:10:37 +01:00
|
|
|
fi
|
2002-11-13 01:57:48 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
done < $TMP_DIR/policy
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Find broadcast addresses
|
|
|
|
#
|
2002-05-18 21:04:45 +02:00
|
|
|
find_broadcasts() {
|
2002-12-07 04:21:32 +01:00
|
|
|
for interface in $all_interfaces; do
|
2003-01-29 03:56:39 +01:00
|
|
|
eval bcast=\$`chain_base $interface`_broadcast
|
2002-05-18 21:04:45 +02:00
|
|
|
if [ "x$bcast" = "xdetect" ]; then
|
2004-01-24 00:48:30 +01:00
|
|
|
addr="`ip -f inet addr show $interface 2> /dev/null`"
|
2002-05-18 21:04:45 +02:00
|
|
|
if [ -n "`echo "$addr" | grep 'inet.*brd '`" ]; then
|
|
|
|
addr="`echo "$addr" | \
|
|
|
|
grep "inet " | sed 's/^.* inet.*brd //;s/scope.*//'`"
|
|
|
|
echo $addr | cut -d' ' -f 1
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
2002-05-18 21:04:45 +02:00
|
|
|
elif [ "x${bcast}" != "x-" ]; then
|
|
|
|
echo `separate_list $bcast`
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
2002-12-07 04:21:32 +01:00
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Find interface address--returns the first IP address assigned to the passed
|
|
|
|
# device
|
|
|
|
#
|
2002-07-09 17:44:49 +02:00
|
|
|
find_interface_address() # $1 = interface
|
|
|
|
{
|
2003-02-23 15:10:37 +01:00
|
|
|
#
|
2002-07-09 17:44:49 +02:00
|
|
|
# get the line of output containing the first IP address
|
|
|
|
#
|
2003-08-28 20:02:59 +02:00
|
|
|
addr=`ip -f inet addr show $1 2> /dev/null | grep inet | head -n1`
|
2002-07-09 17:44:49 +02:00
|
|
|
#
|
|
|
|
# If there wasn't one, bail out now
|
|
|
|
#
|
|
|
|
[ -n "$addr" ] || fatal_error "Can't determine the IP address of $1"
|
|
|
|
#
|
|
|
|
# Strip off the trailing VLSM mask (or the peer IP in case of a P-t-P link)
|
|
|
|
# along with everything else on the line
|
|
|
|
#
|
|
|
|
echo $addr | sed 's/inet //;s/\/.*//;s/ peer.*//'
|
|
|
|
}
|
|
|
|
|
2003-06-23 00:56:25 +02:00
|
|
|
#
|
|
|
|
# Find interface addresses--returns the set of addresses assigned to the passed
|
|
|
|
# device
|
|
|
|
#
|
|
|
|
find_interface_addresses() # $1 = interface
|
|
|
|
{
|
2003-08-28 20:02:59 +02:00
|
|
|
ip -f inet addr show $1 | grep inet | sed 's/inet //;s/\/.*//;s/ peer.*//'
|
2003-06-23 00:56:25 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Find interfaces that have the passed option specified
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
find_interfaces_by_option() # $1 = option
|
|
|
|
{
|
2002-12-07 04:21:32 +01:00
|
|
|
for interface in $all_interfaces; do
|
|
|
|
eval options=\$`chain_base ${interface}`_options
|
|
|
|
list_search $1 $options && echo $interface
|
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Find hosts with the passed option
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
find_hosts_by_option() # $1 = option
|
|
|
|
{
|
2003-07-06 18:27:40 +02:00
|
|
|
local ignore hosts interface address addresses options
|
2003-07-06 18:10:23 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
while read ignore hosts options; do
|
|
|
|
expandv options
|
2003-07-06 18:10:23 +02:00
|
|
|
if list_search $1 `separate_list $options`; then
|
|
|
|
expandv hosts
|
|
|
|
interface=${hosts%:*}
|
|
|
|
addresses=${hosts#*:}
|
|
|
|
for address in `separate_list $addresses`; do
|
|
|
|
echo $interface:$address
|
|
|
|
done
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
done < $TMP_DIR/hosts
|
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
for interface in $all_interfaces; do
|
|
|
|
eval options=\$`chain_base ${interface}`_options
|
2002-12-20 22:10:53 +01:00
|
|
|
list_search $1 $options && \
|
2002-12-07 04:21:32 +01:00
|
|
|
echo ${interface}:0.0.0.0/0
|
2003-02-23 15:10:37 +01:00
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Determine if there are interfaces of the given zone and option
|
|
|
|
#
|
|
|
|
# Returns zero if any such interfaces are found and returns one otherwise.
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
have_interfaces_in_zone_with_option() # $1 = zone, $2 = option
|
|
|
|
{
|
|
|
|
local zne=$1
|
2002-12-07 04:21:32 +01:00
|
|
|
local z
|
|
|
|
local interface
|
|
|
|
|
|
|
|
for interface in $all_interfaces; do
|
|
|
|
eval z=\$`chain_base ${interface}`_zone
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
[ "x$z" = "x$zne" ] && \
|
|
|
|
list_search $1 $options && \
|
2002-05-30 14:55:47 +02:00
|
|
|
return 0
|
2002-12-07 04:21:32 +01:00
|
|
|
done
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Flush and delete all user-defined chains in the filter table
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
deleteallchains() {
|
|
|
|
run_iptables -F
|
|
|
|
run_iptables -X
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Source a user exit file if it exists
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
run_user_exit() # $1 = file name
|
|
|
|
{
|
|
|
|
local user_exit=`find_file $1`
|
|
|
|
|
|
|
|
if [ -f $user_exit ]; then
|
2002-07-06 00:24:40 +02:00
|
|
|
echo "Processing $user_exit ..."
|
2002-05-01 01:13:15 +02:00
|
|
|
. $user_exit
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2003-05-21 23:36:05 +02:00
|
|
|
#
|
|
|
|
# Add a logging rule.
|
|
|
|
#
|
2003-08-22 17:27:08 +02:00
|
|
|
log_rule_limit() # $1 = log level, $2 = chain, $3 = disposition , $4 = rate limit $... = predicates for the rule
|
2003-05-21 23:36:05 +02:00
|
|
|
{
|
|
|
|
local level=$1
|
|
|
|
local chain=$2
|
|
|
|
local disposition=$3
|
|
|
|
local rulenum=
|
2003-10-08 16:53:26 +02:00
|
|
|
local limit="${4:-$LOGLIMIT}"
|
2003-05-21 23:36:05 +02:00
|
|
|
|
2003-08-22 17:27:08 +02:00
|
|
|
shift;shift;shift;shift
|
2003-05-21 23:36:05 +02:00
|
|
|
|
2003-05-27 19:42:12 +02:00
|
|
|
if [ -n "$LOGRULENUMBERS" ]; then
|
|
|
|
eval rulenum=\$${chain}_logrules
|
2003-05-21 23:36:05 +02:00
|
|
|
|
2003-05-27 19:42:12 +02:00
|
|
|
[ -z "$rulenum" ] && rulenum=1
|
2003-05-21 23:36:05 +02:00
|
|
|
|
2003-05-27 19:42:12 +02:00
|
|
|
case $level in
|
|
|
|
ULOG)
|
2003-08-22 17:27:08 +02:00
|
|
|
eval iptables -A $chain $@ $limit -j ULOG $LOGPARMS --ulog-prefix '"`printf "$LOGFORMAT" $chain $rulenum $disposition`"'
|
2003-05-27 19:42:12 +02:00
|
|
|
;;
|
|
|
|
*)
|
2003-08-22 17:27:08 +02:00
|
|
|
eval iptables -A $chain $@ $limit -j LOG $LOGPARMS --log-level $level --log-prefix '"`printf "$LOGFORMAT" $chain $rulenum $disposition`"'
|
2003-05-27 19:42:12 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
if [ $? -ne 0 ] ; then
|
|
|
|
[ -z "$stopping" ] && { stop_firewall; exit 2; }
|
|
|
|
fi
|
2003-05-21 23:36:05 +02:00
|
|
|
|
2003-05-27 19:42:12 +02:00
|
|
|
rulenum=$(($rulenum + 1))
|
2003-05-21 23:36:05 +02:00
|
|
|
|
2003-05-27 19:42:12 +02:00
|
|
|
eval ${chain}_logrules=$rulenum
|
|
|
|
else
|
|
|
|
case $level in
|
|
|
|
ULOG)
|
2003-08-22 17:27:08 +02:00
|
|
|
eval iptables -A $chain $@ $limit -j ULOG $LOGPARMS --ulog-prefix '"`printf "$LOGFORMAT" $chain $disposition`"'
|
2003-05-27 19:42:12 +02:00
|
|
|
;;
|
|
|
|
*)
|
2003-08-22 17:27:08 +02:00
|
|
|
eval iptables -A $chain $@ $limit -j LOG $LOGPARMS --log-level $level --log-prefix '"`printf "$LOGFORMAT" $chain $disposition`"'
|
2003-05-27 19:42:12 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
if [ $? -ne 0 ] ; then
|
|
|
|
[ -z "$stopping" ] && { stop_firewall; exit 2; }
|
|
|
|
fi
|
|
|
|
fi
|
2003-05-21 23:36:05 +02:00
|
|
|
}
|
|
|
|
|
2003-08-22 17:27:08 +02:00
|
|
|
log_rule() # $1 = log level, $2 = chain, $3 = disposition , $... = predicates for the rule
|
|
|
|
{
|
|
|
|
local level=$1
|
|
|
|
local chain=$2
|
|
|
|
local disposition=$3
|
|
|
|
|
|
|
|
shift;shift;shift
|
|
|
|
|
|
|
|
log_rule_limit $level $chain $disposition "$LOGLIMIT" $@
|
|
|
|
}
|
|
|
|
|
2003-11-27 19:24:57 +01:00
|
|
|
#
|
|
|
|
# Set /proc/sys/net/ipv4/ip_forward based on $IP_FORWARDING
|
|
|
|
#
|
|
|
|
setup_forwarding() {
|
|
|
|
case "$IP_FORWARDING" in
|
|
|
|
[Oo][Nn])
|
|
|
|
echo 1 > /proc/sys/net/ipv4/ip_forward
|
|
|
|
echo "IP Forwarding Enabled"
|
|
|
|
;;
|
|
|
|
[Oo][Ff][Ff])
|
|
|
|
echo 0 > /proc/sys/net/ipv4/ip_forward
|
|
|
|
echo "IP Forwarding Disabled!"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Stop the Firewall
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
stop_firewall() {
|
2002-12-05 00:53:03 +01:00
|
|
|
#
|
|
|
|
# Turn off trace unless we were tracing "stop" or "clear"
|
|
|
|
#
|
|
|
|
case $command in
|
|
|
|
stop|clear)
|
|
|
|
;;
|
2003-02-27 23:28:06 +01:00
|
|
|
check)
|
|
|
|
kill $$
|
|
|
|
exit 2
|
|
|
|
;;
|
2002-12-05 00:53:03 +01:00
|
|
|
*)
|
|
|
|
set +x
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
stopping="Yes"
|
|
|
|
|
2003-02-23 15:10:37 +01:00
|
|
|
terminator=
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
deletechain shorewall
|
|
|
|
|
|
|
|
run_user_exit stop
|
|
|
|
|
|
|
|
[ -n "$MANGLE_ENABLED" ] && \
|
|
|
|
run_iptables -t mangle -F && \
|
|
|
|
run_iptables -t mangle -X
|
|
|
|
|
|
|
|
[ -n "$NAT_ENABLED" ] && delete_nat
|
|
|
|
delete_proxy_arp
|
2002-12-31 17:04:31 +01:00
|
|
|
[ -n "$CLEAR_TC" ] && delete_tc
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-07-30 01:04:04 +02:00
|
|
|
if [ -z "$ADMINISABSENTMINDED" ]; then
|
|
|
|
for chain in INPUT OUTPUT FORWARD; do
|
|
|
|
setpolicy $chain DROP
|
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-07-30 01:04:04 +02:00
|
|
|
deleteallchains
|
|
|
|
else
|
|
|
|
for chain in INPUT FORWARD; do
|
|
|
|
setpolicy $chain DROP
|
|
|
|
done
|
|
|
|
|
|
|
|
setpolicy OUTPUT ACCEPT
|
|
|
|
|
|
|
|
deleteallchains
|
|
|
|
|
|
|
|
for chain in INPUT FORWARD; do
|
|
|
|
setcontinue $chain
|
|
|
|
done
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
hosts=
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-02-23 15:10:37 +01:00
|
|
|
strip_file routestopped
|
2002-07-11 02:01:45 +02:00
|
|
|
|
|
|
|
while read interface host; do
|
2002-07-11 18:15:40 +02:00
|
|
|
expandv interface host
|
2003-06-02 20:08:35 +02:00
|
|
|
[ "x$host" = "x-" -o -z "$host" ] && host=0.0.0.0/0
|
2003-02-20 00:52:03 +01:00
|
|
|
for h in `separate_list $host`; do
|
|
|
|
hosts="$hosts $interface:$h"
|
|
|
|
done
|
2002-07-11 02:01:45 +02:00
|
|
|
done < $TMP_DIR/routestopped
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
for host in $hosts; do
|
|
|
|
interface=${host%:*}
|
|
|
|
subnet=${host#*:}
|
|
|
|
iptables -A INPUT -i $interface -s $subnet -j ACCEPT
|
2003-07-30 01:04:04 +02:00
|
|
|
[ -z "$ADMINISABSENTMINDED" ] && \
|
|
|
|
iptables -A OUTPUT -o $interface -d $subnet -j ACCEPT
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
for host1 in $hosts; do
|
|
|
|
[ "$host" != "$host1" ] && \
|
|
|
|
iptables -A FORWARD -i $interface -s $subnet \
|
|
|
|
-o ${host1%:*} -d ${host1#*:} -j ACCEPT
|
|
|
|
done
|
|
|
|
done
|
|
|
|
|
|
|
|
iptables -A INPUT -i lo -j ACCEPT
|
2003-07-30 01:04:04 +02:00
|
|
|
[ -z "$ADMINISABSENTMINDED" ] && \
|
|
|
|
iptables -A OUTPUT -o lo -j ACCEPT
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
for interface in `find_interfaces_by_option dhcp`; do
|
|
|
|
iptables -A INPUT -p udp -i $interface --dport 67:68 -j ACCEPT
|
2003-07-30 01:04:04 +02:00
|
|
|
[ -z "$ADMINISABSENTMINDED" ] && \
|
|
|
|
iptables -A OUTPUT -p udp -o $interface --dport 67:68 -j ACCEPT
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
|
2003-11-27 19:24:57 +01:00
|
|
|
setup_forwarding
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-07-11 18:15:40 +02:00
|
|
|
run_user_exit stopped
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
logger "Shorewall Stopped"
|
|
|
|
|
|
|
|
rm -rf $TMP_DIR
|
|
|
|
|
|
|
|
case $command in
|
|
|
|
stop|clear)
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
#
|
|
|
|
# The firewall is being stopped when we were trying to do something
|
|
|
|
# else. Remove the lock file and Kill the shell in case we're in a
|
|
|
|
# subshell
|
|
|
|
#
|
|
|
|
my_mutex_off
|
2002-07-06 00:24:40 +02:00
|
|
|
kill $$
|
|
|
|
;;
|
2002-05-01 01:13:15 +02:00
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Remove all rules and remove all user-defined chains
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
clear_firewall() {
|
|
|
|
stop_firewall
|
|
|
|
|
2002-06-18 19:53:24 +02:00
|
|
|
run_iptables -F
|
|
|
|
|
2002-06-18 19:56:00 +02:00
|
|
|
echo 1 > /proc/sys/net/ipv4/ip_forward
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
setpolicy INPUT ACCEPT
|
|
|
|
setpolicy FORWARD ACCEPT
|
|
|
|
setpolicy OUTPUT ACCEPT
|
|
|
|
|
|
|
|
run_user_exit clear
|
|
|
|
|
|
|
|
logger "Shorewall Cleared"
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Set up ipsec tunnels
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
setup_tunnels() # $1 = name of tunnels file
|
|
|
|
{
|
|
|
|
local inchain
|
|
|
|
local outchain
|
|
|
|
|
2002-10-10 15:29:06 +02:00
|
|
|
setup_one_ipsec() # $1 = gateway $2 = Tunnel Kind $3 = gateway zones
|
2002-05-01 01:13:15 +02:00
|
|
|
{
|
2002-05-18 15:45:23 +02:00
|
|
|
options="-m state --state NEW -j ACCEPT"
|
2002-09-30 19:48:20 +02:00
|
|
|
addrule $inchain -p 50 -s $1 -j ACCEPT
|
|
|
|
addrule $outchain -p 50 -d $1 -j ACCEPT
|
|
|
|
run_iptables -A $inchain -p 51 -s $1 -j ACCEPT
|
|
|
|
run_iptables -A $outchain -p 51 -d $1 -j ACCEPT
|
2002-06-21 17:57:01 +02:00
|
|
|
|
2002-10-11 19:19:06 +02:00
|
|
|
run_iptables -A $outchain -p udp -d $1 --dport 500 --sport 500 $options
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-10 15:29:06 +02:00
|
|
|
if [ $2 = ipsec ]; then
|
|
|
|
run_iptables -A $inchain -p udp -s $1 --sport 500 --dport 500 $options
|
|
|
|
else
|
|
|
|
run_iptables -A $inchain -p udp -s $1 --dport 500 $options
|
2003-01-07 17:26:41 +01:00
|
|
|
run_iptables -A $inchain -p udp -s $1 --dport 4500 $options
|
2002-10-10 15:29:06 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
for z in `separate_list $3`; do
|
2002-10-01 22:54:42 +02:00
|
|
|
if validate_zone $z; then
|
2002-10-11 19:19:06 +02:00
|
|
|
addrule ${FW}2${z} -p udp --sport 500 --dport 500 $options
|
2003-01-07 17:26:41 +01:00
|
|
|
if [ $2 = ipsec ]; then
|
|
|
|
addrule ${z}2${FW} -p udp --sport 500 --dport 500 $options
|
|
|
|
else
|
|
|
|
addrule ${z}2${FW} -p udp --dport 500 $options
|
|
|
|
addrule ${z}2${FW} -p udp --dport 4500 $options
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
else
|
2002-10-01 22:54:42 +02:00
|
|
|
error_message "Warning: Invalid gateway zone ($z)" \
|
2002-05-01 01:13:15 +02:00
|
|
|
" -- Tunnel \"$tunnel\" may encounter keying problems"
|
|
|
|
fi
|
2002-10-01 22:54:42 +02:00
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-07-06 16:05:30 +02:00
|
|
|
echo " IPSEC tunnel to $gateway defined."
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-06-21 17:57:01 +02:00
|
|
|
setup_one_other() # $1 = TYPE, $2 = gateway, $3 = protocol
|
2002-05-01 01:13:15 +02:00
|
|
|
{
|
2002-09-30 19:48:20 +02:00
|
|
|
addrule $inchain -p $3 -s $2 -j ACCEPT
|
|
|
|
addrule $outchain -p $3 -d $2 -j ACCEPT
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-10-15 00:26:28 +02:00
|
|
|
echo " $1 tunnel to $2 defined."
|
|
|
|
}
|
|
|
|
|
|
|
|
setup_pptp_client() # $1 = gateway
|
|
|
|
{
|
|
|
|
addrule $outchain -p 47 -d $1 -j ACCEPT
|
2002-11-24 19:40:51 +01:00
|
|
|
addrule $inchain -p 47 -j ACCEPT
|
2002-10-15 00:26:28 +02:00
|
|
|
addrule $outchain -p tcp --dport 1723 -d $1 -j ACCEPT
|
|
|
|
|
|
|
|
echo " PPTP tunnel to $1 defined."
|
|
|
|
}
|
|
|
|
|
|
|
|
setup_pptp_server()
|
|
|
|
{
|
2002-11-24 19:40:51 +01:00
|
|
|
addrule $inchain -p 47 -j ACCEPT
|
|
|
|
addrule $outchain -p 47 -j ACCEPT
|
|
|
|
addrule $inchain -p tcp --dport 1723 -j ACCEPT
|
2002-10-15 00:26:28 +02:00
|
|
|
|
|
|
|
echo " PPTP server defined."
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2003-02-04 17:59:49 +01:00
|
|
|
setup_one_openvpn() # $1 = gateway, $2 = kind[:port]
|
2003-01-31 20:10:22 +01:00
|
|
|
{
|
|
|
|
case $2 in
|
|
|
|
*:*)
|
|
|
|
p=${2#*:}
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
p=5000
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-02-04 17:59:49 +01:00
|
|
|
addrule $inchain -p udp -s $1 --sport $p --dport $p -j ACCEPT
|
|
|
|
addrule $outchain -p udp -d $1 --sport $p --dport $p -j ACCEPT
|
2003-01-31 20:10:22 +01:00
|
|
|
|
|
|
|
echo " OPENVPN tunnel to $1:$p defined."
|
|
|
|
}
|
|
|
|
|
2003-08-07 01:50:33 +02:00
|
|
|
setup_one_generic() # $1 = gateway, $2 = kind:protocol[:port], $3 = Gateway Zone
|
2003-08-06 02:06:44 +02:00
|
|
|
{
|
|
|
|
local procotol
|
|
|
|
local p=
|
|
|
|
|
|
|
|
case $2 in
|
|
|
|
*:*:*)
|
|
|
|
p=${2##*:}
|
2003-08-14 15:57:09 +02:00
|
|
|
protocol=${2%:*}
|
|
|
|
protocol=${protocol#*:}
|
2003-08-06 02:06:44 +02:00
|
|
|
;;
|
|
|
|
*:*)
|
|
|
|
protocol=${2#*:}
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
protocol=udp
|
|
|
|
p=5000
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-08-07 01:50:33 +02:00
|
|
|
p=${p:+--dport $p}
|
2003-08-06 02:06:44 +02:00
|
|
|
|
|
|
|
addrule $inchain -p $protocol -s $1 $p -j ACCEPT
|
|
|
|
addrule $outchain -p $protocol -d $1 $p -j ACCEPT
|
|
|
|
|
2003-08-07 01:50:33 +02:00
|
|
|
for z in `separate_list $3`; do
|
|
|
|
if validate_zone $z; then
|
|
|
|
addrule ${FW}2${z} -p $protocol $p -j ACCEPT
|
|
|
|
addrule ${z}2${FW} -p $protocol $p -j ACCEPT
|
|
|
|
else
|
|
|
|
error_message "Warning: Invalid gateway zone ($z)" \
|
|
|
|
" -- Tunnel \"$tunnel\" may encounter problems"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
2003-08-06 02:06:44 +02:00
|
|
|
echo " GENERIC tunnel to $1:$p defined."
|
|
|
|
}
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
strip_file tunnels $1
|
|
|
|
|
|
|
|
while read kind z gateway z1; do
|
2002-07-06 00:24:40 +02:00
|
|
|
expandv kind z gateway z1
|
2002-05-01 01:13:15 +02:00
|
|
|
tunnel="`echo $kind $z $gateway $z1`"
|
2002-07-06 00:24:40 +02:00
|
|
|
if validate_zone $z; then
|
2002-06-21 17:57:01 +02:00
|
|
|
inchain=${z}2${FW}
|
|
|
|
outchain=${FW}2${z}
|
|
|
|
case $kind in
|
|
|
|
ipsec|IPSEC)
|
2002-10-10 15:29:06 +02:00
|
|
|
setup_one_ipsec $gateway ipsec $z1
|
|
|
|
;;
|
|
|
|
ipsecnat|IPSECNAT)
|
|
|
|
setup_one_ipsec $gateway ipsecnat $z1
|
2002-06-21 17:57:01 +02:00
|
|
|
;;
|
|
|
|
ipip|IPIP)
|
|
|
|
setup_one_other IPIP $gateway 4
|
|
|
|
;;
|
|
|
|
gre|GRE)
|
2002-10-15 00:26:28 +02:00
|
|
|
setup_one_other GRE $gateway 47
|
|
|
|
;;
|
2003-04-21 17:12:59 +02:00
|
|
|
6to4|6TO4)
|
|
|
|
setup_one_other 6to4 $gateway 41
|
|
|
|
;;
|
2002-10-15 00:26:28 +02:00
|
|
|
pptpclient|PPTPCLIENT)
|
|
|
|
setup_pptp_client $gateway
|
|
|
|
;;
|
|
|
|
pptpserver|PPTPSERVER)
|
|
|
|
setup_pptp_server
|
2002-06-21 17:57:01 +02:00
|
|
|
;;
|
2003-02-04 17:59:49 +01:00
|
|
|
openvpn|OPENVPN|openvpn:*|OPENVPN:*)
|
|
|
|
setup_one_openvpn $gateway $kind
|
2003-01-31 20:10:22 +01:00
|
|
|
;;
|
2003-08-06 02:06:44 +02:00
|
|
|
generic:*|GENERIC:*)
|
2003-08-07 01:50:33 +02:00
|
|
|
setup_one_generic $gateway $kind $z1
|
2003-08-06 02:06:44 +02:00
|
|
|
;;
|
2002-06-21 17:57:01 +02:00
|
|
|
*)
|
|
|
|
error_message "Tunnels of type $kind are not supported:" \
|
|
|
|
"Tunnel \"$tunnel\" Ignored"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
else
|
|
|
|
error_message "Invalid gateway zone ($z)" \
|
|
|
|
" -- Tunnel \"$tunnel\" Ignored"
|
2003-02-23 15:10:37 +01:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
done < $TMP_DIR/tunnels
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Setup Proxy ARP
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
setup_proxy_arp() {
|
|
|
|
|
|
|
|
print_error() {
|
|
|
|
error_message "Invalid value for HAVEROUTE - ($haveroute)"
|
|
|
|
error_message "Entry \"$address $interface $external $haveroute\" ignored"
|
|
|
|
}
|
|
|
|
|
|
|
|
setup_one_proxy_arp() {
|
2002-07-06 00:24:40 +02:00
|
|
|
case $haveroute in
|
2002-05-01 01:13:15 +02:00
|
|
|
[Nn][Oo])
|
|
|
|
haveroute=
|
|
|
|
;;
|
2002-07-06 00:24:40 +02:00
|
|
|
[Yy][Ee][Ss])
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
2002-07-06 00:24:40 +02:00
|
|
|
*)
|
2002-05-01 01:13:15 +02:00
|
|
|
if [ -n "$haveroute" ]; then
|
2002-07-06 00:24:40 +02:00
|
|
|
print_error
|
2002-05-01 01:13:15 +02:00
|
|
|
return
|
2002-07-06 00:24:40 +02:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-09-16 21:44:49 +02:00
|
|
|
[ -z "$haveroute" ] && run_ip route replace $address dev $interface
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
run_arp -Ds $address $external pub
|
|
|
|
|
|
|
|
echo 1 > /proc/sys/net/ipv4/conf/$interface/proxy_arp
|
|
|
|
echo 0 > /proc/sys/net/ipv4/conf/$external/proxy_arp
|
|
|
|
|
|
|
|
echo $address $interface $external $haveroute >> ${STATEDIR}/proxyarp
|
|
|
|
|
2002-07-06 16:05:30 +02:00
|
|
|
echo " Host $address connected to $interface added to ARP on $external"
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
> ${STATEDIR}/proxyarp
|
|
|
|
|
|
|
|
while read address interface external haveroute; do
|
|
|
|
expandv address interface external haveroute
|
|
|
|
setup_one_proxy_arp
|
|
|
|
done < $TMP_DIR/proxyarp
|
2002-07-25 17:05:21 +02:00
|
|
|
|
|
|
|
interfaces=`find_interfaces_by_option proxyarp`
|
|
|
|
|
|
|
|
for interface in $interfaces; do
|
2002-08-05 00:54:49 +02:00
|
|
|
if echo 1 > /proc/sys/net/ipv4/conf/$interface/proxy_arp 2> /dev/null; then
|
2002-07-25 17:05:21 +02:00
|
|
|
echo " Enabled proxy ARP on $interface"
|
|
|
|
else
|
|
|
|
error_message "Warning: Unable to enable proxy ARP on $interface"
|
|
|
|
fi
|
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Set up MAC Verification
|
|
|
|
#
|
2002-10-22 20:07:52 +02:00
|
|
|
setup_mac_lists() {
|
2002-10-23 03:22:48 +02:00
|
|
|
local interface
|
|
|
|
local mac
|
2002-10-24 02:47:43 +02:00
|
|
|
local addresses
|
2002-10-23 03:22:48 +02:00
|
|
|
local address
|
|
|
|
local chain
|
|
|
|
local logpart
|
2002-10-24 02:47:43 +02:00
|
|
|
local macpart
|
2002-10-23 03:22:48 +02:00
|
|
|
local blob
|
|
|
|
local hosts
|
|
|
|
#
|
|
|
|
# Generate the list of interfaces having MAC verification
|
|
|
|
#
|
|
|
|
maclist_interfaces=
|
2002-10-22 20:07:52 +02:00
|
|
|
|
2002-10-23 03:22:48 +02:00
|
|
|
for hosts in $maclist_hosts; do
|
|
|
|
interface=${hosts%:*}
|
|
|
|
if ! list_search $interface $maclist_interfaces; then\
|
|
|
|
if [ -z "$maclist_interfaces" ]; then
|
|
|
|
maclist_interfaces=$interface
|
|
|
|
else
|
|
|
|
maclist_interfaces="$maclist_interfaces $interface"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
echo "Setting up MAC Verification on $maclist_interfaces..."
|
|
|
|
#
|
|
|
|
# Be sure that they are all ethernet interfaces
|
|
|
|
#
|
2002-10-22 20:07:52 +02:00
|
|
|
for interface in $maclist_interfaces; do
|
2002-10-23 03:22:48 +02:00
|
|
|
case $interface in
|
2003-08-13 02:19:24 +02:00
|
|
|
eth*|wlan*|br[0-9])
|
2002-10-23 03:22:48 +02:00
|
|
|
;;
|
|
|
|
*)
|
2003-02-20 00:52:03 +01:00
|
|
|
fatal_error "MAC verification is only supported on ethernet and 802.11b devices: $interface"
|
2002-10-23 03:22:48 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2002-10-23 17:58:53 +02:00
|
|
|
createchain `mac_chain $interface` no
|
2002-10-22 20:07:52 +02:00
|
|
|
done
|
2002-10-23 03:22:48 +02:00
|
|
|
#
|
|
|
|
# Process the maclist file producing the verification rules
|
|
|
|
#
|
2002-10-22 20:07:52 +02:00
|
|
|
|
2002-10-24 02:47:43 +02:00
|
|
|
while read interface mac addresses; do
|
|
|
|
expandv interface mac addresses
|
2002-10-23 03:22:48 +02:00
|
|
|
|
2002-10-23 17:58:53 +02:00
|
|
|
chain=`mac_chain $interface`
|
2002-10-22 20:07:52 +02:00
|
|
|
|
|
|
|
if ! havechain $chain ; then
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "No hosts on $interface have the maclist option specified"
|
2002-10-22 20:07:52 +02:00
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-24 02:47:43 +02:00
|
|
|
macpart=`mac_match $mac`
|
2002-10-22 20:07:52 +02:00
|
|
|
|
2002-10-24 02:47:43 +02:00
|
|
|
if [ -z "$addresses" ]; then
|
|
|
|
run_iptables -A $chain $macpart -j RETURN
|
|
|
|
else
|
|
|
|
for address in `separate_list $addresses` ; do
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables2 -A $chain $macpart -s $address -j RETURN
|
2002-10-24 02:47:43 +02:00
|
|
|
done
|
|
|
|
fi
|
2002-10-22 20:07:52 +02:00
|
|
|
done < $TMP_DIR/maclist
|
2002-10-23 03:22:48 +02:00
|
|
|
#
|
|
|
|
# Must take care of our own broadcasts and multicasts then terminate the verification
|
|
|
|
# chains
|
|
|
|
#
|
2002-10-22 20:07:52 +02:00
|
|
|
for interface in $maclist_interfaces; do
|
2002-10-23 17:58:53 +02:00
|
|
|
chain=`mac_chain $interface`
|
2003-10-31 16:30:07 +01:00
|
|
|
|
|
|
|
blob=`ip link show $interface 2> /dev/null`
|
2002-10-23 03:22:48 +02:00
|
|
|
|
|
|
|
[ -z "$blob" ] && \
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Interface $interface must be up before Shorewall can start"
|
2002-10-23 03:22:48 +02:00
|
|
|
|
2003-10-31 16:30:07 +01:00
|
|
|
ip -f inet addr show $interface 2> /dev/null | grep inet | sed 's/inet //; s/brd //; s/scope.*//;' | while read address broadcast; do
|
|
|
|
if [ -n "$broadcast" ]; then
|
|
|
|
run_iptables -A $chain -s ${address%/*} -d $broadcast -j RETURN
|
|
|
|
fi
|
2002-10-23 03:22:48 +02:00
|
|
|
|
|
|
|
run_iptables -A $chain -s $address -d 255.255.255.255 -j RETURN
|
|
|
|
run_iptables -A $chain -s $address -d 224.0.0.0/4 -j RETURN
|
2002-10-22 20:07:52 +02:00
|
|
|
done
|
|
|
|
|
2003-05-21 23:36:05 +02:00
|
|
|
if [ -n "$MACLIST_LOG_LEVEL" ]; then
|
|
|
|
log_rule $MACLIST_LOG_LEVEL $chain $MACLIST_DISPOSITION
|
|
|
|
fi
|
2002-10-22 20:07:52 +02:00
|
|
|
|
|
|
|
run_iptables -A $chain -j $maclist_target
|
2002-10-23 03:22:48 +02:00
|
|
|
done
|
|
|
|
#
|
|
|
|
# Generate jumps from the input and forward chains
|
|
|
|
#
|
2002-10-23 17:58:53 +02:00
|
|
|
for hosts in $maclist_hosts; do
|
|
|
|
interface=${hosts%:*}
|
|
|
|
hosts=${hosts#*:}
|
2003-02-23 15:10:37 +01:00
|
|
|
for chain in `first_chains $interface` ; do
|
2002-10-23 17:58:53 +02:00
|
|
|
run_iptables -A $chain -s $hosts -m state --state NEW \
|
|
|
|
-j `mac_chain $interface`
|
|
|
|
done
|
2002-10-22 20:07:52 +02:00
|
|
|
done
|
2003-02-23 15:10:37 +01:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Set up SYN flood protection
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
setup_syn_flood_chain ()
|
|
|
|
# $1 = policy chain
|
|
|
|
# $2 = synparams
|
|
|
|
{
|
|
|
|
local chain=$1
|
2003-08-13 23:31:02 +02:00
|
|
|
local limit=$2
|
|
|
|
local limit_burst=
|
|
|
|
|
|
|
|
case $limit in
|
|
|
|
*:*)
|
|
|
|
limit_burst="--limit-burst ${limit#*:}"
|
|
|
|
limit=${limit%:*}
|
|
|
|
;;
|
|
|
|
esac
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
run_iptables -N @$chain
|
2003-08-13 23:31:02 +02:00
|
|
|
run_iptables -A @$chain -m limit --limit $limit $limit_burst -j RETURN
|
2002-05-01 01:13:15 +02:00
|
|
|
run_iptables -A @$chain -j DROP
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Enable SYN flood protection on a chain
|
2003-02-23 15:10:37 +01:00
|
|
|
#
|
2002-10-23 18:48:40 +02:00
|
|
|
# Insert a jump rule to the protection chain from the first chain. Inserted
|
|
|
|
# as the second rule and restrict the jump to SYN packets
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
enable_syn_flood_protection() # $1 = chain, $2 = protection chain
|
|
|
|
{
|
|
|
|
run_iptables -I $1 2 -p tcp --syn -j @$2
|
2002-07-06 16:05:30 +02:00
|
|
|
echo " Enabled SYN flood protection"
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Delete existing Proxy ARP
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
delete_proxy_arp() {
|
|
|
|
if [ -f ${STATEDIR}/proxyarp ]; then
|
2002-07-06 00:24:40 +02:00
|
|
|
while read address interface external haveroute; do
|
2002-05-01 01:13:15 +02:00
|
|
|
qt arp -i $external -d $address pub
|
|
|
|
[ -z "$haveroute" ] && qt ip route del $address dev $interface
|
|
|
|
done < ${STATEDIR}/proxyarp
|
|
|
|
|
|
|
|
rm -f ${STATEDIR}/proxyarp
|
|
|
|
fi
|
|
|
|
|
|
|
|
[ -d ${STATEDIR} ] && touch ${STATEDIR}/proxyarp
|
2002-07-25 17:05:21 +02:00
|
|
|
|
|
|
|
for f in `ls /proc/sys/net/ipv4/conf/*/proxy_arp`; do
|
|
|
|
echo 0 > $f
|
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Setup Static Network Address Translation (NAT)
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
setup_nat() {
|
|
|
|
local allints
|
|
|
|
#
|
|
|
|
# At this point, we're just interested in the network translation
|
|
|
|
#
|
|
|
|
> ${STATEDIR}/nat
|
|
|
|
|
|
|
|
echo "Setting up NAT..."
|
|
|
|
|
|
|
|
while read external interface internal allints localnat; do
|
|
|
|
expandv external interface internal allints localnat
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-01-24 20:42:23 +01:00
|
|
|
iface=${interface%:*}
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
if [ -n "$ADD_IP_ALIASES" ]; then
|
2003-01-24 20:42:23 +01:00
|
|
|
qt ip addr del $external dev $iface
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
|
2002-12-20 22:10:53 +01:00
|
|
|
if [ -z "$allints" -o "$allints" = "Yes" -o "$allints" = "yes" ]
|
2002-05-01 01:13:15 +02:00
|
|
|
then
|
2002-07-05 17:56:02 +02:00
|
|
|
addnatrule nat_in -d $external -j DNAT --to-destination $internal
|
|
|
|
addnatrule nat_out -s $internal -j SNAT --to-source $external
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
if [ "$localnat" = "Yes" -o "$localnat" = "yes" ]; then
|
2002-12-18 22:58:21 +01:00
|
|
|
run_iptables2 -t nat -A OUTPUT -d $external \
|
2002-05-01 01:13:15 +02:00
|
|
|
-j DNAT --to-destination $internal
|
|
|
|
fi
|
|
|
|
else
|
2003-01-24 20:42:23 +01:00
|
|
|
addnatrule `input_chain $iface` \
|
2002-05-01 01:13:15 +02:00
|
|
|
-d $external -j DNAT --to-destination $internal
|
2003-01-24 20:42:23 +01:00
|
|
|
addnatrule `output_chain $iface` \
|
2002-05-01 01:13:15 +02:00
|
|
|
-s $internal -j SNAT --to-source $external
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$ADD_IP_ALIASES" ]; then
|
2002-07-23 18:26:45 +02:00
|
|
|
list_search $external $aliases_to_add || \
|
|
|
|
aliases_to_add="$aliases_to_add $external $interface"
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
|
2002-07-06 16:05:30 +02:00
|
|
|
echo " Host $internal NAT $external on $interface"
|
2002-05-01 01:13:15 +02:00
|
|
|
done < $TMP_DIR/nat
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Delete existing Static NAT
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
delete_nat() {
|
|
|
|
run_iptables -t nat -F
|
|
|
|
run_iptables -t nat -X
|
|
|
|
|
|
|
|
if [ -f ${STATEDIR}/nat ]; then
|
|
|
|
while read external interface; do
|
|
|
|
qt ip addr del $external dev $interface
|
|
|
|
done < ${STATEDIR}/nat
|
|
|
|
|
|
|
|
rm -f {$STATEDIR}/nat
|
|
|
|
fi
|
|
|
|
|
|
|
|
[ -d ${STATEDIR} ] && touch ${STATEDIR}/nat
|
|
|
|
}
|
|
|
|
|
2003-02-24 16:24:55 +01:00
|
|
|
#
|
|
|
|
# Setup ECN disabling rules
|
|
|
|
#
|
|
|
|
setup_ecn() # $1 = file name
|
|
|
|
{
|
2003-03-21 20:23:03 +01:00
|
|
|
local interfaces=""
|
2003-02-24 16:24:55 +01:00
|
|
|
local hosts
|
|
|
|
local h
|
|
|
|
|
|
|
|
strip_file ecn $1
|
|
|
|
|
2003-02-26 00:35:22 +01:00
|
|
|
echo "Processing $1..."
|
|
|
|
|
2003-02-24 16:24:55 +01:00
|
|
|
while read interface host; do
|
|
|
|
expandv interface host
|
|
|
|
list_search $interface $all_interfaces || \
|
2003-03-24 22:56:31 +01:00
|
|
|
startup_error "Unknown interface $interface"
|
2003-02-24 16:24:55 +01:00
|
|
|
list_search $interface $interfaces || \
|
|
|
|
interfaces="$interfaces $interface"
|
2003-02-24 16:35:50 +01:00
|
|
|
[ "x$host" = "x-" ] && host=
|
|
|
|
for h in `separate_list ${host:-0.0.0.0/0}`; do
|
2003-02-24 16:24:55 +01:00
|
|
|
hosts="$hosts $interface:$h"
|
|
|
|
done
|
|
|
|
done < $TMP_DIR/ecn
|
|
|
|
|
|
|
|
if [ -n "$interfaces" ]; then
|
|
|
|
echo "Setting up ECN control on${interfaces}..."
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-24 16:24:55 +01:00
|
|
|
for interface in $interfaces; do
|
|
|
|
chain=`ecn_chain $interface`
|
|
|
|
if mangle_chain_exists $chain; then
|
|
|
|
flushmangle $chain
|
|
|
|
else
|
|
|
|
run_iptables -t mangle -N $chain
|
|
|
|
run_iptables -t mangle -A POSTROUTING -p tcp -o $interface -j $chain
|
|
|
|
run_iptables -t mangle -A OUTPUT -p tcp -o $interface -j $chain
|
|
|
|
fi
|
|
|
|
done
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-24 16:24:55 +01:00
|
|
|
for host in $hosts; do
|
|
|
|
interface=${host%:*}
|
|
|
|
h=${host#*:}
|
|
|
|
run_iptables -t mangle -A `ecn_chain $interface` -p tcp -d $h -j ECN --ecn-tcp-remove
|
|
|
|
echo " ECN Disabled to $h through $interface"
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-02-23 15:10:37 +01:00
|
|
|
# Process a TC Rule - $marking_chain is assumed to contain the name of the
|
2003-01-24 00:18:40 +01:00
|
|
|
# default marking chain
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
process_tc_rule()
|
|
|
|
{
|
2003-10-25 02:54:01 +02:00
|
|
|
chain=$marking_chain
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
add_a_tc_rule() {
|
|
|
|
r=
|
|
|
|
|
2002-07-06 00:24:40 +02:00
|
|
|
if [ "x$source" != "x-" ]; then
|
2002-05-01 01:13:15 +02:00
|
|
|
case $source in
|
2002-11-09 16:56:29 +01:00
|
|
|
*.*.*)
|
|
|
|
r="-s $source "
|
|
|
|
;;
|
|
|
|
~*)
|
2003-07-26 18:44:38 +02:00
|
|
|
r="`mac_match $source` "
|
2002-11-09 16:56:29 +01:00
|
|
|
;;
|
|
|
|
$FW)
|
2002-12-19 00:56:34 +01:00
|
|
|
chain=tcout
|
2002-11-09 16:56:29 +01:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
if ! list_search $source $all_interfaces; then
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Unknown interface $source in rule \"$rule\""
|
2002-11-09 16:56:29 +01:00
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-11-09 16:56:29 +01:00
|
|
|
r="-i $source "
|
|
|
|
;;
|
2002-05-01 01:13:15 +02:00
|
|
|
esac
|
|
|
|
fi
|
2003-01-24 00:18:40 +01:00
|
|
|
|
2004-01-22 21:24:56 +01:00
|
|
|
if [ "x$user" != "x-" ]; then
|
|
|
|
|
|
|
|
[ "$chain" != tcout ] && \
|
|
|
|
fatal_error "Invalid use of a user/group: rule \"$rule\""
|
|
|
|
|
|
|
|
case "$user" in
|
|
|
|
*:*)
|
|
|
|
r="$r-m owner"
|
|
|
|
temp="${user%:*}"
|
|
|
|
[ -n "$temp" ] && r="$r --uid-owner $temp "
|
|
|
|
temp="${user#*:}"
|
|
|
|
[ -n "$temp" ] && r="$r --gid-owner $temp "
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
r="$r-m owner --uid-owner $user "
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
[ "x$dest" = "x-" ] || r="${r}-d $dest "
|
|
|
|
[ "$proto" = "all" ] || r="${r}-p $proto "
|
|
|
|
[ "x$port" = "x-" ] || r="${r}--dport $port "
|
|
|
|
[ "x$sport" = "x-" ] || r="${r}--sport $sport "
|
|
|
|
|
2002-12-19 00:56:34 +01:00
|
|
|
run_iptables2 -t mangle -A $chain $r -j MARK --set-mark $mark
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2003-10-25 02:54:01 +02:00
|
|
|
if [ "$mark" != "${mark%:*}" ]; then
|
|
|
|
|
|
|
|
[ "$chain" = tcout ] && \
|
|
|
|
fatal_error "Chain designator not allowed when source is \$FW; rule \"$rule\""
|
|
|
|
|
|
|
|
case "${mark#*:}" in
|
|
|
|
p|P)
|
|
|
|
chain=tcpre
|
|
|
|
;;
|
|
|
|
f|F)
|
|
|
|
chain=tcfor
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
fatal_error "Invalid chain designator: (${mark#*:}) in rule \"$rule\""
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
mark="${mark%:*}"
|
|
|
|
fi
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
for source in `separate_list ${sources:=-}`; do
|
|
|
|
for dest in `separate_list ${dests:=-}`; do
|
|
|
|
for port in `separate_list ${ports:=-}`; do
|
|
|
|
for sport in `separate_list ${sports:=-}`; do
|
|
|
|
add_a_tc_rule
|
|
|
|
done
|
|
|
|
done
|
2002-07-06 00:24:40 +02:00
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
|
|
|
|
echo " TC Rule \"$rule\" added"
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Setup queuing and classes
|
|
|
|
#
|
2002-12-04 22:17:14 +01:00
|
|
|
setup_tc1() {
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
|
|
|
# Create the TC mangle chains
|
|
|
|
#
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-01-24 00:18:40 +01:00
|
|
|
run_iptables -t mangle -N tcpre
|
|
|
|
run_iptables -t mangle -N tcfor
|
2002-05-01 01:13:15 +02:00
|
|
|
run_iptables -t mangle -N tcout
|
|
|
|
#
|
|
|
|
# Process the TC Rules File
|
|
|
|
#
|
|
|
|
strip_file tcrules
|
|
|
|
|
2004-01-22 21:24:56 +01:00
|
|
|
while read mark sources dests proto ports sports user; do
|
|
|
|
expandv mark sources dests proto ports sports user
|
|
|
|
rule=`echo "$mark $sources $dests $proto $ports $sports $user"`
|
2002-05-01 01:13:15 +02:00
|
|
|
process_tc_rule
|
|
|
|
done < $TMP_DIR/tcrules
|
|
|
|
#
|
|
|
|
# Link to the TC mangle chains from the main chains
|
|
|
|
#
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-01-24 00:18:40 +01:00
|
|
|
run_iptables -t mangle -A FORWARD -j tcfor
|
|
|
|
run_iptables -t mangle -A PREROUTING -j tcpre
|
|
|
|
run_iptables -t mangle -A OUTPUT -j tcout
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
run_user_exit tcstart
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2002-12-04 22:17:14 +01:00
|
|
|
setup_tc() {
|
|
|
|
|
|
|
|
echo "Setting up Traffic Control Rules..."
|
|
|
|
|
|
|
|
setup_tc1
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Clear Traffic Shaping
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
delete_tc()
|
|
|
|
{
|
2002-12-31 04:50:05 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
clear_one_tc() {
|
2002-07-06 00:24:40 +02:00
|
|
|
tc qdisc del dev $1 root 2> /dev/null
|
2002-05-01 01:13:15 +02:00
|
|
|
tc qdisc del dev $1 ingress 2> /dev/null
|
|
|
|
}
|
|
|
|
|
|
|
|
run_user_exit tcclear
|
|
|
|
|
2002-12-31 17:04:31 +01:00
|
|
|
run_ip link list | \
|
|
|
|
while read inx interface details; do
|
|
|
|
case $inx in
|
|
|
|
[0-9]*)
|
|
|
|
clear_one_tc ${interface%:}
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
#
|
2003-08-10 03:11:50 +02:00
|
|
|
# Process a record from the accounting file
|
|
|
|
#
|
|
|
|
process_accounting_rule() {
|
|
|
|
rule=
|
2003-08-10 18:19:36 +02:00
|
|
|
rule2=
|
2003-08-20 18:54:27 +02:00
|
|
|
jumpchain=
|
2003-08-10 18:01:21 +02:00
|
|
|
|
|
|
|
accounting_error() {
|
2003-08-20 18:54:27 +02:00
|
|
|
error_message "Warning: Invalid Accounting rule" $action $chain $source $dest $proto $port $sport
|
2003-08-10 18:01:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
jump_to_chain() {
|
2003-08-20 18:54:27 +02:00
|
|
|
if ! havechain $jumpchain; then
|
|
|
|
if ! createchain2 $jumpchain No; then
|
2003-08-10 18:01:21 +02:00
|
|
|
accounting_error
|
|
|
|
return 2
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2003-08-20 18:54:27 +02:00
|
|
|
rule="$rule -j $jumpchain"
|
2003-08-10 18:01:21 +02:00
|
|
|
}
|
2003-08-10 03:11:50 +02:00
|
|
|
|
|
|
|
case $source in
|
|
|
|
*:*)
|
|
|
|
rule="-s ${source#*:} -i ${source%:*}"
|
|
|
|
;;
|
|
|
|
*.*.*.*)
|
|
|
|
rule="-s $source"
|
|
|
|
;;
|
|
|
|
-|all|any)
|
|
|
|
;;
|
|
|
|
*)
|
2003-08-11 19:44:23 +02:00
|
|
|
[ -n "$source" ] && rule="-i $source"
|
2003-08-10 03:11:50 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-08-11 03:36:32 +02:00
|
|
|
[ -n "$dest" ] && case $dest in
|
2003-08-10 03:11:50 +02:00
|
|
|
*:*)
|
|
|
|
rule="$rule -d ${dest#*:} -o ${dest%:*}"
|
|
|
|
;;
|
|
|
|
*.*.*.*)
|
|
|
|
rule="$rule -d $dest"
|
|
|
|
;;
|
|
|
|
-|all|any)
|
|
|
|
;;
|
|
|
|
*)
|
2003-08-10 17:06:23 +02:00
|
|
|
rule="$rule -o $dest"
|
2003-08-10 03:11:50 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-08-11 03:36:32 +02:00
|
|
|
[ -n "$proto" ] && case $proto in
|
2003-08-10 03:11:50 +02:00
|
|
|
-|any|all)
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
rule="$rule -p $proto"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-08-11 03:36:32 +02:00
|
|
|
[ -n "$port" ] && case $port in
|
2003-08-10 03:11:50 +02:00
|
|
|
-|any|all)
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
rule="$rule --dport $port"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-08-11 03:36:32 +02:00
|
|
|
[ -n "$sport" ] && case $sport in
|
2003-08-10 03:11:50 +02:00
|
|
|
-|any|all)
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
rule="$rule --sport $sport"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-08-10 18:01:21 +02:00
|
|
|
case $action in
|
|
|
|
COUNT)
|
|
|
|
;;
|
|
|
|
DONE)
|
|
|
|
rule="$rule -j RETURN"
|
|
|
|
;;
|
2003-08-20 18:54:27 +02:00
|
|
|
*:COUNT)
|
|
|
|
rule2="$rule"
|
|
|
|
jumpchain=${action%:*}
|
|
|
|
jump_to_chain || return
|
|
|
|
;;
|
|
|
|
JUMP:*)
|
|
|
|
jumpchain=${action#*:}
|
2003-08-10 18:01:21 +02:00
|
|
|
jump_to_chain || return
|
|
|
|
;;
|
|
|
|
*)
|
2003-08-20 18:54:27 +02:00
|
|
|
jumpchain=$action
|
2003-08-10 18:01:21 +02:00
|
|
|
jump_to_chain || return
|
|
|
|
;;
|
|
|
|
esac
|
2003-08-20 18:54:27 +02:00
|
|
|
|
|
|
|
[ "x$chain" = "x-" ] && chain=accounting
|
|
|
|
[ -z "$chain" ] && chain=accounting
|
2003-08-10 18:01:21 +02:00
|
|
|
|
2003-08-20 18:54:27 +02:00
|
|
|
havechain $chain || createchain $chain No
|
2003-08-10 18:12:30 +02:00
|
|
|
|
2003-08-20 18:54:27 +02:00
|
|
|
if iptables -A $chain $rule ; then
|
|
|
|
[ "x$rule2" != x ] && run_iptables -A $jumpchain $rule2
|
|
|
|
echo " Accounting rule" $action $chain $source $dest $proto $port $sport Added
|
2003-08-10 03:11:50 +02:00
|
|
|
else
|
2003-08-10 18:01:21 +02:00
|
|
|
accounting_error
|
2003-08-10 03:11:50 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Set up Accounting
|
|
|
|
#
|
|
|
|
setup_accounting() # $1 = Name of accounting file
|
|
|
|
{
|
|
|
|
|
|
|
|
echo "Setting up Accounting..."
|
|
|
|
|
|
|
|
strip_file accounting $1
|
|
|
|
|
2003-08-20 18:54:27 +02:00
|
|
|
while read action chain source dest proto port sport ; do
|
|
|
|
expandv action chain source dest proto port sport
|
|
|
|
process_accounting_rule
|
2003-08-10 03:11:50 +02:00
|
|
|
done < $TMP_DIR/accounting
|
2003-08-10 18:12:30 +02:00
|
|
|
|
2003-08-11 19:44:23 +02:00
|
|
|
if havechain accounting; then
|
2003-08-10 18:12:30 +02:00
|
|
|
for chain in INPUT FORWARD OUTPUT; do
|
|
|
|
run_iptables -A $chain -j accounting
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
|
2003-08-10 03:11:50 +02:00
|
|
|
}
|
|
|
|
|
2003-08-21 15:18:51 +02:00
|
|
|
process_user_set_entry() {
|
|
|
|
local acceptchain=`accept_chain $userset`
|
|
|
|
local dropchain=`drop_chain $userset`
|
|
|
|
local rejectchain=`reject_chain $userset`
|
2003-08-23 20:14:59 +02:00
|
|
|
|
|
|
|
list_search $userset $usersets && \
|
|
|
|
fatal_error "Duplicate Uset Set: $userset"
|
|
|
|
usersets="$usersets $userset"
|
|
|
|
|
|
|
|
createchain $acceptchain No
|
|
|
|
createchain $dropchain No
|
|
|
|
createchain $rejectchain No
|
|
|
|
|
|
|
|
[ "x$reject" = "x-" ] && reject=""
|
|
|
|
eval ${userset}_reject="$reject"
|
|
|
|
[ "x$accept" = "x-" ] && accept=""
|
|
|
|
eval ${userset}_accept="$accept"
|
|
|
|
[ "x$drop" = "x-" ] && drop=""
|
|
|
|
eval ${userset}_drop="$drop"
|
|
|
|
}
|
|
|
|
|
|
|
|
process_user_entry() {
|
|
|
|
local acceptchain=`accept_chain $userset`
|
|
|
|
local dropchain=`drop_chain $userset`
|
|
|
|
local rejectchain=`reject_chain $userset`
|
2003-08-21 15:18:51 +02:00
|
|
|
local rule="-m owner"
|
2003-08-23 20:14:59 +02:00
|
|
|
local level=
|
2003-08-21 15:18:51 +02:00
|
|
|
|
2003-08-23 20:14:59 +02:00
|
|
|
list_search $userset $usersets || \
|
|
|
|
fatal_error "Unknown Uset Set: $userset"
|
2003-08-21 15:18:51 +02:00
|
|
|
|
|
|
|
[ "x$user" = "x-" ] && user=
|
|
|
|
|
|
|
|
[ -z "${user}${group}" ] && \
|
|
|
|
fatal_error "Either user or group must be specified for user set $userset"
|
|
|
|
|
|
|
|
[ -n "$user" ] && rule="$rule --uid-owner $user" || user='*'
|
|
|
|
[ -n "$group" ] && rule="$rule --gid-owner $group" || group='*'
|
|
|
|
|
2003-08-23 20:14:59 +02:00
|
|
|
eval level=\$${userset}_accept
|
|
|
|
[ -n "$level" ] && \
|
|
|
|
log_rule $level $acceptchain ACCEPT $rule
|
2003-08-21 15:18:51 +02:00
|
|
|
run_iptables -A $acceptchain $rule -j ACCEPT
|
2003-08-23 20:14:59 +02:00
|
|
|
|
|
|
|
eval level=\$${userset}_drop
|
|
|
|
[ -n "$level" ] && \
|
|
|
|
log_rule $level $dropchain DROP $rule
|
2003-08-21 15:18:51 +02:00
|
|
|
run_iptables -A $dropchain $rule -j DROP
|
2003-08-23 20:14:59 +02:00
|
|
|
|
|
|
|
eval level=\$${userset}_reject
|
|
|
|
[ -n "$level" ] && \
|
|
|
|
log_rule $level $rejectchain REJECT $rule
|
2003-08-21 15:18:51 +02:00
|
|
|
run_iptables -A $rejectchain $rule -j reject
|
|
|
|
|
|
|
|
echo " User $user:$group added to user set $userset"
|
|
|
|
}
|
|
|
|
|
|
|
|
setup_usersets() # $1 = Name of usersets file
|
2003-08-23 20:14:59 +02:00
|
|
|
{
|
2003-08-21 15:18:51 +02:00
|
|
|
echo "Setting up User Sets..."
|
|
|
|
|
|
|
|
strip_file usersets $1
|
|
|
|
|
2003-08-23 20:14:59 +02:00
|
|
|
while read userset reject accept drop; do
|
|
|
|
expandv userset reject accept drop
|
2003-08-21 15:18:51 +02:00
|
|
|
process_user_set_entry
|
|
|
|
done < $TMP_DIR/usersets
|
2003-08-23 20:14:59 +02:00
|
|
|
|
|
|
|
strip_file users
|
|
|
|
|
|
|
|
while read userset user group ; do
|
|
|
|
expandv userset user group
|
|
|
|
process_user_entry
|
|
|
|
done < $TMP_DIR/users
|
2003-08-21 15:18:51 +02:00
|
|
|
}
|
|
|
|
|
2003-08-10 03:11:50 +02:00
|
|
|
#
|
2003-02-27 23:28:06 +01:00
|
|
|
# Check the configuration
|
|
|
|
#
|
|
|
|
check_config() {
|
|
|
|
|
|
|
|
disclaimer() {
|
|
|
|
echo
|
2003-06-27 23:02:52 +02:00
|
|
|
echo "Notice: The 'check' command is unsupported and problem"
|
|
|
|
echo " reports complaining about errors that it didn't catch"
|
|
|
|
echo " will not be accepted"
|
2003-02-27 23:28:06 +01:00
|
|
|
echo
|
|
|
|
}
|
|
|
|
|
|
|
|
disclaimer
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-06-27 23:02:52 +02:00
|
|
|
report_capabilities
|
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
echo "Verifying Configuration..."
|
|
|
|
|
|
|
|
verify_os_version
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
load_kernel_modules
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
echo "Determining Zones..."
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
determine_zones
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
[ -z "$zones" ] && startup_error "ERROR: No Zones Defined"
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
display_list "Zones:" $zones
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
echo "Validating interfaces file..."
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
validate_interfaces_file
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
echo "Validating hosts file..."
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
validate_hosts_file
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
echo "Determining Hosts in Zones..."
|
|
|
|
|
|
|
|
determine_interfaces
|
|
|
|
determine_hosts
|
|
|
|
|
2003-03-24 00:53:10 +01:00
|
|
|
echo "Validating policy file..."
|
2003-03-24 22:56:31 +01:00
|
|
|
|
|
|
|
validate_policy
|
2003-03-24 00:53:10 +01:00
|
|
|
|
2003-12-04 03:01:08 +01:00
|
|
|
echo "Validating Actions..."
|
|
|
|
|
|
|
|
process_actions
|
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
echo "Validating rules file..."
|
|
|
|
|
|
|
|
rules=`find_file rules`
|
|
|
|
strip_file rules $rules
|
|
|
|
process_rules
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
rm -rf $TMP_DIR
|
|
|
|
|
|
|
|
echo "Configuration Validated"
|
|
|
|
|
|
|
|
disclaimer
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2002-12-04 22:17:14 +01:00
|
|
|
#
|
|
|
|
# Refresh queuing and classes
|
|
|
|
#
|
|
|
|
refresh_tc() {
|
|
|
|
|
|
|
|
echo "Refreshing Traffic Control Rules..."
|
|
|
|
|
2002-12-31 17:04:31 +01:00
|
|
|
[ -n "$CLEAR_TC" ] && delete_tc
|
2002-12-16 20:25:20 +01:00
|
|
|
|
2002-12-18 22:58:21 +01:00
|
|
|
[ -n "$MARK_IN_FORWARD_CHAIN" ] && chain=tcfor || chain=tcpre
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-12-18 22:58:21 +01:00
|
|
|
if mangle_chain_exists $chain; then
|
2002-12-04 22:17:14 +01:00
|
|
|
#
|
|
|
|
# Flush the TC mangle chains
|
|
|
|
#
|
2002-12-18 22:58:21 +01:00
|
|
|
run_iptables -t mangle -F $chain
|
2002-12-16 20:25:20 +01:00
|
|
|
|
2002-12-04 22:17:14 +01:00
|
|
|
run_iptables -t mangle -F tcout
|
|
|
|
#
|
|
|
|
# Process the TC Rules File
|
|
|
|
#
|
|
|
|
strip_file tcrules
|
|
|
|
|
|
|
|
while read mark sources dests proto ports sports; do
|
|
|
|
expandv mark sources dests proto ports sports
|
|
|
|
rule=`echo "$mark $sources $dests $proto $ports $sports"`
|
2003-02-23 15:10:37 +01:00
|
|
|
process_tc_rule
|
2002-12-04 22:17:14 +01:00
|
|
|
done < $TMP_DIR/tcrules
|
|
|
|
|
|
|
|
run_user_exit tcstart
|
|
|
|
else
|
|
|
|
setup_tc1
|
|
|
|
fi
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2003-12-04 03:01:08 +01:00
|
|
|
#
|
|
|
|
# Add one Filter Rule from an action -- Helper function for the action file processor
|
|
|
|
#
|
|
|
|
# The caller has established the following variables:
|
|
|
|
# check = current command. If 'check', we're executing a 'check'
|
|
|
|
# which only goes through the motions.
|
|
|
|
# client = SOURCE IP or MAC
|
|
|
|
# server = DESTINATION IP or interface
|
|
|
|
# protocol = Protocol
|
|
|
|
# address = Original Destination Address
|
|
|
|
# port = Destination Port
|
|
|
|
# cport = Source Port
|
|
|
|
# multioption = String to invoke multiport match if appropriate
|
2003-12-07 19:15:55 +01:00
|
|
|
# action = The chain for this rule
|
2003-12-04 03:01:08 +01:00
|
|
|
# ratelimit = Optional rate limiting clause
|
|
|
|
#
|
|
|
|
add_an_action()
|
|
|
|
{
|
|
|
|
do_ports() {
|
|
|
|
if [ -n "$port" ]; then
|
|
|
|
dports="--dport"
|
|
|
|
if [ -n "$multioption" -a "$port" != "${port%,*}" ]; then
|
|
|
|
multiport="$multioption"
|
|
|
|
dports="--dports"
|
|
|
|
fi
|
|
|
|
dports="$dports $port"
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$cport" ]; then
|
|
|
|
sports="--sport"
|
|
|
|
if [ -n "$multioption" -a "$cport" != "${cport%,*}" ]; then
|
|
|
|
multiport="$multioption"
|
|
|
|
sports="--sports"
|
|
|
|
fi
|
|
|
|
sports="$sports $cport"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Set source variables. The 'cli' variable will hold the client match predicate(s).
|
|
|
|
|
|
|
|
cli=
|
|
|
|
|
|
|
|
case "$client" in
|
|
|
|
-)
|
|
|
|
;;
|
|
|
|
*:*)
|
|
|
|
cli="-i ${client%:*} -s ${client#*:}"
|
|
|
|
;;
|
|
|
|
*.*.*)
|
|
|
|
cli="-s $client"
|
|
|
|
;;
|
|
|
|
~*)
|
|
|
|
cli=`mac_match $client`
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
[ -n "$client" ] && cli="-i $client"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
# Set destination variables - 'serv' and 'dest_interface' hold the server match predicate(s).
|
|
|
|
|
|
|
|
dest_interface=
|
|
|
|
serv=
|
|
|
|
|
|
|
|
case "$server" in
|
|
|
|
-)
|
|
|
|
;;
|
|
|
|
*.*.*)
|
|
|
|
serv=$server
|
|
|
|
;;
|
|
|
|
~*)
|
|
|
|
fatal_error "Rule \"$rule\" - Destination may not be specified by MAC Address"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
[ -n "$server" ] && dest_interface="-o $server"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
# Setup protocol and port variables
|
|
|
|
|
|
|
|
sports=
|
|
|
|
dports=
|
|
|
|
state="-m state --state NEW"
|
|
|
|
proto=$protocol
|
|
|
|
servport=$serverport
|
|
|
|
multiport=
|
|
|
|
|
|
|
|
[ x$port = x- ] && port=
|
|
|
|
[ x$cport = x- ] && cport=
|
|
|
|
|
|
|
|
case $proto in
|
|
|
|
tcp|TCP|6)
|
|
|
|
do_ports
|
|
|
|
[ "$target" = QUEUE ] && proto="$proto --syn"
|
|
|
|
;;
|
|
|
|
udp|UDP|17)
|
|
|
|
do_ports
|
|
|
|
;;
|
|
|
|
icmp|ICMP|1)
|
|
|
|
[ -n "$port" ] && dports="--icmp-type $port"
|
|
|
|
state=
|
|
|
|
;;
|
|
|
|
all|ALL)
|
|
|
|
[ -n "$port" ] && \
|
|
|
|
fatal_error "Port number not allowed with protocol \"all\"; rule: \"$rule\""
|
|
|
|
proto=
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
state=
|
|
|
|
[ -n "$port" ] && \
|
|
|
|
fatal_error "Port number not allowed with protocol \"$proto\"; rule: \"$rule\""
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
proto="${proto:+-p $proto}"
|
|
|
|
|
|
|
|
# Some misc. setup
|
|
|
|
|
|
|
|
case "$logtarget" in
|
|
|
|
LOG)
|
|
|
|
[ -z "$loglevel" ] && fatal_error "LOG requires log level"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
if [ $command != check ]; then
|
|
|
|
if [ -n "${serv}" ]; then
|
|
|
|
for serv1 in `separate_list $serv`; do
|
|
|
|
for srv in `ip_range $serv1`; do
|
|
|
|
if [ -n "$loglevel" ]; then
|
2003-12-07 19:15:55 +01:00
|
|
|
log_rule_limit $loglevel $action $logtarget "$ratelimit" \
|
2003-12-04 03:01:08 +01:00
|
|
|
`fix_bang $proto $sports $multiport $state $cli -d $srv $dports`
|
|
|
|
fi
|
|
|
|
|
2003-12-07 19:15:55 +01:00
|
|
|
run_iptables2 -A $action $proto $multiport $state $cli $sports \
|
2003-12-04 03:01:08 +01:00
|
|
|
-d $srv $dports $ratelimit -j $target
|
|
|
|
done
|
|
|
|
done
|
|
|
|
else
|
|
|
|
if [ -n "$loglevel" ]; then
|
2003-12-07 19:15:55 +01:00
|
|
|
log_rule_limit $loglevel $action $logtarget "$ratelimit" \
|
2003-12-04 03:01:08 +01:00
|
|
|
`fix_bang $proto $sports $multiport $state $cli $dports`
|
|
|
|
fi
|
|
|
|
|
2003-12-07 19:15:55 +01:00
|
|
|
run_iptables2 -A $action $proto $multiport $state $cli $sports \
|
2003-12-04 03:01:08 +01:00
|
|
|
$dports $ratelimit -j $target
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
#
|
2003-12-05 21:34:01 +01:00
|
|
|
# Process a record from an action file for the 'start', 'restart' or 'check' commands
|
2003-12-04 03:01:08 +01:00
|
|
|
#
|
2003-12-07 19:15:55 +01:00
|
|
|
process_action() # $1 = action
|
|
|
|
# $1 = target
|
2003-12-04 03:01:08 +01:00
|
|
|
# $2 = clients
|
|
|
|
# $3 = servers
|
|
|
|
# $4 = protocol
|
|
|
|
# $5 = ports
|
|
|
|
# $6 = cports
|
|
|
|
# $7 = ratelimit
|
|
|
|
{
|
2003-12-07 19:15:55 +01:00
|
|
|
local action="$1"
|
|
|
|
local target="$2"
|
|
|
|
local clients="$3"
|
|
|
|
local servers="$4"
|
|
|
|
local protocol="$5"
|
|
|
|
local ports="$6"
|
|
|
|
local cports="$7"
|
|
|
|
local ratelimit="$8"
|
2003-12-04 03:01:08 +01:00
|
|
|
local rule="`echo $target $clients $servers $protocol $ports $cports $ratelimit`"
|
|
|
|
|
|
|
|
if [ -n "$ratelimit" ]; then
|
|
|
|
case $ratelimit in
|
|
|
|
-)
|
|
|
|
ratelimit=
|
|
|
|
;;
|
|
|
|
*:*)
|
|
|
|
ratelimit="-m limit --limit ${ratelimit%:*} --limit-burst ${ratelimit#*:}"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
ratelimit="-m limit --limit $ratelimit"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Isolate log level
|
|
|
|
|
|
|
|
if [ "$target" = "${target%:*}" ]; then
|
|
|
|
loglevel=
|
|
|
|
else
|
|
|
|
loglevel="${target#*:}"
|
|
|
|
target="${target%:*}"
|
|
|
|
expandv loglevel
|
|
|
|
fi
|
|
|
|
|
|
|
|
logtarget="$target"
|
|
|
|
|
|
|
|
case $target in
|
|
|
|
ACCEPT|LOG)
|
|
|
|
;;
|
|
|
|
REJECT)
|
|
|
|
target=reject
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
# Generate Netfilter rule(s)
|
|
|
|
|
2004-01-30 00:29:50 +01:00
|
|
|
[ "x$protocol" = "x-" ] && protocol=all || protocol=${protocol:=all}
|
2003-12-04 03:01:08 +01:00
|
|
|
|
|
|
|
if [ -n "$MULTIPORT" ] && \
|
|
|
|
! list_search $protocol "icmp" "ICMP" "1" && \
|
|
|
|
[ "$ports" = "${ports%:*}" -a \
|
|
|
|
"$cports" = "${cports%:*}" -a \
|
|
|
|
`list_count $ports` -le 15 -a \
|
|
|
|
`list_count $cports` -le 15 ]
|
|
|
|
then
|
|
|
|
#
|
|
|
|
# MULTIPORT is enabled, there are no port ranges in the rule and less than
|
|
|
|
# 16 ports are listed - use multiport match.
|
|
|
|
#
|
|
|
|
multioption="-m multiport"
|
|
|
|
for client in `separate_list ${clients:=-}`; do
|
|
|
|
for server in `separate_list ${servers:=-}`; do
|
|
|
|
#
|
|
|
|
# add_a_rule() modifies these so we must set their values each time
|
|
|
|
#
|
|
|
|
port=${ports:=-}
|
|
|
|
cport=${cports:=-}
|
|
|
|
add_an_action
|
|
|
|
done
|
|
|
|
done
|
|
|
|
else
|
|
|
|
#
|
|
|
|
# MULTIPORT is disabled or the rule isn't compatible with multiport match
|
|
|
|
#
|
|
|
|
multioption=
|
|
|
|
for client in `separate_list ${clients:=-}`; do
|
|
|
|
for server in `separate_list ${servers:=-}`; do
|
|
|
|
for port in `separate_list ${ports:=-}`; do
|
|
|
|
for cport in `separate_list ${cports:=-}`; do
|
|
|
|
add_an_action
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
#
|
|
|
|
# Report Result
|
|
|
|
#
|
|
|
|
if [ $command = check ]; then
|
|
|
|
echo " Rule \"$rule\" checked."
|
|
|
|
else
|
|
|
|
echo " Rule \"$rule\" added."
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2003-12-05 21:34:01 +01:00
|
|
|
#
|
|
|
|
# Read /etc/shorewall/actions and for each defined <action>, process
|
|
|
|
# /etc/shorewall/action.<action>
|
|
|
|
#
|
|
|
|
|
2003-12-04 03:01:08 +01:00
|
|
|
process_actions() {
|
|
|
|
#
|
|
|
|
# Process a rule where the source or destination is "all"
|
|
|
|
#
|
|
|
|
process_wildcard_rule() {
|
|
|
|
local yclients yservers ysourcezone ydestzone ypolicy
|
|
|
|
|
|
|
|
for yclients in $xclients; do
|
|
|
|
for yservers in $xservers; do
|
|
|
|
ysourcezone=${yclients%%:*}
|
|
|
|
ydestzone=${yservers%%:*}
|
|
|
|
if [ "${ysourcezone}" != "${ydestzone}" ] ; then
|
|
|
|
eval ypolicy=\$${ysourcezone}2${ydestzone}_policy
|
|
|
|
if [ "$ypolicy" != NONE ] ; then
|
2003-12-07 19:15:55 +01:00
|
|
|
process_action $xaction $xtarget $yclients $yservers $xprotocol $xports $xcports $xratelimit
|
2003-12-04 03:01:08 +01:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2003-12-07 19:15:55 +01:00
|
|
|
do_it() {
|
|
|
|
expandv xclients xservers xprotocol xports xcports xratelimit
|
|
|
|
|
|
|
|
if [ "x$xclients" = xall ]; then
|
|
|
|
xclients="$zones $FW"
|
|
|
|
if [ "x$xservers" = xall ]; then
|
|
|
|
xservers="$zones $FW"
|
|
|
|
fi
|
|
|
|
process_wildcard_rule
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ "x$xservers" = xall ]; then
|
|
|
|
xservers="$zones $FW"
|
|
|
|
process_wildcard_rule
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
process_action $xaction $xtarget $xclients $xservers $xprotocol $xports $xcports $xratelimit
|
|
|
|
}
|
|
|
|
|
2003-12-04 03:01:08 +01:00
|
|
|
strip_file actions
|
|
|
|
|
2003-12-07 19:15:55 +01:00
|
|
|
while read xaction rest; do
|
|
|
|
[ "x$rest" = x ] || fatal_error "Invalid Action: $xaction $rest"
|
|
|
|
[ "$command" = check ] || createchain $xaction No
|
2003-12-04 03:01:08 +01:00
|
|
|
|
2003-12-07 19:15:55 +01:00
|
|
|
f=action.$xaction
|
2003-12-04 03:01:08 +01:00
|
|
|
fn=`find_file $f`
|
|
|
|
|
|
|
|
if [ -f $fn ]; then
|
2003-12-07 19:15:55 +01:00
|
|
|
echo "Processing $fn..."
|
2003-12-04 03:01:08 +01:00
|
|
|
strip_file $f $fn
|
|
|
|
while read xtarget xclients xservers xprotocol xports xcports xratelimit ; do
|
2003-12-07 19:15:55 +01:00
|
|
|
expandv xtarget
|
2003-12-04 03:01:08 +01:00
|
|
|
temp="${xtarget%:*}"
|
|
|
|
case "${temp%<*}" in
|
|
|
|
ACCEPT|DROP|REJECT|LOG|QUEUE)
|
2003-12-07 19:15:55 +01:00
|
|
|
do_it
|
2003-12-04 03:01:08 +01:00
|
|
|
;;
|
|
|
|
*)
|
2003-12-07 19:15:55 +01:00
|
|
|
if list_search $temp $ACTIONS; then
|
|
|
|
do_it
|
|
|
|
else
|
|
|
|
rule="`echo $xtarget $xclients $xservers $xprotocol $xports $xcports $xratelimit`"
|
|
|
|
fatal_error "Invalid TARGET in rule \"$rule\""
|
|
|
|
fi
|
2003-12-04 03:01:08 +01:00
|
|
|
;;
|
|
|
|
|
|
|
|
esac
|
|
|
|
done < $TMP_DIR/$f
|
|
|
|
else
|
|
|
|
fatal_error "Missing Action File: $f"
|
|
|
|
fi
|
2003-12-07 19:15:55 +01:00
|
|
|
|
|
|
|
ACTIONS="$ACTIONS $xaction"
|
|
|
|
done < $TMP_DIR/actions
|
2003-12-04 03:01:08 +01:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Add a NAT rule - Helper function for the rules file processor
|
|
|
|
#
|
|
|
|
# The caller has established the following variables:
|
2003-02-27 23:28:06 +01:00
|
|
|
# command = The current command -- if 'check', we just go through
|
|
|
|
# the motions.
|
2002-10-23 18:48:40 +02:00
|
|
|
# cli = Source IP, interface or MAC Specification
|
|
|
|
# serv = Destination IP Specification
|
|
|
|
# servport = Port the server is listening on
|
|
|
|
# dest_interface = Destination Interface Specification
|
|
|
|
# proto = Protocol Specification
|
|
|
|
# addr = Original Destination Address
|
|
|
|
# dports = Destination Port Specification. 'dports' may be changed
|
|
|
|
# by this function
|
|
|
|
# cport = Source Port Specification
|
|
|
|
# multiport = String to invoke multiport match if appropriate
|
2003-08-23 20:14:59 +02:00
|
|
|
# ratelimit = Optional rate limiting clause
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-19 23:51:36 +02:00
|
|
|
add_nat_rule() {
|
|
|
|
local chain
|
2003-05-31 17:29:14 +02:00
|
|
|
local excludedests=
|
2002-06-19 23:51:36 +02:00
|
|
|
|
2003-06-02 20:08:35 +02:00
|
|
|
# Be sure we can NAT
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-05-31 17:29:14 +02:00
|
|
|
if [ -z "$NAT_ENABLED" ]; then
|
|
|
|
fatal_error "Rule \"$rule\" requires NAT which is disabled"
|
|
|
|
fi
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
# Parse SNAT address if any
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
if [ "$addr" != "${addr%:*}" ]; then
|
|
|
|
snat="${addr#*:}"
|
|
|
|
addr="${addr%:*}"
|
|
|
|
else
|
|
|
|
snat=""
|
|
|
|
fi
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
# Set original destination address
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-07-09 17:44:49 +02:00
|
|
|
case $addr in
|
|
|
|
all)
|
|
|
|
addr=
|
|
|
|
;;
|
|
|
|
detect)
|
2003-05-31 17:29:14 +02:00
|
|
|
addr=
|
|
|
|
if [ -n "$DETECT_DNAT_IPADDRS" -a "$source" != "$FW" ]; then
|
|
|
|
eval interfaces=\$${source}_interfaces
|
|
|
|
for interface in $interfaces; do
|
2003-06-02 20:08:35 +02:00
|
|
|
addr=${addr:+$addr,}`find_interface_address $interface`
|
2003-05-31 17:29:14 +02:00
|
|
|
done
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
!*)
|
|
|
|
if [ `list_count $addr` -gt 1 ]; then
|
|
|
|
excludedests="`separate_list ${addr#\!}`"
|
|
|
|
addr=
|
|
|
|
fi
|
|
|
|
;;
|
2002-07-09 17:44:49 +02:00
|
|
|
esac
|
|
|
|
|
|
|
|
addr=${addr:-0.0.0.0/0}
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
# Select target
|
|
|
|
|
|
|
|
if [ -n "$serv" ]; then
|
|
|
|
servport="${servport:+:$servport}"
|
2003-07-01 22:29:01 +02:00
|
|
|
serv1=
|
|
|
|
for srv in `separate_list $serv`; do
|
|
|
|
serv1="$serv1 --to-destination ${srv}${servport}"
|
|
|
|
done
|
|
|
|
target1="DNAT $serv1"
|
2002-06-19 23:51:36 +02:00
|
|
|
else
|
|
|
|
target1="REDIRECT --to-port $servport"
|
|
|
|
fi
|
|
|
|
|
2003-05-31 18:34:17 +02:00
|
|
|
if [ $source = $FW ]; then
|
|
|
|
[ -n "$excludezones" ] && fatal_error "Invalid Source in rule \"$rule\""
|
|
|
|
fi
|
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
# Generate nat table rules
|
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
if [ $command != check ]; then
|
|
|
|
if [ "$source" = "$FW" ]; then
|
2003-05-31 18:34:17 +02:00
|
|
|
if [ -n "$excludedests" ]; then
|
|
|
|
chain=nonat${nonat_seq}
|
|
|
|
nonat_seq=$(($nonat_seq + 1))
|
|
|
|
createnatchain $chain
|
2003-07-14 21:43:32 +02:00
|
|
|
|
|
|
|
for adr in `separate_list $addr`; do
|
2003-07-14 22:16:24 +02:00
|
|
|
run_iptables2 -t nat -A OUTPUT $cli $proto $multiport $sports $dports -d $adr -j $chain
|
2003-07-14 21:43:32 +02:00
|
|
|
done
|
2003-06-01 20:14:57 +02:00
|
|
|
|
2003-05-31 18:34:17 +02:00
|
|
|
for adr in $excludedests; do
|
|
|
|
addnatrule $chain -d $adr -j RETURN
|
|
|
|
done
|
|
|
|
|
|
|
|
if [ -n "$loglevel" ]; then
|
2003-06-01 20:14:57 +02:00
|
|
|
log_rule $loglevel $chain $logtarget -t nat
|
2003-05-31 18:34:17 +02:00
|
|
|
fi
|
|
|
|
|
2003-08-13 19:07:05 +02:00
|
|
|
addnatrule $chain $ratelimit $proto -j $target1 # Protocol is necessary for port redirection
|
2003-05-31 18:34:17 +02:00
|
|
|
else
|
|
|
|
for adr in `separate_list $addr`; do
|
2003-07-14 21:51:25 +02:00
|
|
|
if [ -n "$loglevel" ]; then
|
2003-08-23 20:14:59 +02:00
|
|
|
log_rule_limit $loglevel $OUTPUT $logtarget "$ratelimit" -t nat \
|
2003-07-14 21:51:25 +02:00
|
|
|
`fix_bang $proto $cli $sports -d $adr $multiport $dports`
|
|
|
|
fi
|
2003-07-14 22:25:03 +02:00
|
|
|
|
2003-08-13 19:07:05 +02:00
|
|
|
run_iptables2 -t nat -A OUTPUT $ratelimit $proto $sports -d $adr $multiport $dports -j $target1
|
2003-05-31 18:34:17 +02:00
|
|
|
done
|
|
|
|
fi
|
2003-02-27 23:28:06 +01:00
|
|
|
else
|
|
|
|
chain=`dnat_chain $source`
|
|
|
|
|
2003-05-31 17:29:14 +02:00
|
|
|
if [ -n "${excludezones}${excludedests}" ]; then
|
2003-02-27 23:28:06 +01:00
|
|
|
chain=nonat${nonat_seq}
|
|
|
|
nonat_seq=$(($nonat_seq + 1))
|
|
|
|
createnatchain $chain
|
2003-07-14 21:43:32 +02:00
|
|
|
|
|
|
|
for adr in `separate_list $addr`; do
|
2003-07-14 21:51:25 +02:00
|
|
|
addnatrule `dnat_chain $source` $cli $proto $multiport $sports $dports -d $adr -j $chain
|
2003-07-14 21:43:32 +02:00
|
|
|
done
|
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
for z in $excludezones; do
|
|
|
|
eval hosts=\$${z}_hosts
|
|
|
|
for host in $hosts; do
|
2003-07-14 21:43:32 +02:00
|
|
|
addnatrule $chain -s ${host#*:} -j RETURN
|
2002-07-09 17:44:49 +02:00
|
|
|
done
|
2002-05-18 15:45:23 +02:00
|
|
|
done
|
2003-02-27 23:28:06 +01:00
|
|
|
|
2003-05-31 17:29:14 +02:00
|
|
|
for adr in $excludedests; do
|
|
|
|
addnatrule $chain -d $adr -j RETURN
|
|
|
|
done
|
2003-05-22 22:37:24 +02:00
|
|
|
|
2003-07-14 21:43:32 +02:00
|
|
|
if [ -n "$loglevel" ]; then
|
2003-08-22 17:27:08 +02:00
|
|
|
log_rule_limit $loglevel $chain $logtarget "$ratelimit" -t nat
|
2003-07-14 21:43:32 +02:00
|
|
|
fi
|
2003-05-31 17:29:14 +02:00
|
|
|
|
2003-08-13 19:07:05 +02:00
|
|
|
addnatrule $chain $ratelimit $proto -j $target1 # Protocol is necessary for port redirection
|
2003-05-31 17:29:14 +02:00
|
|
|
else
|
|
|
|
for adr in `separate_list $addr`; do
|
|
|
|
if [ -n "$loglevel" ]; then
|
|
|
|
ensurenatchain $chain
|
2003-08-22 17:27:08 +02:00
|
|
|
log_rule_limit $loglevel $chain $logtarget "$ratelimit" -t nat \
|
2003-05-31 17:29:14 +02:00
|
|
|
`fix_bang $proto $cli $sports -d $adr $multiport $dports`
|
|
|
|
fi
|
|
|
|
|
2003-08-13 19:07:05 +02:00
|
|
|
addnatrule $chain $proto $ratelimit $cli $sports \
|
2003-05-31 17:29:14 +02:00
|
|
|
-d $adr $multiport $dports -j $target1
|
|
|
|
done
|
|
|
|
fi
|
2002-05-18 15:45:23 +02:00
|
|
|
fi
|
2002-06-19 23:51:36 +02:00
|
|
|
fi
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
# Replace destination port by the new destination port
|
|
|
|
|
2002-08-14 18:01:32 +02:00
|
|
|
if [ -n "$servport" ]; then
|
|
|
|
if [ -z "$multiport" ]; then
|
|
|
|
dports="--dport ${servport#*:}"
|
|
|
|
else
|
|
|
|
dports="--dports ${servport#*:}"
|
|
|
|
fi
|
|
|
|
fi
|
2002-06-19 23:51:36 +02:00
|
|
|
|
|
|
|
# Handle SNAT
|
|
|
|
|
|
|
|
if [ -n "$snat" ]; then
|
|
|
|
if [ -n "$cli" ]; then
|
2003-02-27 23:28:06 +01:00
|
|
|
[ $command = check ] || addnatrule `snat_chain $dest` $proto $cli $multiport \
|
2002-06-19 23:51:36 +02:00
|
|
|
$sports -d $serv $dports -j SNAT --to-source $snat
|
|
|
|
else
|
|
|
|
for source_host in $source_hosts; do
|
2002-07-05 17:56:02 +02:00
|
|
|
[ "x${source_host#*:}" = "x0.0.0.0/0" ] && \
|
|
|
|
error_message "Warning: SNAT will occur on all connections to this server and port - rule \"$rule\""
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
[ $command = check ] || addnatrule `snat_chain $dest` \
|
2002-07-04 01:31:50 +02:00
|
|
|
-s ${source_host#*:} $proto $sports $multiport \
|
2002-06-19 23:51:36 +02:00
|
|
|
-d $serv $dports -j SNAT --to-source $snat
|
|
|
|
done
|
2002-05-18 15:45:23 +02:00
|
|
|
fi
|
2002-06-19 23:51:36 +02:00
|
|
|
fi
|
2003-07-03 18:12:28 +02:00
|
|
|
|
2003-08-13 19:07:05 +02:00
|
|
|
[ "x$addr" = "x0.0.0.0/0" ] && addr=
|
|
|
|
ratelimit=
|
2002-06-19 23:51:36 +02:00
|
|
|
}
|
2002-05-18 15:45:23 +02:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Add one Filter Rule -- Helper function for the rules file processor
|
|
|
|
#
|
|
|
|
# The caller has established the following variables:
|
2003-02-27 23:28:06 +01:00
|
|
|
# check = current command. If 'check', we're executing a 'check'
|
|
|
|
# which only goes through the motions.
|
2002-10-23 18:48:40 +02:00
|
|
|
# client = SOURCE IP or MAC
|
|
|
|
# server = DESTINATION IP or interface
|
|
|
|
# protocol = Protocol
|
|
|
|
# address = Original Destination Address
|
|
|
|
# port = Destination Port
|
|
|
|
# cport = Source Port
|
|
|
|
# multioption = String to invoke multiport match if appropriate
|
|
|
|
# servport = Port the server listens on
|
|
|
|
# chain = The canonical chain for this rule
|
2003-08-13 19:07:05 +02:00
|
|
|
# ratelimit = Optional rate limiting clause
|
2003-09-19 21:42:05 +02:00
|
|
|
# userandgroup= -m owner clause
|
|
|
|
# userset = User set name
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-19 23:51:36 +02:00
|
|
|
add_a_rule()
|
|
|
|
{
|
2003-06-01 05:14:20 +02:00
|
|
|
local natrule=
|
2003-05-31 17:29:14 +02:00
|
|
|
|
2003-10-10 00:33:44 +02:00
|
|
|
do_ports() {
|
|
|
|
if [ -n "$port" ]; then
|
|
|
|
dports="--dport"
|
|
|
|
if [ -n "$multioption" -a "$port" != "${port%,*}" ]; then
|
|
|
|
multiport="$multioption"
|
|
|
|
dports="--dports"
|
|
|
|
fi
|
|
|
|
dports="$dports $port"
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$cport" ]; then
|
|
|
|
sports="--sport"
|
|
|
|
if [ -n "$multioption" -a "$cport" != "${cport%,*}" ]; then
|
|
|
|
multiport="$multioption"
|
|
|
|
sports="--sports"
|
|
|
|
fi
|
|
|
|
sports="$sports $cport"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2003-06-01 20:14:57 +02:00
|
|
|
# Set source variables. The 'cli' variable will hold the client match predicate(s).
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
cli=
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-06-01 05:14:20 +02:00
|
|
|
case "$client" in
|
2002-06-19 23:51:36 +02:00
|
|
|
-)
|
|
|
|
;;
|
2002-09-25 01:13:36 +02:00
|
|
|
*:*)
|
|
|
|
cli="-i ${client%:*} -s ${client#*:}"
|
|
|
|
;;
|
|
|
|
*.*.*)
|
2002-07-06 00:24:40 +02:00
|
|
|
cli="-s $client"
|
2002-06-19 23:51:36 +02:00
|
|
|
;;
|
|
|
|
~*)
|
|
|
|
cli=`mac_match $client`
|
|
|
|
;;
|
|
|
|
*)
|
2003-06-01 05:14:20 +02:00
|
|
|
[ -n "$client" ] && cli="-i $client"
|
2002-06-19 23:51:36 +02:00
|
|
|
;;
|
|
|
|
esac
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-06-01 20:14:57 +02:00
|
|
|
# Set destination variables - 'serv' and 'dest_interface' hold the server match predicate(s).
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
dest_interface=
|
2003-02-08 21:58:44 +01:00
|
|
|
serv=
|
2002-06-19 23:51:36 +02:00
|
|
|
|
2003-06-01 05:14:20 +02:00
|
|
|
case "$server" in
|
2002-06-19 23:51:36 +02:00
|
|
|
-)
|
|
|
|
;;
|
2002-09-25 01:13:36 +02:00
|
|
|
*.*.*)
|
2002-07-06 00:24:40 +02:00
|
|
|
serv=$server
|
2002-06-19 23:51:36 +02:00
|
|
|
;;
|
2002-12-10 23:48:04 +01:00
|
|
|
~*)
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Rule \"$rule\" - Destination may not be specified by MAC Address"
|
2002-12-10 23:48:04 +01:00
|
|
|
;;
|
2002-06-19 23:51:36 +02:00
|
|
|
*)
|
2003-06-01 05:14:20 +02:00
|
|
|
[ -n "$server" ] && dest_interface="-o $server"
|
2002-06-19 23:51:36 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
# Setup protocol and port variables
|
|
|
|
|
|
|
|
sports=
|
|
|
|
dports=
|
|
|
|
state="-m state --state NEW"
|
|
|
|
proto=$protocol
|
|
|
|
addr=$address
|
|
|
|
servport=$serverport
|
|
|
|
multiport=
|
|
|
|
|
2003-06-28 17:22:22 +02:00
|
|
|
[ x$port = x- ] && port=
|
|
|
|
[ x$cport = x- ] && cport=
|
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
case $proto in
|
2003-10-09 23:26:08 +02:00
|
|
|
tcp|TCP|6)
|
2003-10-10 00:33:44 +02:00
|
|
|
do_ports
|
2003-10-09 23:26:08 +02:00
|
|
|
[ "$target" = QUEUE ] && proto="$proto --syn"
|
|
|
|
;;
|
|
|
|
udp|UDP|17)
|
2003-10-10 00:33:44 +02:00
|
|
|
do_ports
|
2003-10-09 23:26:08 +02:00
|
|
|
;;
|
2002-06-25 18:11:27 +02:00
|
|
|
icmp|ICMP|1)
|
2003-06-28 17:22:22 +02:00
|
|
|
[ -n "$port" ] && dports="--icmp-type $port"
|
2002-06-19 23:51:36 +02:00
|
|
|
state=
|
|
|
|
;;
|
|
|
|
all|ALL)
|
2003-06-28 17:22:22 +02:00
|
|
|
[ -n "$port" ] && \
|
2003-07-04 17:08:29 +02:00
|
|
|
fatal_error "Port number not allowed with protocol \"all\"; rule: \"$rule\""
|
2002-06-19 23:51:36 +02:00
|
|
|
proto=
|
|
|
|
;;
|
|
|
|
*)
|
2002-09-26 22:35:25 +02:00
|
|
|
state=
|
2003-06-28 17:22:22 +02:00
|
|
|
[ -n "$port" ] && \
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Port number not allowed with protocol \"$proto\"; rule: \"$rule\""
|
2002-06-19 23:51:36 +02:00
|
|
|
;;
|
|
|
|
esac
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
proto="${proto:+-p $proto}"
|
|
|
|
|
|
|
|
# Some misc. setup
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
case "$logtarget" in
|
2002-05-18 15:45:23 +02:00
|
|
|
REJECT)
|
2002-07-18 15:43:51 +02:00
|
|
|
[ -n "$servport" ] && \
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Server port may not be specified in a REJECT rule;"\
|
2002-07-18 15:43:51 +02:00
|
|
|
"rule: \"$rule\""
|
2002-05-18 15:45:23 +02:00
|
|
|
;;
|
|
|
|
REDIRECT)
|
2003-02-08 21:58:44 +01:00
|
|
|
[ -n "$serv" ] && startup_error "REDIRECT rules cannot"\
|
2002-05-30 14:55:47 +02:00
|
|
|
" specify a server IP; rule: \"$rule\""
|
2002-05-18 15:45:23 +02:00
|
|
|
servport=${servport:=$port}
|
2003-06-01 05:14:20 +02:00
|
|
|
natrule=Yes
|
2002-05-18 15:45:23 +02:00
|
|
|
;;
|
2002-05-30 14:55:47 +02:00
|
|
|
DNAT)
|
2003-02-08 21:58:44 +01:00
|
|
|
[ -n "$serv" ] || fatal_error "DNAT rules require a" \
|
2002-06-19 23:51:36 +02:00
|
|
|
" server address; rule: \"$rule\""
|
2003-06-01 05:14:20 +02:00
|
|
|
natrule=Yes
|
2002-05-30 14:55:47 +02:00
|
|
|
;;
|
2003-02-08 21:58:44 +01:00
|
|
|
LOG)
|
|
|
|
[ -z "$loglevel" ] && fatal_error "LOG requires log level"
|
|
|
|
;;
|
2002-06-19 23:51:36 +02:00
|
|
|
esac
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
# Complain if the rule is really a policy
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-08-21 15:18:51 +02:00
|
|
|
if [ -z "$proto" -a -z "$cli" -a -z "$serv" -a -z "$servport" -a -z "$userset" -a "$logtarget" != LOG ]; then
|
2002-06-19 23:51:36 +02:00
|
|
|
error_message "Warning -- Rule \"$rule\" is a POLICY"
|
2002-07-06 00:24:40 +02:00
|
|
|
error_message " -- and should be moved to the policy file"
|
2002-06-19 23:51:36 +02:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
if [ -n "${serv}${servport}" ]; then
|
2003-02-27 23:28:06 +01:00
|
|
|
if [ $command != check ]; then
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
# A specific server or server port given
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-06-01 05:14:20 +02:00
|
|
|
if [ -n "$natrule" ]; then
|
2003-06-01 18:51:34 +02:00
|
|
|
add_nat_rule
|
2003-06-01 05:14:20 +02:00
|
|
|
elif [ -n "$addr" -a "$addr" != "$serv" ] || [ -n "$servport" -a "$servport" != "$port" ]; then
|
2003-06-03 00:01:50 +02:00
|
|
|
fatal_error "Only DNAT and REDIRECT rules may specify destination mapping; rule \"$rule\""
|
2003-06-01 05:14:20 +02:00
|
|
|
fi
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
if [ -z "$dnat_only" -a $chain != ${FW}2${FW} ]; then
|
2003-06-23 00:56:25 +02:00
|
|
|
if [ -n "$serv" ]; then
|
2003-07-01 22:29:01 +02:00
|
|
|
for serv1 in `separate_list $serv`; do
|
|
|
|
for srv in `ip_range $serv1`; do
|
|
|
|
if [ -n "$addr" -a -n "$CONNTRACK_MATCH" ]; then
|
2003-07-14 21:43:32 +02:00
|
|
|
for adr in `separate_list $addr`; do
|
2003-07-01 22:29:01 +02:00
|
|
|
if [ -n "$loglevel" -a -z "$natrule" ]; then
|
2003-08-22 17:27:08 +02:00
|
|
|
log_rule_limit $loglevel $chain $logtarget "$ratelimit" -m conntrack --ctorigdst $adr \
|
2003-09-19 21:42:05 +02:00
|
|
|
$userandgroup `fix_bang $proto $sports $multiport $state $cli -d $srv $dports`
|
2003-07-01 22:29:01 +02:00
|
|
|
fi
|
|
|
|
|
2003-08-13 19:07:05 +02:00
|
|
|
run_iptables2 -A $chain $proto $ratelimit $multiport $state $cli $sports \
|
2003-09-19 21:42:05 +02:00
|
|
|
-d $srv $dports -m conntrack --ctorigdst $adr $userandgroup -j $target
|
2003-07-01 22:29:01 +02:00
|
|
|
done
|
|
|
|
else
|
2003-06-27 23:02:52 +02:00
|
|
|
if [ -n "$loglevel" -a -z "$natrule" ]; then
|
2003-09-19 21:42:05 +02:00
|
|
|
log_rule_limit $loglevel $chain $logtarget "$ratelimit" $userandgroup \
|
2003-06-27 23:02:52 +02:00
|
|
|
`fix_bang $proto $sports $multiport $state $cli -d $srv $dports`
|
|
|
|
fi
|
|
|
|
|
|
|
|
run_iptables2 -A $chain $proto $multiport $state $cli $sports \
|
2003-10-03 16:39:34 +02:00
|
|
|
-d $srv $dports $ratelimit $userandgroup -j $target
|
2003-06-27 23:02:52 +02:00
|
|
|
fi
|
2003-07-01 22:29:01 +02:00
|
|
|
done
|
2003-06-23 00:56:25 +02:00
|
|
|
done
|
|
|
|
else
|
|
|
|
if [ -n "$loglevel" -a -z "$natrule" ]; then
|
2003-09-19 21:42:05 +02:00
|
|
|
log_rule_limit $loglevel $chain $logtarget "$ratelimit" $userandgroup \
|
2003-06-23 00:56:25 +02:00
|
|
|
`fix_bang $proto $sports $multiport $state $cli $dports`
|
|
|
|
fi
|
2003-06-02 21:26:56 +02:00
|
|
|
|
2003-06-23 00:56:25 +02:00
|
|
|
run_iptables2 -A $chain $proto $multiport $state $cli $sports \
|
2003-09-19 21:42:05 +02:00
|
|
|
$dports $ratelimit $userandgroup -j $target
|
2003-06-23 00:56:25 +02:00
|
|
|
fi
|
2003-02-27 23:28:06 +01:00
|
|
|
fi
|
2002-12-14 16:44:26 +01:00
|
|
|
fi
|
2002-06-19 23:51:36 +02:00
|
|
|
else
|
|
|
|
|
|
|
|
# Destination is a simple zone
|
|
|
|
|
|
|
|
[ -n "$addr" ] && fatal_error \
|
2003-02-08 21:58:44 +01:00
|
|
|
"An ORIGINAL DESTINATION ($addr) is only allowed in" \
|
2002-06-19 23:51:36 +02:00
|
|
|
" a DNAT or REDIRECT: \"$rule\""
|
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
if [ $command != check ]; then
|
|
|
|
if [ -n "$loglevel" ]; then
|
2003-09-19 21:42:05 +02:00
|
|
|
log_rule_limit $loglevel $chain $logtarget "$ratelimit" $userandgroup \
|
2003-05-21 23:36:05 +02:00
|
|
|
`fix_bang $proto $multiport $dest_interface $state $cli $sports $dports`
|
2002-12-13 04:23:46 +01:00
|
|
|
fi
|
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
if [ $logtarget != LOG ]; then
|
|
|
|
run_iptables2 -A $chain $proto $multiport $dest_interface $state \
|
2003-09-19 21:42:05 +02:00
|
|
|
$cli $sports $dports $ratelimit $userandgroup -j $target
|
2003-02-27 23:28:06 +01:00
|
|
|
fi
|
2003-02-08 21:58:44 +01:00
|
|
|
fi
|
2002-06-19 23:51:36 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-02-27 23:28:06 +01:00
|
|
|
# Process a record from the rules file for the 'start', 'restart' or 'check' commands
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-11-11 20:21:47 +01:00
|
|
|
process_rule() # $1 = target
|
|
|
|
# $2 = clients
|
|
|
|
# $3 = servers
|
|
|
|
# $4 = protocol
|
|
|
|
# $5 = ports
|
|
|
|
# $6 = cports
|
2003-02-23 15:10:37 +01:00
|
|
|
# $7 = address
|
2003-08-15 17:54:13 +02:00
|
|
|
# $8 = ratelimit
|
2003-08-21 15:18:51 +02:00
|
|
|
# $9 = userset
|
2002-11-11 20:21:47 +01:00
|
|
|
{
|
|
|
|
local target="$1"
|
|
|
|
local clients="$2"
|
|
|
|
local servers="$3"
|
|
|
|
local protocol="$4"
|
|
|
|
local ports="$5"
|
|
|
|
local cports="$6"
|
|
|
|
local address="$7"
|
2003-08-15 17:54:13 +02:00
|
|
|
local ratelimit="$8"
|
2003-08-21 15:18:51 +02:00
|
|
|
local userset="$9"
|
2003-09-19 21:42:05 +02:00
|
|
|
local userandgroup=
|
2003-08-21 15:18:51 +02:00
|
|
|
local rule="`echo $target $clients $servers $protocol $ports $cports $address $ratelimit $userset`"
|
2002-06-19 23:51:36 +02:00
|
|
|
|
2003-08-13 19:07:05 +02:00
|
|
|
# Function Body - isolate rate limit
|
|
|
|
|
2004-01-27 22:16:07 +01:00
|
|
|
[ "x$ratelimit" = "x-" ] && ratelimit=
|
|
|
|
|
2003-08-15 17:54:13 +02:00
|
|
|
if [ -z "$ratelimit" ]; then
|
|
|
|
if [ "$target" != "${target%<*}" ]; then
|
|
|
|
ratelimit="${target#*<}"
|
|
|
|
ratelimit="${ratelimit%>*}"
|
|
|
|
target="${target%<*}${target#*>}"
|
|
|
|
expandv ratelimit
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$ratelimit" ]; then
|
2003-08-13 23:31:02 +02:00
|
|
|
case $ratelimit in
|
|
|
|
*:*)
|
|
|
|
ratelimit="-m limit --limit ${ratelimit%:*} --limit-burst ${ratelimit#*:}"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
ratelimit="-m limit --limit $ratelimit"
|
|
|
|
;;
|
|
|
|
esac
|
2003-08-13 19:07:05 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
# Isolate log level
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-11-13 01:57:48 +01:00
|
|
|
if [ "$target" = "${target%:*}" ]; then
|
2002-05-01 01:13:15 +02:00
|
|
|
loglevel=
|
|
|
|
else
|
|
|
|
loglevel="${target#*:}"
|
|
|
|
target="${target%:*}"
|
|
|
|
expandv loglevel
|
|
|
|
fi
|
2003-08-13 19:07:05 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
logtarget="$target"
|
2002-12-31 02:10:28 +01:00
|
|
|
dnat_only=
|
2002-06-19 23:51:36 +02:00
|
|
|
|
2003-06-01 20:14:57 +02:00
|
|
|
# Tranform the rule:
|
|
|
|
#
|
2003-09-22 23:44:22 +02:00
|
|
|
# - parse the user set specification
|
2003-06-01 20:14:57 +02:00
|
|
|
# - set 'target' to the filter table target.
|
|
|
|
# - make $FW the destination for REDIRECT
|
|
|
|
# - remove '-' suffix from logtargets while setting 'dnat_only'
|
|
|
|
# - clear 'address' if it has been set to '-'
|
2002-06-19 23:51:36 +02:00
|
|
|
|
2003-09-22 23:44:22 +02:00
|
|
|
[ "x$userset" = x- ] && userset=
|
2003-01-06 15:12:59 +01:00
|
|
|
[ "x$address" = "x-" ] && address=
|
|
|
|
|
2003-08-21 15:18:51 +02:00
|
|
|
if [ -n "$userset" ]; then
|
2003-09-19 21:42:05 +02:00
|
|
|
case "$userset" in
|
|
|
|
*:*)
|
|
|
|
case $target in
|
2004-01-27 22:16:07 +01:00
|
|
|
ACCEPT)
|
|
|
|
;;
|
|
|
|
REJECT|DROP)
|
|
|
|
[ -n "$ratelimit" ] && fatal_error \
|
|
|
|
"Rate Limiting only available with ACCEPT, DNAT[-], REDIRECT[-] and LOG"
|
2003-09-19 21:42:05 +02:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
fatal_error "<user>:<group> may only be specified in ACCEPT, REJECT and DROP rules: rule \"$rule\""
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
if [ "$userset" != ":" ]; then
|
|
|
|
userandgroup="-m owner"
|
|
|
|
temp="${userset%:*}"
|
|
|
|
[ -n "$temp" ] && userandgroup="$userandgroup --uid-owner $temp"
|
|
|
|
temp="${userset#*:}"
|
|
|
|
[ -n "$temp" ] && userandgroup="$userandgroup --gid-owner $temp"
|
|
|
|
fi
|
|
|
|
userset=
|
2003-08-21 15:18:51 +02:00
|
|
|
;;
|
|
|
|
*)
|
2003-09-19 21:42:05 +02:00
|
|
|
if ! havechain `accept_chain $userset`; then
|
|
|
|
fatal_error "Unknown user set $userset: rule \"$rule\""
|
|
|
|
fi
|
|
|
|
|
|
|
|
case $target in
|
|
|
|
ACCEPT)
|
|
|
|
target=`accept_chain $userset`
|
|
|
|
;;
|
|
|
|
DROP)
|
2004-01-27 22:16:07 +01:00
|
|
|
[ -n "$ratelimit" ] && fatal_error \
|
|
|
|
"Rate Limiting only available with ACCEPT, DNAT[-], REDIRECT[-] and LOG"
|
2003-09-19 21:42:05 +02:00
|
|
|
target=`drop_chain $userset`
|
|
|
|
;;
|
|
|
|
REJECT)
|
2004-01-27 22:16:07 +01:00
|
|
|
[ -n "$ratelimit" ] && fatal_error \
|
|
|
|
"Rate Limiting only available with ACCEPT, DNAT[-], REDIRECT[-] and LOG"
|
2003-09-19 21:42:05 +02:00
|
|
|
target=`reject_chain $userset`
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
fatal_error "A user set may only be specified in ACCEPT, REJECT and DROP rules: rule \"$rule\""
|
|
|
|
esac
|
|
|
|
|
|
|
|
[ -n "$loglevel" ] && \
|
|
|
|
fatal_error "Logging may not be specified on a rule with a User Set: rule \"$rule\""
|
|
|
|
;;
|
2003-08-21 15:18:51 +02:00
|
|
|
esac
|
|
|
|
else
|
|
|
|
case $target in
|
|
|
|
ACCEPT|LOG)
|
|
|
|
;;
|
|
|
|
REJECT)
|
2004-01-27 22:16:07 +01:00
|
|
|
[ -n "$ratelimit" ] && fatal_error \
|
|
|
|
"Rate Limiting only available with ACCEPT, DNAT[-], REDIRECT[-] and LOG"
|
2003-08-21 15:18:51 +02:00
|
|
|
target=reject
|
|
|
|
;;
|
2004-01-27 22:16:07 +01:00
|
|
|
CONTINUE)
|
|
|
|
[ -n "$ratelimit" ] && fatal_error \
|
|
|
|
"Rate Limiting only available with ACCEPT, DNAT[-], REDIRECT[-] and LOG"
|
|
|
|
target=RETURN
|
|
|
|
;;
|
2003-08-21 15:18:51 +02:00
|
|
|
DNAT)
|
|
|
|
target=ACCEPT
|
|
|
|
address=${address:=detect}
|
|
|
|
;;
|
|
|
|
DNAT-)
|
|
|
|
target=ACCEPT
|
|
|
|
address=${address:=detect}
|
|
|
|
dnat_only=Yes
|
|
|
|
logtarget=DNAT
|
|
|
|
;;
|
|
|
|
REDIRECT)
|
|
|
|
target=ACCEPT
|
|
|
|
address=${address:=all}
|
|
|
|
if [ "x-" = "x$servers" ]; then
|
|
|
|
servers=$FW
|
|
|
|
else
|
|
|
|
servers="$FW::$servers"
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
REDIRECT-)
|
|
|
|
target=ACCEPT
|
|
|
|
logtarget=REDIRECT
|
|
|
|
dnat_only=Yes
|
|
|
|
address=${address:=all}
|
|
|
|
if [ "x-" = "x$servers" ]; then
|
|
|
|
servers=$FW
|
|
|
|
else
|
|
|
|
servers="$FW::$servers"
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
[ -n "$ratelimit" ] && fatal_error \
|
|
|
|
"Rate Limiting only available with ACCEPT, DNAT[-], REDIRECT[-] and LOG"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
# Parse and validate source
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
if [ "$clients" = "${clients%:*}" ]; then
|
|
|
|
clientzone="$clients"
|
|
|
|
clients=
|
|
|
|
else
|
2002-09-19 01:38:09 +02:00
|
|
|
clientzone="${clients%%:*}"
|
2002-07-06 00:24:40 +02:00
|
|
|
clients="${clients#*:}"
|
2002-07-18 15:43:51 +02:00
|
|
|
[ -z "$clientzone" -o -z "$clients" ] && \
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Empty source zone or qualifier: rule \"$rule\""
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-07-14 18:20:45 +02:00
|
|
|
if [ "$clientzone" = "${clientzone%!*}" ]; then
|
2002-07-06 00:24:40 +02:00
|
|
|
excludezones=
|
2002-05-18 15:45:23 +02:00
|
|
|
else
|
2003-07-14 18:20:45 +02:00
|
|
|
excludezones="${clientzone#*!}"
|
|
|
|
clientzone="${clientzone%!*}"
|
2002-05-18 15:45:23 +02:00
|
|
|
|
|
|
|
[ "$logtarget" = DNAT ] || [ "$logtarget" = REDIRECT ] ||\
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Exclude list only allowed with DNAT or REDIRECT"
|
2002-05-18 15:45:23 +02:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-06-01 20:14:57 +02:00
|
|
|
validate_zone $clientzone || fatal_error "Undefined Client Zone in rule \"$rule\""
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
# Parse and validate destination
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
source=$clientzone
|
|
|
|
|
2003-08-21 15:18:51 +02:00
|
|
|
if [ $source = $FW ]; then
|
2003-12-16 22:52:37 +01:00
|
|
|
source_hosts=
|
2003-08-21 15:18:51 +02:00
|
|
|
elif [ -n "$userset" ]; then
|
|
|
|
fatal_error "Invalid use of a user set: rule \"$rule\""
|
2003-12-16 22:52:37 +01:00
|
|
|
else
|
|
|
|
eval source_hosts=\"\$${source}_hosts\"
|
2003-08-21 15:18:51 +02:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
if [ "$servers" = "${servers%:*}" ] ; then
|
|
|
|
serverzone="$servers"
|
|
|
|
servers=
|
|
|
|
serverport=
|
|
|
|
else
|
|
|
|
serverzone="${servers%%:*}"
|
|
|
|
servers="${servers#*:}"
|
|
|
|
if [ "$servers" != "${servers%:*}" ] ; then
|
|
|
|
serverport="${servers#*:}"
|
|
|
|
servers="${servers%:*}"
|
2002-07-18 15:43:51 +02:00
|
|
|
[ -z "$serverzone" -o -z "$serverport" ] && \
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Empty destination zone or server port: rule \"$rule\""
|
2002-05-01 01:13:15 +02:00
|
|
|
else
|
|
|
|
serverport=
|
2002-07-18 15:43:51 +02:00
|
|
|
[ -z "$serverzone" -o -z "$servers" ] && \
|
2003-03-21 05:14:20 +01:00
|
|
|
fatal_error "Empty destination zone or qualifier: rule \"$rule\""
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
fi
|
2002-06-19 23:51:36 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
if ! validate_zone $serverzone; then
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Undefined Server Zone in rule \"$rule\""
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
dest=$serverzone
|
2002-06-19 23:51:36 +02:00
|
|
|
|
2003-06-01 20:14:57 +02:00
|
|
|
# Ensure that this rule doesn't apply to a NONE policy pair of zones
|
2002-06-19 23:51:36 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
chain=${source}2${dest}
|
2002-11-11 18:38:40 +01:00
|
|
|
|
2003-03-21 20:23:03 +01:00
|
|
|
eval policy=\$${chain}_policy
|
2003-03-21 05:14:20 +01:00
|
|
|
|
2003-09-26 23:34:16 +02:00
|
|
|
[ -z "$policy" ] && \
|
|
|
|
fatal_error "No policy defined from zone $source to zone $dest"
|
|
|
|
|
2003-03-21 05:14:20 +01:00
|
|
|
[ $policy = NONE ] && \
|
|
|
|
fatal_error "Rules may not override a NONE policy: rule \"$rule\""
|
|
|
|
|
2003-06-01 20:14:57 +02:00
|
|
|
# Be sure that this isn't a fw->fw rule.
|
2002-12-14 16:44:26 +01:00
|
|
|
|
2002-11-11 19:24:38 +01:00
|
|
|
if [ "x$chain" = x${FW}2${FW} ]; then
|
2002-12-14 16:44:26 +01:00
|
|
|
case $logtarget in
|
2003-06-03 00:01:50 +02:00
|
|
|
REDIRECT|DNAT)
|
|
|
|
#
|
|
|
|
# Redirect rules that have the firewall as the source are fw->fw rules
|
|
|
|
#
|
2002-12-14 16:44:26 +01:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
error_message "WARNING: fw -> fw rules are not supported; rule \"$rule\" ignored"
|
|
|
|
return
|
|
|
|
;;
|
|
|
|
esac
|
2003-06-03 00:01:50 +02:00
|
|
|
else
|
2002-11-11 18:38:40 +01:00
|
|
|
|
2003-06-03 00:01:50 +02:00
|
|
|
# Create the canonical chain if it doesn't already exist
|
2003-06-01 20:14:57 +02:00
|
|
|
|
2003-06-03 00:01:50 +02:00
|
|
|
[ $command = check ] || ensurechain $chain
|
|
|
|
fi
|
2003-06-01 20:14:57 +02:00
|
|
|
|
2002-06-19 23:51:36 +02:00
|
|
|
# Generate Netfilter rule(s)
|
|
|
|
|
2003-10-08 20:45:26 +02:00
|
|
|
protocol=${protocol:=all}
|
|
|
|
|
2003-07-01 22:29:01 +02:00
|
|
|
case $logtarget in
|
|
|
|
DNAT*)
|
2003-10-08 20:45:26 +02:00
|
|
|
if [ -n "$MULTIPORT" ] && \
|
|
|
|
! list_search $protocol "icmp" "ICMP" "1" && \
|
|
|
|
[ "$ports" = "${ports%:*}" -a \
|
2003-07-01 22:29:01 +02:00
|
|
|
"$cports" = "${cports%:*}" -a \
|
|
|
|
`list_count $ports` -le 15 -a \
|
|
|
|
`list_count $cports` -le 15 ]
|
|
|
|
then
|
|
|
|
#
|
|
|
|
# MULTIPORT is enabled, there are no port ranges in the rule and less than
|
|
|
|
# 16 ports are listed - use multiport match.
|
|
|
|
#
|
|
|
|
multioption="-m multiport"
|
|
|
|
for client in `separate_list ${clients:=-}`; do
|
|
|
|
#
|
|
|
|
# add_a_rule() modifies these so we must set their values each time
|
|
|
|
#
|
|
|
|
server=${servers:=-}
|
|
|
|
port=${ports:=-}
|
|
|
|
cport=${cports:=-}
|
|
|
|
add_a_rule
|
|
|
|
done
|
|
|
|
else
|
|
|
|
#
|
|
|
|
# MULTIPORT is disabled or the rule isn't compatible with multiport match
|
|
|
|
#
|
|
|
|
multioption=
|
|
|
|
for client in `separate_list ${clients:=-}`; do
|
|
|
|
for port in `separate_list ${ports:=-}`; do
|
|
|
|
for cport in `separate_list ${cports:=-}`; do
|
|
|
|
server=${servers:=-}
|
|
|
|
add_a_rule
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
|
2003-10-08 20:45:26 +02:00
|
|
|
if [ -n "$MULTIPORT" ] && \
|
|
|
|
! list_search $protocol "icmp" "ICMP" "1" && \
|
|
|
|
[ "$ports" = "${ports%:*}" -a \
|
2003-07-01 22:29:01 +02:00
|
|
|
"$cports" = "${cports%:*}" -a \
|
|
|
|
`list_count $ports` -le 15 -a \
|
|
|
|
`list_count $cports` -le 15 ]
|
|
|
|
then
|
|
|
|
#
|
|
|
|
# MULTIPORT is enabled, there are no port ranges in the rule and less than
|
|
|
|
# 16 ports are listed - use multiport match.
|
|
|
|
#
|
|
|
|
multioption="-m multiport"
|
|
|
|
for client in `separate_list ${clients:=-}`; do
|
|
|
|
for server in `separate_list ${servers:=-}`; do
|
|
|
|
#
|
|
|
|
# add_a_rule() modifies these so we must set their values each time
|
|
|
|
#
|
|
|
|
port=${ports:=-}
|
|
|
|
cport=${cports:=-}
|
2002-07-06 00:24:40 +02:00
|
|
|
add_a_rule
|
2002-06-02 19:05:51 +02:00
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
2003-07-01 22:29:01 +02:00
|
|
|
else
|
|
|
|
#
|
|
|
|
# MULTIPORT is disabled or the rule isn't compatible with multiport match
|
|
|
|
#
|
|
|
|
multioption=
|
|
|
|
for client in `separate_list ${clients:=-}`; do
|
|
|
|
for server in `separate_list ${servers:=-}`; do
|
|
|
|
for port in `separate_list ${ports:=-}`; do
|
|
|
|
for cport in `separate_list ${cports:=-}`; do
|
|
|
|
add_a_rule
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
esac
|
2003-06-01 20:14:57 +02:00
|
|
|
#
|
|
|
|
# Report Result
|
|
|
|
#
|
2003-02-27 23:28:06 +01:00
|
|
|
if [ $command = check ]; then
|
|
|
|
echo " Rule \"$rule\" checked."
|
|
|
|
else
|
|
|
|
echo " Rule \"$rule\" added."
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-02-27 23:28:06 +01:00
|
|
|
# Process the rules file for the 'start', 'restart' or 'check' command.
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-09-27 16:54:16 +02:00
|
|
|
process_rules()
|
2002-05-01 01:13:15 +02:00
|
|
|
{
|
2002-11-13 01:57:48 +01:00
|
|
|
#
|
|
|
|
# Process a rule where the source or destination is "all"
|
|
|
|
#
|
2002-11-11 20:21:47 +01:00
|
|
|
process_wildcard_rule() {
|
2003-12-04 03:01:08 +01:00
|
|
|
local yclients yservers ysourcezone ydestzone ypolicy
|
|
|
|
|
2002-11-11 20:21:47 +01:00
|
|
|
for yclients in $xclients; do
|
|
|
|
for yservers in $xservers; do
|
2003-12-04 03:01:08 +01:00
|
|
|
ysourcezone=${yclients%%:*}
|
|
|
|
ydestzone=${yservers%%:*}
|
|
|
|
if [ "${ysourcezone}" != "${ydestzone}" ] ; then
|
|
|
|
eval ypolicy=\$${ysourcezone}2${ydestzone}_policy
|
|
|
|
if [ "$ypolicy" != NONE ] ; then
|
|
|
|
process_rule $xtarget $yclients $yservers $xprotocol $xports $xcports $xaddress $xratelimit $xuserset
|
|
|
|
fi
|
2002-11-11 20:21:47 +01:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2003-12-04 03:01:08 +01:00
|
|
|
do_it() {
|
|
|
|
expandv xclients xservers xprotocol xports xcports xaddress xratelimit xuserset
|
|
|
|
|
|
|
|
if [ "x$xclients" = xall ]; then
|
|
|
|
xclients="$zones $FW"
|
|
|
|
if [ "x$xservers" = xall ]; then
|
|
|
|
xservers="$zones $FW"
|
|
|
|
fi
|
|
|
|
process_wildcard_rule
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ "x$xservers" = xall ]; then
|
|
|
|
xservers="$zones $FW"
|
|
|
|
process_wildcard_rule
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
process_rule $xtarget $xclients $xservers $xprotocol $xports $xcports $xaddress $xratelimit $xuserset
|
|
|
|
}
|
|
|
|
|
2003-08-21 15:18:51 +02:00
|
|
|
while read xtarget xclients xservers xprotocol xports xcports xaddress xratelimit xuserset; do
|
2003-08-13 19:07:05 +02:00
|
|
|
temp="${xtarget%:*}"
|
|
|
|
case "${temp%<*}" in
|
2003-10-09 23:26:08 +02:00
|
|
|
ACCEPT|DROP|REJECT|DNAT|DNAT-|REDIRECT|REDIRECT-|LOG|CONTINUE|QUEUE)
|
2003-12-04 03:01:08 +01:00
|
|
|
do_it
|
2002-11-11 20:21:47 +01:00
|
|
|
;;
|
|
|
|
*)
|
2003-12-04 03:01:08 +01:00
|
|
|
if list_search $temp $ACTIONS; then
|
|
|
|
do_it
|
|
|
|
else
|
|
|
|
rule="`echo $xtarget $xclients $xservers $xprotocol $xports $xcports $xaddress $xratelimit $xuserset`"
|
|
|
|
fatal_error "Invalid Action in rule \"$rule\""
|
|
|
|
fi
|
2002-11-11 20:21:47 +01:00
|
|
|
;;
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
esac
|
|
|
|
done < $TMP_DIR/rules
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Process a record from the tos file
|
|
|
|
#
|
|
|
|
# The caller has loaded the column contents from the record into the following
|
|
|
|
# variables:
|
|
|
|
#
|
|
|
|
# src dst protocol sport dport tos
|
|
|
|
#
|
|
|
|
# and has loaded a space-separated list of their values in "rule".
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
process_tos_rule() {
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
# Parse the contents of the 'src' variable
|
|
|
|
#
|
|
|
|
if [ "$src" = "${src%:*}" ]; then
|
|
|
|
srczone="$src"
|
|
|
|
src=
|
|
|
|
else
|
|
|
|
srczone="${src%:*}"
|
|
|
|
src="${src#*:}"
|
|
|
|
fi
|
|
|
|
|
|
|
|
source=
|
|
|
|
#
|
|
|
|
# Validate the source zone
|
|
|
|
#
|
|
|
|
if validate_zone $srczone; then
|
|
|
|
source=$srczone
|
|
|
|
elif [ "$srczone" = "all" ]; then
|
|
|
|
source="all"
|
|
|
|
else
|
|
|
|
error_message "Warning: Undefined Source Zone - rule \"$rule\" ignored"
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
|
|
|
[ -n "$src" ] && case "$src" in
|
2002-09-25 01:13:36 +02:00
|
|
|
*.*.*)
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
|
|
|
# IP Address or subnet
|
|
|
|
#
|
|
|
|
src="-s $src"
|
|
|
|
;;
|
2002-07-06 00:24:40 +02:00
|
|
|
~*)
|
2002-05-01 01:13:15 +02:00
|
|
|
src=`mac_match $src`
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
#
|
|
|
|
# Assume that this is a device name
|
|
|
|
#
|
|
|
|
src="-i $src"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
# Parse the contents of the 'dst' variable
|
|
|
|
#
|
|
|
|
if [ "$dst" = "${dst%:*}" ]; then
|
|
|
|
dstzone="$dst"
|
|
|
|
dst=
|
|
|
|
else
|
|
|
|
dstzone="${dst%:*}"
|
|
|
|
dst="${dst#*:}"
|
|
|
|
fi
|
|
|
|
|
|
|
|
dest=
|
|
|
|
#
|
|
|
|
# Validate the destination zone
|
|
|
|
#
|
|
|
|
if validate_zone $dstzone; then
|
|
|
|
dest=$dstzone
|
|
|
|
elif [ "$dstzone" = "all" ]; then
|
|
|
|
dest="all"
|
|
|
|
else
|
|
|
|
error_message \
|
|
|
|
"Warning: Undefined Destination Zone - rule \"$rule\" ignored"
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
|
|
|
[ -n "$dst" ] && case "$dst" in
|
2002-09-25 01:13:36 +02:00
|
|
|
*.*.*)
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
|
|
|
# IP Address or subnet
|
|
|
|
#
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
#
|
|
|
|
# Assume that this is a device name
|
|
|
|
#
|
|
|
|
error_message \
|
|
|
|
"Warning: Invalid Destination - rule \"$rule\" ignored"
|
|
|
|
return
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
# Setup PROTOCOL and PORT variables
|
|
|
|
#
|
|
|
|
sports=""
|
|
|
|
dports=""
|
|
|
|
|
|
|
|
case $protocol in
|
|
|
|
tcp|udp|TCP|UDP|6|17)
|
|
|
|
[ -n "$sport" ] && [ "x${sport}" != "x-" ] && \
|
|
|
|
sports="--sport $sport"
|
|
|
|
[ -n "$dport" ] && [ "x${dport}" != "x-" ] && \
|
|
|
|
dports="--dport $dport"
|
|
|
|
;;
|
|
|
|
icmp|ICMP|0)
|
|
|
|
[ -n "$dport" ] && [ "x${dport}" != "x-" ] && \
|
|
|
|
dports="--icmp-type $dport"
|
|
|
|
;;
|
|
|
|
all|ALL)
|
|
|
|
protocol=
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
protocol="${protocol:+-p $protocol}"
|
|
|
|
|
|
|
|
tos="-j TOS --set-tos $tos"
|
|
|
|
|
|
|
|
case "$dstzone" in
|
|
|
|
all|ALL)
|
|
|
|
dst=0.0.0.0/0
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
[ -z "$dst" ] && eval dst=\$${dstzone}_hosts
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
for dest in $dst; do
|
|
|
|
dest="-d $dest"
|
|
|
|
|
|
|
|
case $srczone in
|
|
|
|
$FW)
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables2 -t mangle -A outtos \
|
2002-05-01 01:13:15 +02:00
|
|
|
$protocol $dest $dports $sports $tos
|
|
|
|
;;
|
|
|
|
all|ALL)
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables2 -t mangle -A outtos \
|
2002-05-01 01:13:15 +02:00
|
|
|
$protocol $dest $dports $sports $tos
|
2002-12-18 22:58:21 +01:00
|
|
|
run_iptables2 -t mangle -A pretos \
|
2002-05-01 01:13:15 +02:00
|
|
|
$protocol $dest $dports $sports $tos
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
if [ -n "$src" ]; then
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables2 -t mangle -A pretos $src \
|
2002-05-01 01:13:15 +02:00
|
|
|
$protocol $dest $dports $sports $tos
|
|
|
|
else
|
|
|
|
eval interfaces=\$${srczone}_interfaces
|
|
|
|
|
|
|
|
for interface in $interfaces; do
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables2 -t mangle -A pretos -i $interface \
|
2002-05-01 01:13:15 +02:00
|
|
|
$protocol $dest $dports $sports $tos
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
|
|
|
|
echo " Rule \"$rule\" added."
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Process the tos file
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
process_tos() # $1 = name of tos file
|
|
|
|
{
|
|
|
|
echo "Processing $1..."
|
|
|
|
|
|
|
|
run_iptables -t mangle -N pretos
|
|
|
|
run_iptables -t mangle -N outtos
|
|
|
|
|
|
|
|
strip_file tos $1
|
|
|
|
|
|
|
|
while read src dst protocol sport dport tos; do
|
2002-07-06 00:24:40 +02:00
|
|
|
expandv src dst protocol sport dport tos
|
2002-05-01 01:13:15 +02:00
|
|
|
rule="`echo $src $dst $protocol $sport $dport $tos`"
|
|
|
|
process_tos_rule
|
|
|
|
done < $TMP_DIR/tos
|
|
|
|
|
|
|
|
run_iptables -t mangle -A PREROUTING -j pretos
|
2002-07-06 00:24:40 +02:00
|
|
|
run_iptables -t mangle -A OUTPUT -j outtos
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Load a Kernel Module
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
loadmodule() # $1 = module name, $2 - * arguments
|
|
|
|
{
|
|
|
|
local modulename=$1
|
|
|
|
local modulefile
|
2003-07-16 05:22:45 +02:00
|
|
|
local suffix
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
if [ -z "`lsmod | grep $modulename`" ]; then
|
|
|
|
shift
|
2003-07-16 05:22:45 +02:00
|
|
|
|
2003-12-01 17:10:08 +01:00
|
|
|
for suffix in $MODULE_SUFFIX ; do
|
2003-07-16 05:22:45 +02:00
|
|
|
modulefile=$MODULESDIR/${modulename}.${suffix}
|
2003-07-16 05:07:38 +02:00
|
|
|
|
2003-07-16 05:22:45 +02:00
|
|
|
if [ -f $modulefile ]; then
|
|
|
|
insmod $modulefile $*
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Display elements of a list with leading white space
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
display_list() # $1 = List Title, rest of $* = list to display
|
|
|
|
{
|
|
|
|
[ $# -gt 1 ] && echo " $*"
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Add rules to the "common" chain to silently drop packets addressed to any of
|
|
|
|
# the passed addresses
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
drop_broadcasts() # $* = broadcast addresses
|
|
|
|
{
|
|
|
|
while [ $# -gt 0 ]; do
|
|
|
|
run_iptables -A common -d $1 -j DROP
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Add policy rule ( and possibly logging rule) to the passed chain
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
policy_rules() # $1 = chain to add rules to
|
2002-07-06 00:24:40 +02:00
|
|
|
# $2 = policy
|
2002-05-01 01:13:15 +02:00
|
|
|
# $3 = loglevel
|
|
|
|
{
|
|
|
|
local target="$2"
|
|
|
|
|
|
|
|
case "$target" in
|
|
|
|
ACCEPT)
|
2002-07-06 00:24:40 +02:00
|
|
|
;;
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
DROP)
|
2002-07-06 00:24:40 +02:00
|
|
|
run_iptables -A $1 -j common
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
|
|
|
REJECT)
|
2002-07-06 00:24:40 +02:00
|
|
|
run_iptables -A $1 -j common
|
2003-06-12 01:57:35 +02:00
|
|
|
target=reject
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
2002-06-01 02:28:18 +02:00
|
|
|
CONTINUE)
|
2002-07-06 00:24:40 +02:00
|
|
|
target=
|
2002-06-01 02:28:18 +02:00
|
|
|
;;
|
2002-05-01 01:13:15 +02:00
|
|
|
*)
|
2002-06-01 02:28:18 +02:00
|
|
|
fatal_error "Invalid policy ($policy) for $1"
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
|
|
|
|
|
|
|
esac
|
|
|
|
|
2002-12-13 04:23:46 +01:00
|
|
|
if [ $# -eq 3 -a "x${3}" != "x-" ]; then
|
2003-05-21 23:36:05 +02:00
|
|
|
log_rule $3 $1 $2
|
2002-12-13 04:23:46 +01:00
|
|
|
fi
|
|
|
|
|
2002-06-01 02:28:18 +02:00
|
|
|
[ -n "$target" ] && run_iptables -A $1 -j $target
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Generate default policy & log level rules for the passed client & server
|
|
|
|
# zones
|
|
|
|
#
|
|
|
|
# This function is only called when the canonical chain for this client/server
|
|
|
|
# pair is known to exist. If the default policy for this pair specifies the
|
|
|
|
# same chain then we add the policy (and logging) rule to the canonical chain;
|
|
|
|
# otherwise add a rule to the canonical chain to jump to the appropriate
|
|
|
|
# policy chain.
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
default_policy() # $1 = client $2 = server
|
|
|
|
{
|
|
|
|
local chain="${1}2${2}"
|
|
|
|
local policy=
|
|
|
|
local loglevel=
|
2002-06-02 19:05:51 +02:00
|
|
|
local chain1
|
|
|
|
|
|
|
|
jump_to_policy_chain() {
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-02 19:05:51 +02:00
|
|
|
# Add a jump to from the canonical chain to the policy chain. On return,
|
|
|
|
# $chain is set to the name of the policy chain
|
|
|
|
#
|
2002-07-06 00:24:40 +02:00
|
|
|
run_iptables -A $chain -j $chain1
|
|
|
|
chain=$chain1
|
2002-06-02 19:05:51 +02:00
|
|
|
}
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
apply_default()
|
|
|
|
{
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-12-07 04:21:32 +01:00
|
|
|
# Generate policy file column values from the policy chain
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-12-07 04:21:32 +01:00
|
|
|
eval policy=\$${chain1}_policy
|
|
|
|
eval loglevel=\$${chain1}_loglevel
|
|
|
|
eval synparams=\$${chain1}_synparams
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
2002-12-07 04:21:32 +01:00
|
|
|
# Add the appropriate rules to the canonical chain ($chain) to enforce
|
|
|
|
# the specified policy
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-06-01 02:28:18 +02:00
|
|
|
if [ "$chain" = "$chain1" ]; then
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
# The policy chain is the canonical chain; add policy rule to it
|
|
|
|
# The syn flood jump has already been added if required.
|
|
|
|
#
|
|
|
|
policy_rules $chain $policy $loglevel
|
|
|
|
else
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-02 19:05:51 +02:00
|
|
|
# The policy chain is different from the canonical chain -- approach
|
|
|
|
# depends on the policy
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
2002-06-02 19:05:51 +02:00
|
|
|
case $policy in
|
|
|
|
ACCEPT)
|
2002-07-06 00:24:40 +02:00
|
|
|
if [ -n "$synparams" ]; then
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-02 19:05:51 +02:00
|
|
|
# To avoid double-counting SYN packets, enforce the policy
|
|
|
|
# in this chain.
|
|
|
|
#
|
2002-06-11 22:14:58 +02:00
|
|
|
enable_syn_flood_protection $chain $chain1
|
|
|
|
policy_rules $chain $policy $loglevel
|
2002-06-02 19:05:51 +02:00
|
|
|
else
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-02 19:05:51 +02:00
|
|
|
# No problem with double-counting so just jump to the
|
|
|
|
# policy chain.
|
|
|
|
#
|
|
|
|
jump_to_policy_chain
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
CONTINUE)
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-02 19:05:51 +02:00
|
|
|
# Silly to jump to the policy chain -- add any logging
|
|
|
|
# rules and enable SYN flood protection if requested
|
|
|
|
#
|
|
|
|
[ -n "$synparams" ] && \
|
|
|
|
enable_syn_flood_protection $chain $chain1
|
|
|
|
policy_rules $chain $policy $loglevel
|
|
|
|
;;
|
|
|
|
*)
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-02 19:05:51 +02:00
|
|
|
# DROP or REJECT policy -- enforce in the policy chain and
|
|
|
|
# enable SYN flood protection if requested.
|
|
|
|
#
|
|
|
|
[ -n "$synparams" ] && \
|
|
|
|
enable_syn_flood_protection $chain $chain1
|
2002-07-06 00:24:40 +02:00
|
|
|
jump_to_policy_chain
|
2002-06-02 19:05:51 +02:00
|
|
|
;;
|
|
|
|
esac
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
2002-06-02 19:05:51 +02:00
|
|
|
|
2002-07-06 16:05:30 +02:00
|
|
|
echo " Policy $policy for $1 to $2 using chain $chain"
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
eval chain1=\$${1}2${2}_policychain
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
if [ -n "$chain1" ]; then
|
|
|
|
apply_default $1 $2
|
|
|
|
else
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "No default policy for zone $1 to zone $2"
|
2002-12-07 04:21:32 +01:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
# Complete a standard chain
|
|
|
|
#
|
|
|
|
# - run any supplied user exit
|
|
|
|
# - search the policy file for an applicable policy and add rules as
|
|
|
|
# appropriate
|
2002-07-06 00:24:40 +02:00
|
|
|
# - If no applicable policy is found, add rules for an assummed
|
2002-05-01 01:13:15 +02:00
|
|
|
# policy of DROP INFO
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
complete_standard_chain() # $1 = chain, $2 = source zone, $3 = destination zone
|
|
|
|
{
|
|
|
|
local policy=
|
|
|
|
local loglevel=
|
2002-12-07 04:21:32 +01:00
|
|
|
local policychain=
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
run_user_exit $1
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
eval policychain=\$${2}2${3}_policychain
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
if [ -n "$policychain" ]; then
|
|
|
|
eval policy=\$${policychain}_policy
|
|
|
|
eval loglevel=\$${policychain}_loglevel
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
policy_rules $1 $policy $loglevel
|
|
|
|
else
|
|
|
|
policy_rules $1 DROP INFO
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Find the appropriate chain to pass packets from a source zone to a
|
|
|
|
# destination zone
|
|
|
|
#
|
|
|
|
# If the canonical chain for this zone pair exists, echo it's name; otherwise
|
|
|
|
# locate and echo the name of the appropriate policy chain
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
rules_chain() # $1 = source zone, $2 = destination zone
|
|
|
|
{
|
|
|
|
local chain=${1}2${2}
|
|
|
|
|
|
|
|
havechain $chain && { echo $chain; return; }
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-03-21 20:47:19 +01:00
|
|
|
[ "$1" = "$2" ] && { echo ACCEPT; return; }
|
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
eval chain=\$${chain}_policychain
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
[ -n "$chain" ] && { echo $chain; return; }
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "No appropriate chain for zone $1 to zone $2"
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2003-01-24 23:47:22 +01:00
|
|
|
#
|
2003-01-26 02:00:22 +01:00
|
|
|
# echo the list of subnets routed out of a given interface
|
2003-01-24 23:47:22 +01:00
|
|
|
#
|
2003-01-24 23:59:49 +01:00
|
|
|
get_routed_subnets() # $1 = interface name
|
2003-01-24 23:47:22 +01:00
|
|
|
{
|
|
|
|
local address
|
2003-01-24 23:59:49 +01:00
|
|
|
local rest
|
2003-01-24 23:47:22 +01:00
|
|
|
|
2003-01-24 23:59:49 +01:00
|
|
|
ip route show dev $1 2> /dev/null |
|
|
|
|
while read address rest; do
|
2003-03-11 15:55:01 +01:00
|
|
|
if [ "x$address" = xdefault ]; then
|
|
|
|
error_message "Warning: default route ignored on interface $1"
|
|
|
|
else
|
|
|
|
[ "$address" = "${address%/*}" ] && address="${address}/32"
|
|
|
|
echo $address
|
|
|
|
fi
|
2003-01-24 23:47:22 +01:00
|
|
|
done
|
|
|
|
}
|
2003-07-04 17:08:29 +02:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Set up Source NAT (including masquerading)
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
setup_masq()
|
|
|
|
{
|
|
|
|
setup_one() {
|
2002-07-06 00:24:40 +02:00
|
|
|
local using
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-01-25 00:43:22 +01:00
|
|
|
case $fullinterface in
|
|
|
|
*:*:*)
|
|
|
|
# Both alias name and subnet
|
2004-01-22 03:06:56 +01:00
|
|
|
destnets="${fullinterface##*:}"
|
2003-01-25 00:43:22 +01:00
|
|
|
fullinterface="${fullinterface%:*}"
|
|
|
|
;;
|
|
|
|
*:*)
|
|
|
|
# Alias name OR subnet
|
|
|
|
case ${fullinterface#*:} in
|
|
|
|
*.*)
|
|
|
|
# It's a subnet
|
2004-01-22 03:06:56 +01:00
|
|
|
destnets="${fullinterface#*:}"
|
2003-01-25 00:43:22 +01:00
|
|
|
fullinterface="${fullinterface%:*}"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
#it's an alias name
|
2004-01-22 03:06:56 +01:00
|
|
|
destnets="0.0.0.0/0"
|
2003-01-25 00:43:22 +01:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
;;
|
|
|
|
*)
|
2004-01-22 03:06:56 +01:00
|
|
|
destnets="0.0.0.0/0"
|
2003-01-25 00:43:22 +01:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
interface=${fullinterface%:*}
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-09-01 19:34:59 +02:00
|
|
|
if ! list_search $interface $all_interfaces; then
|
2003-02-08 21:58:44 +01:00
|
|
|
fatal_error "Unknown interface $interface"
|
2002-09-01 19:34:59 +02:00
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
if [ "$subnet" = "${subnet%!*}" ]; then
|
|
|
|
nomasq=
|
|
|
|
else
|
|
|
|
nomasq="${subnet#*!}"
|
|
|
|
subnet="${subnet%!*}"
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
2003-01-24 23:47:22 +01:00
|
|
|
source="$subnet"
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
case $subnet in
|
2002-09-25 01:13:36 +02:00
|
|
|
*.*.*)
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
|
|
|
*)
|
2003-01-24 23:59:49 +01:00
|
|
|
subnets=`get_routed_subnets $subnet`
|
2003-10-10 05:00:26 +02:00
|
|
|
[ -z "$subnets" ] && fatal_error "Unable to determine the routes through interface $subnet"
|
2003-01-24 23:47:22 +01:00
|
|
|
subnet="$subnets"
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-08-07 01:50:33 +02:00
|
|
|
if [ -n "$addresses" -a -n "$ADD_SNAT_ALIASES" ]; then
|
|
|
|
for address in `separate_list $addresses`; do
|
2003-08-27 21:37:53 +02:00
|
|
|
for addr in `ip_range_explicit $address` ; do
|
2003-08-07 01:50:33 +02:00
|
|
|
if ! list_search $addr $aliases_to_add; then
|
|
|
|
aliases_to_add="$aliases_to_add $addr $fullinterface"
|
|
|
|
case $fullinterface in
|
|
|
|
*:*)
|
|
|
|
fullinterface=${fullinterface%:*}:$((${fullinterface#*:} + 1 ))
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
done
|
2003-06-22 18:58:33 +02:00
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
|
2004-01-22 03:06:56 +01:00
|
|
|
destination=$destnets
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2004-01-22 03:06:56 +01:00
|
|
|
chain=`masq_chain $interface`
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2004-01-22 03:06:56 +01:00
|
|
|
case $destnets in
|
|
|
|
!*)
|
|
|
|
newchain=masq${masq_seq}
|
|
|
|
createnatchain $newchain
|
|
|
|
destnets=${destnets#!}
|
|
|
|
|
|
|
|
for destnet in $(separate_list $destnets); do
|
|
|
|
addnatrule $newchain -d $destnet -j RETURN
|
2003-01-24 23:47:22 +01:00
|
|
|
done
|
|
|
|
|
2004-01-22 03:06:56 +01:00
|
|
|
if [ -n "$subnet" ]; then
|
|
|
|
for s in $subnet; do
|
|
|
|
addnatrule $chain -s $s -j $newchain
|
|
|
|
done
|
|
|
|
subnet=
|
|
|
|
else
|
|
|
|
addnatrule $chain -j $newchain
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2004-01-22 03:06:56 +01:00
|
|
|
masq_seq=$(($masq_seq + 1))
|
|
|
|
chain=$newchain
|
|
|
|
destnets=0.0.0.0/0
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2004-01-22 04:27:03 +01:00
|
|
|
if [ -n "$nonmasq" ]; then
|
|
|
|
for addr in `separate_list $nomasq`; do
|
|
|
|
addnatrule $chain -s $addr -j RETURN
|
|
|
|
done
|
|
|
|
source="$source except $nomasq"
|
|
|
|
fi
|
2004-01-22 03:06:56 +01:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
if [ -n "$nomasq" ]; then
|
|
|
|
newchain=masq${masq_seq}
|
|
|
|
createnatchain $newchain
|
|
|
|
|
|
|
|
if [ -n "$subnet" ]; then
|
|
|
|
for s in $subnet; do
|
|
|
|
for destnet in $(separate_list $destnets); do
|
|
|
|
addnatrule $chain -d $destnet -s $s -j $newchain
|
|
|
|
done
|
|
|
|
done
|
|
|
|
else
|
|
|
|
for destnet in $(separate_list $destnets); do
|
|
|
|
addnatrule $chain -d $destnet -j $newchain
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
|
|
|
|
masq_seq=$(($masq_seq + 1))
|
|
|
|
chain=$newchain
|
|
|
|
subnet=
|
|
|
|
destnets=0.0.0.0/0
|
|
|
|
|
|
|
|
for addr in `separate_list $nomasq`; do
|
|
|
|
addnatrule $chain -s $addr -j RETURN
|
|
|
|
done
|
|
|
|
|
|
|
|
source="$source except $nomasq"
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
esac
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-08-07 01:50:33 +02:00
|
|
|
if [ -n "$addresses" ]; then
|
|
|
|
temp=
|
|
|
|
for address in `separate_list $addresses`; do
|
|
|
|
temp="$temp --to-source $address"
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
|
2003-01-25 00:43:22 +01:00
|
|
|
if [ -n "$subnet" ]; then
|
2003-01-24 23:47:22 +01:00
|
|
|
for s in $subnet; do
|
2004-01-22 17:59:40 +01:00
|
|
|
if [ -n "$addresses" ]; then
|
|
|
|
for destnet in $(separate_list $destnets); do
|
2004-01-22 03:06:56 +01:00
|
|
|
addnatrule $chain -s $s -d $destnet -j SNAT $temp
|
2004-01-22 17:59:40 +01:00
|
|
|
done
|
|
|
|
echo " To $destination from $s through ${interface} using $addresses"
|
|
|
|
else
|
|
|
|
for destnet in $(separate_list $destnets); do
|
2004-01-22 03:06:56 +01:00
|
|
|
addnatrule $chain -s $s -d $destnet -j MASQUERADE
|
2004-01-22 17:59:40 +01:00
|
|
|
done
|
|
|
|
echo " To $destination from $s through ${interface}"
|
|
|
|
fi
|
2003-01-24 23:47:22 +01:00
|
|
|
done
|
2003-01-25 00:43:22 +01:00
|
|
|
elif [ -n "$address" ]; then
|
2004-01-22 03:06:56 +01:00
|
|
|
for destnet in $(separate_list $destnets); do
|
|
|
|
addnatrule $chain -d $destnet -j SNAT $temp
|
|
|
|
done
|
2004-01-22 17:59:40 +01:00
|
|
|
echo " To $destination from $source through ${interface} using $addresses"
|
2002-05-01 01:13:15 +02:00
|
|
|
else
|
2004-01-22 03:06:56 +01:00
|
|
|
for destnet in $(separate_list $destnets); do
|
|
|
|
addnatrule $chain -d $destnet -j MASQUERADE
|
|
|
|
done
|
2004-01-22 17:59:40 +01:00
|
|
|
echo " To $destination from $source through ${interface}"
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
strip_file masq $1
|
|
|
|
|
|
|
|
[ -n "$NAT_ENABLED" ] && echo "Masqueraded Subnets and Hosts:"
|
|
|
|
|
2003-08-07 01:50:33 +02:00
|
|
|
while read fullinterface subnet addresses; do
|
|
|
|
expandv fullinterface subnet addresses
|
2002-05-01 01:13:15 +02:00
|
|
|
[ -n "$NAT_ENABLED" ] && setup_one || \
|
|
|
|
error_message "Warning: NAT disabled; masq rule ignored"
|
|
|
|
done < $TMP_DIR/masq
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Add a record to the blacklst chain
|
|
|
|
#
|
|
|
|
# $source = address match
|
|
|
|
# $proto = protocol selector
|
|
|
|
# $dport = destination port selector
|
|
|
|
#
|
2002-09-15 01:40:46 +02:00
|
|
|
add_blacklist_rule() {
|
2002-12-13 04:23:46 +01:00
|
|
|
if [ -n "$BLACKLIST_LOGLEVEL" ]; then
|
2003-05-21 23:36:05 +02:00
|
|
|
log_rule $BLACKLIST_LOGLEVEL blacklst $BLACKLIST_DISPOSITION `fix_bang $source $proto $dport`
|
2002-12-13 04:23:46 +01:00
|
|
|
fi
|
|
|
|
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables2 -A blacklst $source $proto $dport -j $disposition
|
2002-09-15 01:40:46 +02:00
|
|
|
}
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Process a record from the blacklist file
|
|
|
|
#
|
|
|
|
# $subnet = address/subnet
|
|
|
|
# $protocol = Protocol Number/Name
|
|
|
|
# $port = Port Number/Name
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
process_blacklist_rec() {
|
|
|
|
local source
|
|
|
|
local addr
|
2002-09-15 01:40:46 +02:00
|
|
|
local proto
|
2002-09-15 00:00:52 +02:00
|
|
|
local dport
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
for addr in `separate_list $subnet`; do
|
|
|
|
case $addr in
|
|
|
|
~*)
|
|
|
|
addr=`echo $addr | sed 's/~//;s/-/:/g'`
|
|
|
|
source="--match mac --mac-source $addr"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
source="-s $addr"
|
2002-07-06 00:24:40 +02:00
|
|
|
;;
|
|
|
|
esac
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-09-15 00:00:52 +02:00
|
|
|
if [ -n "$protocol" ]; then
|
|
|
|
proto=" -p $protocol "
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-09-15 01:40:46 +02:00
|
|
|
case $protocol in
|
|
|
|
tcp|TCP|6|udp|UDP|17)
|
2003-02-23 15:10:37 +01:00
|
|
|
if [ -n "$ports" ]; then
|
2002-09-15 01:40:46 +02:00
|
|
|
if [ -n "$MULTIPORT" -a \
|
|
|
|
"$ports" != "${ports%,*}" -a \
|
|
|
|
"$ports" = "${ports%:*}" -a \
|
|
|
|
`list_count $ports` -le 15 ]
|
|
|
|
then
|
|
|
|
dport="-m multiport --dports $ports"
|
|
|
|
add_blacklist_rule
|
|
|
|
else
|
|
|
|
for dport in `separate_list $ports`; do
|
|
|
|
dport="--dport $dport"
|
|
|
|
add_blacklist_rule
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
add_blacklist_rule
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
icmp|ICMP|0)
|
|
|
|
if [ -n "$ports" ]; then
|
|
|
|
for dport in `separate_list $ports`; do
|
|
|
|
dport="--icmp-type $dport"
|
|
|
|
add_blacklist_rule
|
|
|
|
done
|
|
|
|
else
|
|
|
|
add_blacklist_rule
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
add_blacklist_rule
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
else
|
|
|
|
add_blacklist_rule
|
|
|
|
fi
|
2002-09-15 00:00:52 +02:00
|
|
|
|
2002-09-15 01:40:46 +02:00
|
|
|
if [ -n "$ports" ]; then
|
|
|
|
addr="$addr $protocol $ports"
|
2002-09-15 00:00:52 +02:00
|
|
|
elif [ -n "$protocol" ]; then
|
|
|
|
addr="$addr $protocol"
|
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-08-26 22:36:19 +02:00
|
|
|
echo " $addr added to Black List"
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Setup the Black List
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
setup_blacklist() {
|
|
|
|
local interfaces=`find_interfaces_by_option blacklist`
|
|
|
|
local f=`find_file blacklist`
|
|
|
|
local disposition=$BLACKLIST_DISPOSITION
|
|
|
|
|
|
|
|
if [ -n "$interfaces" -a -f $f ]; then
|
2002-07-06 00:24:40 +02:00
|
|
|
echo "Setting up Blacklisting..."
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
strip_file blacklist $f
|
|
|
|
|
|
|
|
createchain blacklst no
|
|
|
|
|
2003-10-11 18:06:00 +02:00
|
|
|
[ -n "$BLACKLISTNEWONLY" ] && state="-m state --state NEW" || state=
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
for interface in $interfaces; do
|
2002-05-18 15:45:23 +02:00
|
|
|
for chain in `first_chains $interface`; do
|
2003-10-11 18:06:00 +02:00
|
|
|
run_iptables -A $chain $state -j blacklst
|
2002-05-18 15:45:23 +02:00
|
|
|
done
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
echo " Blacklisting enabled on $interface"
|
|
|
|
done
|
|
|
|
|
|
|
|
[ "$disposition" = REJECT ] && disposition=reject
|
|
|
|
|
2002-09-15 01:40:46 +02:00
|
|
|
while read subnet protocol ports; do
|
|
|
|
expandv subnet protocol ports
|
2002-05-01 01:13:15 +02:00
|
|
|
process_blacklist_rec
|
|
|
|
done < $TMP_DIR/blacklist
|
|
|
|
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Refresh the Black List
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
refresh_blacklist() {
|
|
|
|
local f=`find_file blacklist`
|
|
|
|
local disposition=$BLACKLIST_DISPOSITION
|
|
|
|
|
|
|
|
if qt iptables -L blacklst -n ; then
|
|
|
|
echo "Refreshing Black List..."
|
|
|
|
|
|
|
|
strip_file blacklist $f
|
|
|
|
|
|
|
|
[ "$disposition" = REJECT ] && disposition=reject
|
|
|
|
|
|
|
|
run_iptables -F blacklst
|
|
|
|
|
2002-09-15 01:40:46 +02:00
|
|
|
while read subnet protocol ports; do
|
|
|
|
expandv subnet protocol ports
|
2002-05-01 01:13:15 +02:00
|
|
|
process_blacklist_rec
|
|
|
|
done < $TMP_DIR/blacklist
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Verify that kernel has netfilter support
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
verify_os_version() {
|
|
|
|
|
|
|
|
osversion=`uname -r`
|
|
|
|
|
|
|
|
case $osversion in
|
2003-07-05 18:24:41 +02:00
|
|
|
2.4.*|2.5.*|2.6.*)
|
2002-07-06 00:24:40 +02:00
|
|
|
;;
|
2002-05-01 01:13:15 +02:00
|
|
|
*)
|
|
|
|
startup_error "Shorewall version $version does not work with kernel version $osversion"
|
|
|
|
;;
|
|
|
|
esac
|
2003-03-11 15:55:01 +01:00
|
|
|
|
2003-03-11 16:45:29 +01:00
|
|
|
[ $command = start -a -n "`lsmod 2> /dev/null | grep '^ipchains'`" ] && \
|
2003-03-11 15:55:01 +01:00
|
|
|
startup_error "Shorewall can't start with the ipchains kernel module loaded - see FAQ #8"
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Add IP Aliases
|
|
|
|
#
|
2002-07-29 16:31:50 +02:00
|
|
|
add_ip_aliases()
|
2002-07-23 18:26:45 +02:00
|
|
|
{
|
2003-06-23 02:42:28 +02:00
|
|
|
local addresses external interface inet cidr rest val
|
2002-10-22 02:13:24 +02:00
|
|
|
|
2003-06-23 19:51:33 +02:00
|
|
|
address_details()
|
2002-07-23 18:26:45 +02:00
|
|
|
{
|
|
|
|
#
|
|
|
|
# Folks feel uneasy if they don't see all of the same
|
|
|
|
# decoration on these IP addresses that they see when their
|
|
|
|
# distro's net config tool adds them. In an attempt to reduce
|
|
|
|
# the anxiety level, we have the following code which sets
|
2003-06-23 02:42:28 +02:00
|
|
|
# the VLSM and BRD from an existing address in the same subnet
|
2002-07-23 18:26:45 +02:00
|
|
|
#
|
2003-06-23 19:51:33 +02:00
|
|
|
# Get all of the lines that contain inet addresses
|
2002-07-23 18:26:45 +02:00
|
|
|
#
|
2004-01-24 00:48:30 +01:00
|
|
|
ip -f inet addr show $interface 2> /dev/null | grep 'inet' | while read inet cidr rest ; do
|
2003-08-05 17:05:45 +02:00
|
|
|
case $cidr in
|
|
|
|
*/*)
|
|
|
|
if in_subnet $external $cidr; then
|
|
|
|
echo "/${cidr#*/} brd `broadcastaddress $cidr`"
|
|
|
|
break
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
esac
|
2003-06-22 18:58:33 +02:00
|
|
|
done
|
2003-06-23 02:42:28 +02:00
|
|
|
}
|
2002-07-23 18:26:45 +02:00
|
|
|
|
2003-06-23 02:42:28 +02:00
|
|
|
do_one()
|
|
|
|
{
|
2003-06-23 19:51:33 +02:00
|
|
|
val=`address_details`
|
2003-01-24 20:42:23 +01:00
|
|
|
run_ip addr add ${external}${val} dev $interface $label
|
2002-07-23 18:26:45 +02:00
|
|
|
echo "$external $interface" >> ${STATEDIR}/nat
|
2003-01-24 20:42:23 +01:00
|
|
|
[ -n "$label" ] && label="with $label"
|
|
|
|
echo " IP Address $external added to interface $interface $label"
|
2002-07-23 18:26:45 +02:00
|
|
|
}
|
|
|
|
|
2002-07-29 16:31:50 +02:00
|
|
|
set -- $aliases_to_add
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-07-23 18:26:45 +02:00
|
|
|
while [ $# -gt 0 ]; do
|
|
|
|
external=$1
|
|
|
|
interface=$2
|
2003-01-24 20:42:23 +01:00
|
|
|
label=
|
|
|
|
|
|
|
|
if [ "$interface" != "${interface%:*}" ]; then
|
|
|
|
label="${interface#*:}"
|
|
|
|
interface="${interface%:*}"
|
|
|
|
label="label $interface:$label"
|
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-07-23 18:26:45 +02:00
|
|
|
shift;shift
|
2003-06-23 00:56:25 +02:00
|
|
|
|
|
|
|
list_search $external `find_interface_addresses $interface` || do_one
|
2002-07-23 18:26:45 +02:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Load kernel modules required for Shorewall
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
load_kernel_modules() {
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
[ -z "$MODULESDIR" ] && \
|
|
|
|
MODULESDIR=/lib/modules/$osversion/kernel/net/ipv4/netfilter
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
modules=`find_file modules`
|
|
|
|
|
|
|
|
if [ -f $modules -a -d $MODULESDIR ]; then
|
|
|
|
echo "Loading Modules..."
|
|
|
|
. $modules
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2003-02-21 23:55:36 +01:00
|
|
|
# Verify that the 'ip' program is installed
|
|
|
|
|
|
|
|
verify_ip() {
|
2003-06-18 20:26:05 +02:00
|
|
|
qt ip link ls ||\
|
2003-02-21 23:55:36 +01:00
|
|
|
startup_error "Shorewall $version requires the iproute package ('ip' utility)"
|
|
|
|
}
|
|
|
|
|
2003-06-27 23:02:52 +02:00
|
|
|
#
|
|
|
|
# Determine which optional facilities are supported by iptables/netfilter
|
|
|
|
#
|
|
|
|
determine_capabilities() {
|
|
|
|
qt iptables -t nat -L -n && NAT_ENABLED=Yes || NAT_ENABLED=
|
|
|
|
qt iptables -t mangle -L -n && MANGLE_ENABLED=Yes || MANGLE_ENABLED=
|
|
|
|
|
|
|
|
CONNTRACK_MATCH=
|
|
|
|
MULTIPORT=
|
|
|
|
|
|
|
|
if qt iptables -N fooX1234 ; then
|
|
|
|
qt iptables -A fooX1234 -m conntrack --ctorigdst 192.168.1.1 -j ACCEPT && CONNTRACK_MATCH=Yes
|
|
|
|
qt iptables -A fooX1234 -p tcp -m multiport --dports 21,22 -j ACCEPT && MULTIPORT=Yes
|
|
|
|
|
|
|
|
qt iptables -F fooX1234
|
|
|
|
qt iptables -X fooX1234
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
report_capability() # $1 = Capability Name, $2 Capability Setting (if any)
|
|
|
|
{
|
|
|
|
local setting=
|
|
|
|
|
2003-07-05 20:17:40 +02:00
|
|
|
[ "x$1" = "xYes" ] && { setting="Available"; shift; } || setting="Not available"
|
2003-06-27 23:02:52 +02:00
|
|
|
|
|
|
|
echo " " $@: $setting
|
|
|
|
}
|
|
|
|
|
|
|
|
report_capabilities() {
|
|
|
|
echo "Shorewall has detected the following iptables/netfilter capabilities:"
|
|
|
|
report_capability $NAT_ENABLED "NAT"
|
|
|
|
report_capability $MANGLE_ENABLED "Packet Mangling"
|
2003-06-28 03:09:12 +02:00
|
|
|
report_capability $MULTIPORT "Multi-port Match"
|
2003-06-27 23:02:52 +02:00
|
|
|
report_capability $CONNTRACK_MATCH "Connection Tracking Match"
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Perform Initialization
|
|
|
|
# - Delete all old rules
|
|
|
|
# - Delete all user chains
|
|
|
|
# - Set the POLICY on all standard chains and add a rule to allow packets
|
|
|
|
# that are part of established connections
|
2002-07-06 00:24:40 +02:00
|
|
|
# - Determine the zones
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
initialize_netfilter () {
|
|
|
|
|
2003-06-27 23:02:52 +02:00
|
|
|
report_capabilities
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
echo "Determining Zones..."
|
|
|
|
|
|
|
|
determine_zones
|
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
[ -z "$zones" ] && startup_error "No Zones Defined"
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
display_list "Zones:" $zones
|
|
|
|
|
|
|
|
echo "Validating interfaces file..."
|
|
|
|
|
|
|
|
validate_interfaces_file
|
|
|
|
|
|
|
|
echo "Validating hosts file..."
|
|
|
|
|
|
|
|
validate_hosts_file
|
|
|
|
|
2002-07-10 00:39:22 +02:00
|
|
|
echo "Validating Policy file..."
|
|
|
|
|
|
|
|
validate_policy
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
echo "Determining Hosts in Zones..."
|
|
|
|
|
|
|
|
determine_interfaces
|
|
|
|
determine_hosts
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-02-13 15:59:34 +01:00
|
|
|
run_user_exit init
|
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
#
|
|
|
|
# The some files might be large so strip them while the firewall is still running
|
|
|
|
# (restart command). This reduces the length of time that the firewall isn't
|
|
|
|
# accepting new connections.
|
|
|
|
#
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
strip_file rules
|
|
|
|
strip_file proxyarp
|
|
|
|
strip_file maclist
|
|
|
|
strip_file nat
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-02-23 15:10:37 +01:00
|
|
|
terminator=fatal_error
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
deletechain shorewall
|
|
|
|
|
|
|
|
[ -n "$NAT_ENABLED" ] && delete_nat
|
|
|
|
|
|
|
|
delete_proxy_arp
|
|
|
|
|
|
|
|
[ -n "$MANGLE_ENABLED" ] && \
|
|
|
|
run_iptables -t mangle -F && \
|
|
|
|
run_iptables -t mangle -X
|
|
|
|
|
2002-12-31 17:04:31 +01:00
|
|
|
[ -n "$CLEAR_TC" ] && delete_tc
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
echo "Deleting user chains..."
|
|
|
|
|
|
|
|
setpolicy INPUT DROP
|
|
|
|
setpolicy OUTPUT DROP
|
|
|
|
setpolicy FORWARD DROP
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
deleteallchains
|
|
|
|
|
|
|
|
setcontinue FORWARD
|
|
|
|
setcontinue INPUT
|
|
|
|
setcontinue OUTPUT
|
2003-03-29 15:37:50 +01:00
|
|
|
|
2003-05-16 17:19:57 +02:00
|
|
|
#
|
|
|
|
# Enable the Loopback interface
|
|
|
|
#
|
|
|
|
run_iptables -A INPUT -i lo -j ACCEPT
|
|
|
|
run_iptables -A OUTPUT -o lo -j ACCEPT
|
|
|
|
|
2003-08-10 03:11:50 +02:00
|
|
|
accounting_file=`find_file accounting`
|
|
|
|
|
|
|
|
[ -f $accounting_file ] && setup_accounting $accounting_file
|
|
|
|
|
2002-09-25 01:13:36 +02:00
|
|
|
#
|
2003-03-10 01:41:39 +01:00
|
|
|
# Allow DNS lookups during startup for FQDNs and deep-six INVALID packets
|
2002-09-25 01:13:36 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-03-10 01:41:39 +01:00
|
|
|
for chain in INPUT OUTPUT FORWARD; do
|
|
|
|
run_iptables -A $chain -p udp --dport 53 -j ACCEPT
|
2003-04-01 16:58:47 +02:00
|
|
|
run_iptables -A $chain -p ! icmp -m state --state INVALID -j DROP
|
2003-03-10 01:41:39 +01:00
|
|
|
done
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
[ -n "$CLAMPMSS" ] && \
|
2002-07-06 00:24:40 +02:00
|
|
|
run_iptables -A FORWARD -p tcp \
|
|
|
|
--tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-08-23 20:51:55 +02:00
|
|
|
if [ -z "$NEWNOTSYN" ]; then
|
|
|
|
createchain newnotsyn no
|
2003-06-18 20:37:37 +02:00
|
|
|
|
2003-06-18 21:55:16 +02:00
|
|
|
for interface in `find_interfaces_by_option newnotsyn`; do
|
|
|
|
run_iptables -A newnotsyn -i $interface -p tcp --tcp-flags ACK ACK -j ACCEPT
|
|
|
|
run_iptables -A newnotsyn -i $interface -p tcp --tcp-flags RST RST -j ACCEPT
|
2003-06-19 22:19:41 +02:00
|
|
|
run_iptables -A newnotsyn -i $interface -p tcp --tcp-flags FIN FIN -j ACCEPT
|
2003-06-18 21:49:54 +02:00
|
|
|
run_iptables -A newnotsyn -i $interface -j RETURN
|
2003-06-18 20:37:37 +02:00
|
|
|
done
|
|
|
|
|
2002-08-23 20:51:55 +02:00
|
|
|
run_user_exit newnotsyn
|
2003-06-18 20:37:37 +02:00
|
|
|
|
2002-12-13 04:23:46 +01:00
|
|
|
if [ -n "$LOGNEWNOTSYN" ]; then
|
2003-05-21 23:36:05 +02:00
|
|
|
log_rule $LOGNEWNOTSYN newnotsyn DROP
|
2002-12-13 04:23:46 +01:00
|
|
|
fi
|
|
|
|
|
2002-08-23 20:51:55 +02:00
|
|
|
run_iptables -A newnotsyn -j DROP
|
2003-02-23 15:10:37 +01:00
|
|
|
fi
|
2002-08-06 20:45:13 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
createchain icmpdef no
|
2002-07-06 00:24:40 +02:00
|
|
|
createchain common no
|
2003-06-12 01:57:35 +02:00
|
|
|
createchain reject no
|
2002-06-04 22:17:46 +02:00
|
|
|
createchain dynamic no
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-08-21 15:18:51 +02:00
|
|
|
usersets_file=`find_file usersets`
|
|
|
|
|
|
|
|
[ -f $usersets_file ] && setup_usersets $usersets_file
|
|
|
|
|
2003-08-24 03:24:23 +02:00
|
|
|
if [ -f /var/lib/shorewall/save ]; then
|
2002-07-06 00:24:40 +02:00
|
|
|
echo "Restoring dynamic rules..."
|
2003-07-26 18:44:38 +02:00
|
|
|
|
|
|
|
if [ -f /var/lib/shorewall/save ]; then
|
|
|
|
while read target ignore1 ignore2 address rest; do
|
|
|
|
case $target in
|
|
|
|
DROP|reject)
|
|
|
|
run_iptables2 -A dynamic -s $address -j $target
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done < /var/lib/shorewall/save
|
|
|
|
fi
|
2002-06-04 22:17:46 +02:00
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-10-11 18:06:00 +02:00
|
|
|
[ -n "$BLACKLISTNEWONLY" ] && state="-m state --state NEW" || state=
|
|
|
|
|
2003-07-03 01:12:14 +02:00
|
|
|
echo "Creating Interface Chains..."
|
2002-06-04 22:17:46 +02:00
|
|
|
|
2002-05-18 15:45:23 +02:00
|
|
|
for interface in $all_interfaces; do
|
2002-05-30 14:55:47 +02:00
|
|
|
createchain `forward_chain $interface` no
|
2003-10-11 18:06:00 +02:00
|
|
|
run_iptables -A `forward_chain $interface` $state -j dynamic
|
2002-05-30 14:55:47 +02:00
|
|
|
createchain `input_chain $interface` no
|
2003-10-11 18:06:00 +02:00
|
|
|
run_iptables -A `input_chain $interface` $state -j dynamic
|
2002-05-18 15:45:23 +02:00
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Build the common chain -- called during [re]start and refresh
|
|
|
|
#
|
2002-09-16 18:08:15 +02:00
|
|
|
build_common_chain() {
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-09-16 18:08:15 +02:00
|
|
|
# Common ICMP rules
|
|
|
|
#
|
|
|
|
run_user_exit icmpdef
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-09-16 18:08:15 +02:00
|
|
|
# Common rules in each chain
|
|
|
|
#
|
|
|
|
common=`find_file common`
|
|
|
|
|
|
|
|
if [ -f $common ]; then
|
|
|
|
. $common
|
2003-09-27 16:54:16 +02:00
|
|
|
elif [ -f /etc/shorewall/common.def ]; then
|
|
|
|
. /etc/shorewall/common.def
|
2002-09-16 18:08:15 +02:00
|
|
|
else
|
2003-09-27 16:54:16 +02:00
|
|
|
fatal_error "/etc/shorewall/common.def does not exist"
|
2002-09-16 18:08:15 +02:00
|
|
|
fi
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-09-16 18:08:15 +02:00
|
|
|
# New Not Syn Stuff
|
|
|
|
#
|
|
|
|
if [ -n "$NEWNOTSYN" ]; then
|
|
|
|
run_iptables -A common -p tcp --tcp-flags ACK ACK -j ACCEPT
|
|
|
|
run_iptables -A common -p tcp --tcp-flags RST RST -j ACCEPT
|
2003-06-19 22:19:41 +02:00
|
|
|
run_iptables -A common -p tcp --tcp-flags FIN FIN -j ACCEPT
|
2003-02-23 15:10:37 +01:00
|
|
|
fi
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-09-16 18:08:15 +02:00
|
|
|
# BROADCASTS
|
|
|
|
#
|
|
|
|
drop_broadcasts `find_broadcasts`
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Construct zone-independent rules
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
add_common_rules() {
|
2003-05-22 22:37:24 +02:00
|
|
|
local savelogparms="$LOGPARMS"
|
2004-01-27 23:33:32 +01:00
|
|
|
local broadcasts="$(find_broadcasts) 255.255.255.255 224.0.0.0/4"
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2004-01-27 23:33:32 +01:00
|
|
|
# Reject Rules -- Don't respond to broadcasts with an ICMP
|
2004-01-27 22:16:07 +01:00
|
|
|
#
|
|
|
|
qt iptables -A reject -m pkttype --pkt-type broadcast -j DROP
|
|
|
|
if ! qt iptables -A reject -m pkttype --pkt-type multicast -j DROP; then
|
2004-01-27 23:33:32 +01:00
|
|
|
#
|
|
|
|
# No pkttype support -- do it the hard way
|
|
|
|
#
|
|
|
|
for address in $broadcasts ; do
|
2004-01-27 22:16:07 +01:00
|
|
|
run_iptables -A reject -d $address -j DROP
|
|
|
|
done
|
|
|
|
fi
|
2004-01-27 23:33:32 +01:00
|
|
|
#
|
|
|
|
# Don't feed the smurfs
|
|
|
|
#
|
|
|
|
for address in $broadcasts ; do
|
|
|
|
run_iptables -A reject -s $address -j DROP
|
|
|
|
done
|
|
|
|
|
|
|
|
run_iptables -A reject -p tcp -j REJECT --reject-with tcp-reset
|
2003-04-14 02:47:47 +02:00
|
|
|
run_iptables -A reject -p udp -j REJECT
|
2003-04-14 03:01:01 +02:00
|
|
|
#
|
|
|
|
# Not all versions of iptables support these so don't complain if they don't work
|
|
|
|
#
|
2003-04-14 02:47:47 +02:00
|
|
|
qt iptables -A reject -p icmp -j REJECT --reject-with icmp-host-unreachable
|
2003-04-16 18:54:46 +02:00
|
|
|
if ! qt iptables -A reject -j REJECT --reject-with icmp-host-prohibited; then
|
|
|
|
#
|
|
|
|
# In case the above doesn't work
|
|
|
|
#
|
|
|
|
run_iptables -A reject -j REJECT
|
|
|
|
fi
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
# dropunclean rules
|
|
|
|
#
|
|
|
|
interfaces="`find_interfaces_by_option dropunclean`"
|
|
|
|
|
|
|
|
if [ -n "$interfaces" ]; then
|
|
|
|
createchain badpkt no
|
|
|
|
|
2002-07-06 00:24:40 +02:00
|
|
|
if [ -n "$LOGUNCLEAN" ]; then
|
2003-05-22 22:37:24 +02:00
|
|
|
|
2003-05-21 23:36:05 +02:00
|
|
|
LOGPARMS="$LOGPARMS --log-ip-options"
|
2002-12-18 22:26:03 +01:00
|
|
|
|
2003-05-21 23:36:05 +02:00
|
|
|
log_rule $LOGUNCLEAN badpkt DROP -p ! tcp
|
|
|
|
|
|
|
|
LOGPARMS="$LOGPARMS --log-tcp-options"
|
|
|
|
|
|
|
|
log_rule $LOGUNCLEAN badpkt DROP -p tcp
|
|
|
|
|
|
|
|
LOGPARMS="$savelogparms"
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
|
2002-07-06 00:24:40 +02:00
|
|
|
run_iptables -A badpkt -j DROP
|
|
|
|
echo "Mangled/Invalid Packet filtering enabled on:"
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
for interface in $interfaces; do
|
2002-05-18 15:45:23 +02:00
|
|
|
for chain in `first_chains $interface`; do
|
2002-05-18 21:04:45 +02:00
|
|
|
run_iptables -A $chain --match unclean -j badpkt
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
echo " $interface"
|
|
|
|
done
|
|
|
|
fi
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
# logunclean rules
|
|
|
|
#
|
|
|
|
interfaces="`find_interfaces_by_option logunclean`"
|
|
|
|
|
|
|
|
if [ -n "$interfaces" ]; then
|
|
|
|
createchain logpkt no
|
|
|
|
|
2003-10-11 18:06:00 +02:00
|
|
|
[ -z "$LOGUNCLEAN" ] && LOGUNCLEAN=info
|
2002-12-18 22:26:03 +01:00
|
|
|
|
2003-05-21 23:36:05 +02:00
|
|
|
LOGPARMS="$LOGPARMS --log-ip-options"
|
|
|
|
|
2003-10-02 06:48:30 +02:00
|
|
|
log_rule $LOGUNCLEAN logpkt LOG -p ! tcp
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-05-21 23:36:05 +02:00
|
|
|
LOGPARMS="$LOGPARMS --log-tcp-options"
|
|
|
|
|
2003-10-02 06:48:30 +02:00
|
|
|
log_rule $LOGUNCLEAN logpkt LOG -p tcp
|
2003-05-21 23:36:05 +02:00
|
|
|
|
|
|
|
LOGPARMS="$savelogparms"
|
2002-12-18 22:26:03 +01:00
|
|
|
|
2002-07-06 00:24:40 +02:00
|
|
|
echo "Mangled/Invalid Packet Logging enabled on:"
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
for interface in $interfaces; do
|
2002-05-18 15:45:23 +02:00
|
|
|
for chain in `first_chains $interface`; do
|
2002-05-18 21:04:45 +02:00
|
|
|
run_iptables -A $chain --match unclean -j logpkt
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
echo " $interface"
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
|
2002-09-16 18:08:15 +02:00
|
|
|
build_common_chain
|
|
|
|
|
2003-10-01 02:07:14 +02:00
|
|
|
#
|
|
|
|
# Process Black List
|
|
|
|
#
|
|
|
|
setup_blacklist
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-08-24 17:09:34 +02:00
|
|
|
# DHCP
|
|
|
|
#
|
2003-07-19 01:12:34 +02:00
|
|
|
interfaces=`find_interfaces_by_option dhcp`
|
2002-08-24 17:09:34 +02:00
|
|
|
|
2003-07-19 01:12:34 +02:00
|
|
|
if [ -n "$interfaces" ]; then
|
|
|
|
|
|
|
|
echo "Adding rules for DHCP"
|
2002-08-24 17:09:34 +02:00
|
|
|
|
2003-07-19 01:12:34 +02:00
|
|
|
for interface in $interfaces; do
|
|
|
|
run_iptables -A `input_chain $interface` -p udp --dport 67:68 -j ACCEPT
|
|
|
|
run_iptables -A OUTPUT -o $interface -p udp --dport 67:68 -j ACCEPT
|
|
|
|
done
|
|
|
|
fi
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-19 23:51:36 +02:00
|
|
|
# RFC 1918
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
norfc1918_interfaces="`find_interfaces_by_option norfc1918`"
|
|
|
|
|
|
|
|
if [ -n "$norfc1918_interfaces" ]; then
|
|
|
|
echo "Enabling RFC1918 Filtering"
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-31 16:33:18 +02:00
|
|
|
strip_file rfc1918
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-11-27 19:39:11 +01:00
|
|
|
createchain norfc1918 no
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-11-27 19:39:11 +01:00
|
|
|
createchain rfc1918 no
|
2003-05-21 23:36:05 +02:00
|
|
|
|
2003-11-27 19:39:11 +01:00
|
|
|
log_rule $RFC1918_LOG_LEVEL rfc1918 DROP
|
2003-05-21 23:36:05 +02:00
|
|
|
|
2003-11-27 19:39:11 +01:00
|
|
|
run_iptables -A rfc1918 -j DROP
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-06-27 23:02:52 +02:00
|
|
|
if [ -n "$MANGLE_ENABLED" -a -z "$CONNTRACK_MATCH" ]; then
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-06-27 23:02:52 +02:00
|
|
|
# Mangling is enabled but conntrack match isn't available --
|
|
|
|
# create a chain in the mangle table to filter RFC1918 destination
|
|
|
|
# addresses. This must be done in the mangle table before we apply
|
|
|
|
# any DNAT rules in the nat table
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
|
|
|
# Also add a chain to log and drop any RFC1918 packets that we find
|
|
|
|
#
|
2002-06-21 19:20:18 +02:00
|
|
|
run_iptables -t mangle -N man1918
|
2003-11-27 19:39:11 +01:00
|
|
|
run_iptables -t mangle -N rfc1918
|
|
|
|
log_rule $RFC1918_LOG_LEVEL rfc1918 DROP -t mangle
|
|
|
|
run_iptables -t mangle -A rfc1918 -j DROP
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-31 16:33:18 +02:00
|
|
|
while read subnet target; do
|
2002-06-21 23:40:36 +02:00
|
|
|
case $target in
|
2003-11-27 19:39:11 +01:00
|
|
|
logdrop)
|
|
|
|
target=rfc1918
|
|
|
|
;;
|
|
|
|
DROP|RETURN)
|
2002-06-21 23:40:36 +02:00
|
|
|
;;
|
|
|
|
*)
|
2003-09-22 23:44:22 +02:00
|
|
|
fatal_error "Invalid target ($target) for $subnet"
|
2002-06-21 23:40:36 +02:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
2003-11-27 19:39:11 +01:00
|
|
|
run_iptables2 -A norfc1918 -s $subnet -j $target
|
2003-06-27 23:02:52 +02:00
|
|
|
|
|
|
|
if [ -n "$CONNTRACK_MATCH" ]; then
|
|
|
|
#
|
|
|
|
# We have connection tracking match -- match on the original destination
|
|
|
|
#
|
2003-11-27 19:39:11 +01:00
|
|
|
run_iptables2 -A norfc1918 -m conntrack --ctorigdst $subnet -j $target
|
2003-06-27 23:02:52 +02:00
|
|
|
elif [ -n "$MANGLE_ENABLED" ]; then
|
|
|
|
#
|
|
|
|
# No connection tracking match but we have mangling -- add a rule to
|
|
|
|
# the mangle table
|
|
|
|
#
|
2002-12-18 22:26:03 +01:00
|
|
|
run_iptables2 -t mangle -A man1918 -d $subnet -j $target
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
2002-05-31 16:33:18 +02:00
|
|
|
done < $TMP_DIR/rfc1918
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
for interface in $norfc1918_interfaces; do
|
2002-05-18 15:45:23 +02:00
|
|
|
for chain in `first_chains $interface`; do
|
2003-11-27 19:39:11 +01:00
|
|
|
run_iptables -A $chain -m state --state NEW -j norfc1918
|
2002-05-18 15:45:23 +02:00
|
|
|
done
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-06-27 23:02:52 +02:00
|
|
|
[ -n "$MANGLE_ENABLED" -a -z "$CONNTRACK_MATCH" ] && \
|
2003-02-21 23:55:36 +01:00
|
|
|
run_iptables -t mangle -A PREROUTING -m state --state NEW -i $interface -j man1918
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
|
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-11-10 22:34:20 +01:00
|
|
|
interfaces=`find_interfaces_by_option tcpflags`
|
|
|
|
|
|
|
|
if [ -n "$interfaces" ]; then
|
|
|
|
echo "Setting up TCP Flags checking..."
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-11-10 22:34:20 +01:00
|
|
|
createchain tcpflags no
|
|
|
|
|
|
|
|
if [ -n "$TCP_FLAGS_LOG_LEVEL" ]; then
|
|
|
|
createchain logflags no
|
|
|
|
|
2003-05-21 23:36:05 +02:00
|
|
|
savelogparms="$LOGPARMS"
|
|
|
|
|
|
|
|
LOGPARMS="$LOGPARMS --log-ip-options"
|
|
|
|
|
|
|
|
log_rule $TCP_FLAGS_LOG_LEVEL logflags $TCP_FLAGS_DISPOSITION
|
|
|
|
|
|
|
|
LOGPARMS="$savelogparms"
|
|
|
|
|
2002-11-10 22:34:20 +01:00
|
|
|
case $TCP_FLAGS_DISPOSITION in
|
|
|
|
REJECT)
|
2003-06-12 01:57:35 +02:00
|
|
|
run_iptables -A logflags -j REJECT --reject-with tcp-reset
|
2002-11-10 22:34:20 +01:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
run_iptables -A logflags -j $TCP_FLAGS_DISPOSITION
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
disposition="-j logflags"
|
|
|
|
else
|
|
|
|
disposition="-j $TCP_FLAGS_DISPOSITION"
|
|
|
|
fi
|
|
|
|
|
|
|
|
run_iptables -A tcpflags -p tcp --tcp-flags ALL FIN,URG,PSH $disposition
|
|
|
|
run_iptables -A tcpflags -p tcp --tcp-flags ALL NONE $disposition
|
|
|
|
run_iptables -A tcpflags -p tcp --tcp-flags SYN,RST SYN,RST $disposition
|
|
|
|
run_iptables -A tcpflags -p tcp --tcp-flags SYN,FIN SYN,FIN $disposition
|
2002-12-14 16:44:26 +01:00
|
|
|
#
|
2002-12-20 02:13:41 +01:00
|
|
|
# There are a lot of probes to ports 80, 3128 and 8080 that use a source
|
|
|
|
# port of 0. This catches them even if they are directed at an IP that
|
|
|
|
# hosts a web server.
|
2002-12-14 16:44:26 +01:00
|
|
|
#
|
|
|
|
run_iptables -A tcpflags -p tcp --syn --sport 0 $disposition
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-11-10 22:34:20 +01:00
|
|
|
for interface in $interfaces; do
|
|
|
|
for chain in `first_chains $interface`; do
|
|
|
|
run_iptables -A $chain -p tcp -j tcpflags
|
|
|
|
done
|
|
|
|
done
|
|
|
|
fi
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-08-08 22:55:06 +02:00
|
|
|
# ARP Filtering
|
|
|
|
#
|
|
|
|
for f in /proc/sys/net/ipv4/conf/*/arp_filter; do
|
|
|
|
echo 0 > $f
|
|
|
|
done
|
|
|
|
|
|
|
|
interfaces=`find_interfaces_by_option arp_filter`
|
|
|
|
|
|
|
|
if [ -n "$interfaces" ]; then
|
|
|
|
echo "Setting up ARP Filtering..."
|
2003-10-30 16:42:45 +01:00
|
|
|
|
2003-08-08 22:55:06 +02:00
|
|
|
for interface in $interfaces; do
|
|
|
|
file=/proc/sys/net/ipv4/conf/$interface/arp_filter
|
|
|
|
if [ -f $file ]; then
|
|
|
|
echo 1 > $file
|
|
|
|
else
|
|
|
|
error_message \
|
|
|
|
"Warning: Cannot set ARP filtering on $interface"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
fi
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-19 23:51:36 +02:00
|
|
|
# Route Filtering
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
interfaces="`find_interfaces_by_option routefilter`"
|
|
|
|
|
|
|
|
if [ -n "$interfaces" -o -n "$ROUTE_FILTER" ]; then
|
|
|
|
echo "Setting up Kernel Route Filtering..."
|
|
|
|
|
2003-10-30 16:42:45 +01:00
|
|
|
for f in /proc/sys/net/ipv4/conf/*/rp_filter; do
|
|
|
|
echo 0 > $f
|
|
|
|
done
|
|
|
|
|
|
|
|
for interface in $interfaces; do
|
|
|
|
file=/proc/sys/net/ipv4/conf/$interface/rp_filter
|
|
|
|
if [ -f $file ]; then
|
|
|
|
echo 1 > $file
|
|
|
|
else
|
|
|
|
error_message \
|
|
|
|
"Warning: Cannot set route filtering on $interface"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
echo 1 > /proc/sys/net/ipv4/conf/all/rp_filter
|
|
|
|
[ -n "$ROUTE_FILTER" ] && echo 1 > /proc/sys/net/ipv4/conf/default/rp_filter
|
|
|
|
run_ip route flush cache
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
2003-11-27 19:24:57 +01:00
|
|
|
|
|
|
|
setup_forwarding
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Scan the policy file defining the necessary chains
|
|
|
|
# Add the appropriate policy rule(s) to the end of each canonical chain
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
apply_policy_rules() {
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-19 23:51:36 +02:00
|
|
|
# Create policy chains
|
|
|
|
#
|
2002-12-07 04:21:32 +01:00
|
|
|
for chain in $all_policy_chains; do
|
|
|
|
eval policy=\$${chain}_policy
|
|
|
|
eval loglevel=\$${chain}_loglevel
|
|
|
|
eval synparams=\$${chain}_synparams
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
[ -n "$synparams" ] && setup_syn_flood_chain $chain $synparams
|
|
|
|
|
|
|
|
if havechain $chain; then
|
2002-06-01 02:28:18 +02:00
|
|
|
[ -n "$synparams" ] && \
|
2002-07-06 00:24:40 +02:00
|
|
|
run_iptables -I $chain 2 -p tcp --syn -j @$chain
|
2002-06-01 02:28:18 +02:00
|
|
|
else
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
2002-11-11 04:41:42 +01:00
|
|
|
# The chain doesn't exist. Create the chain and add policy
|
2002-06-01 02:28:18 +02:00
|
|
|
# rules
|
2002-05-31 16:33:18 +02:00
|
|
|
#
|
|
|
|
# We must include the ESTABLISHED and RELATED state
|
|
|
|
# rule here to account for replys and reverse
|
|
|
|
# related sessions associated with sessions going
|
|
|
|
# in the other direction
|
|
|
|
#
|
2003-02-08 21:58:44 +01:00
|
|
|
createchain $chain yes
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-11-11 04:41:42 +01:00
|
|
|
#
|
|
|
|
# If either client or server is 'all' then this MUST be
|
|
|
|
# a policy chain and we must apply the appropriate policy rules
|
|
|
|
#
|
|
|
|
# Otherwise, this is a canonical chain which will be handled in
|
|
|
|
# the for loop below
|
|
|
|
#
|
2002-12-07 04:21:32 +01:00
|
|
|
case $chain in
|
|
|
|
all2*|*2all)
|
|
|
|
policy_rules $chain $policy $loglevel
|
|
|
|
;;
|
|
|
|
esac
|
2002-06-01 02:28:18 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
[ -n "$synparams" ] && \
|
2002-06-01 02:28:18 +02:00
|
|
|
[ $policy = ACCEPT -o $policy = CONTINUE ] && \
|
2002-05-01 01:13:15 +02:00
|
|
|
run_iptables -I $chain 2 -p tcp --syn -j @$chain
|
|
|
|
fi
|
|
|
|
|
2002-12-07 04:21:32 +01:00
|
|
|
done
|
2003-02-20 00:52:03 +01:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-06-19 23:51:36 +02:00
|
|
|
# Add policy rules to canonical chains
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
for zone in $FW $zones; do
|
|
|
|
for zone1 in $FW $zones; do
|
|
|
|
chain=${zone}2${zone1}
|
|
|
|
if havechain $chain; then
|
|
|
|
run_user_exit $chain
|
|
|
|
default_policy $zone $zone1
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Activate the rules
|
|
|
|
#
|
2003-02-23 15:10:37 +01:00
|
|
|
activate_rules()
|
2002-07-05 17:56:02 +02:00
|
|
|
{
|
2002-07-05 23:57:37 +02:00
|
|
|
local PREROUTING_rule=1
|
|
|
|
local POSTROUTING_rule=1
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-07-05 23:57:37 +02:00
|
|
|
# Jump to a NAT chain from one of the builtin nat chains
|
|
|
|
#
|
|
|
|
addnatjump() # $1 = BUILTIN chain, $2 = user chain, $3 - * other arguments
|
|
|
|
{
|
|
|
|
local sourcechain=$1 destchain=$2
|
|
|
|
shift
|
|
|
|
shift
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-07-05 23:57:37 +02:00
|
|
|
havenatchain $destchain && \
|
2002-07-05 17:56:02 +02:00
|
|
|
run_iptables -t nat -A $sourcechain $@ -j $destchain
|
2002-07-05 23:57:37 +02:00
|
|
|
}
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-07-05 23:57:37 +02:00
|
|
|
# Jump to a RULES chain from one of the builtin nat chains
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-07-05 23:57:37 +02:00
|
|
|
# If NAT_BEFORE_RULES then append the rule to the chain; otherwise, insert
|
|
|
|
# the jump near the front of the builtin chain
|
|
|
|
#
|
|
|
|
addrulejump() # $1 = BUILTIN chain, $2 = user chain, $3 - * other arguments
|
|
|
|
{
|
|
|
|
local sourcechain=$1 destchain=$2
|
|
|
|
shift
|
|
|
|
shift
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-07-05 23:57:37 +02:00
|
|
|
if havenatchain $destchain; then
|
|
|
|
if [ -n "$NAT_BEFORE_RULES" ]; then
|
|
|
|
run_iptables -t nat -A $sourcechain $@ -j $destchain
|
|
|
|
else
|
|
|
|
eval run_iptables -t nat -I $sourcechain \
|
|
|
|
\$${sourcechain}_rule $@ -j $destchain
|
|
|
|
eval ${sourcechain}_rule=\$\(\(\$${sourcechain}_rule + 1\)\)
|
|
|
|
fi
|
2002-07-05 17:56:02 +02:00
|
|
|
fi
|
2002-07-05 23:57:37 +02:00
|
|
|
}
|
2002-06-30 16:35:32 +02:00
|
|
|
|
2002-07-05 23:57:37 +02:00
|
|
|
#
|
|
|
|
# Add jumps from the builtin chains to the nat chains
|
|
|
|
#
|
2002-07-05 17:56:02 +02:00
|
|
|
addnatjump PREROUTING nat_in
|
|
|
|
addnatjump POSTROUTING nat_out
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2002-07-04 17:41:51 +02:00
|
|
|
for interface in $all_interfaces; do
|
2002-07-06 00:24:40 +02:00
|
|
|
addnatjump PREROUTING `input_chain $interface` -i $interface
|
2002-07-05 17:56:02 +02:00
|
|
|
addnatjump POSTROUTING `output_chain $interface` -o $interface
|
2002-07-04 17:41:51 +02:00
|
|
|
done
|
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
> ${STATEDIR}/chains
|
|
|
|
> ${STATEDIR}/zones
|
|
|
|
|
2002-05-18 21:04:45 +02:00
|
|
|
for zone in $zones; do
|
2002-05-01 01:13:15 +02:00
|
|
|
eval source_hosts=\$${zone}_hosts
|
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
echo $zone $source_hosts >> ${STATEDIR}/zones
|
|
|
|
|
|
|
|
chain1=`rules_chain $FW $zone`
|
|
|
|
chain2=`rules_chain $zone $FW`
|
|
|
|
|
2003-10-15 20:34:05 +02:00
|
|
|
eval complex=\$${zone}_is_complex
|
|
|
|
|
|
|
|
if [ -n "$complex" ]; then
|
|
|
|
frwd_chain=${zone}_frwd
|
|
|
|
createchain $frwd_chain No
|
|
|
|
fi
|
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
echo "$FW $zone $chain1" >> ${STATEDIR}/chains
|
|
|
|
echo "$zone $FW $chain2" >> ${STATEDIR}/chains
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2004-01-24 00:48:30 +01:00
|
|
|
need_broadcast=
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
for host in $source_hosts; do
|
|
|
|
interface=${host%:*}
|
|
|
|
subnet=${host#*:}
|
|
|
|
|
2003-02-23 15:10:37 +01:00
|
|
|
run_iptables -A OUTPUT -o $interface -d $subnet -j $chain1
|
2002-10-01 22:54:42 +02:00
|
|
|
|
2002-07-05 23:57:37 +02:00
|
|
|
#
|
|
|
|
# Add jumps from the builtin chains for DNAT and SNAT rules
|
|
|
|
#
|
|
|
|
addrulejump PREROUTING `dnat_chain $zone` -i $interface -s $subnet
|
|
|
|
addrulejump POSTROUTING `snat_chain $zone` -o $interface -d $subnet
|
2002-05-18 21:04:45 +02:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
run_iptables -A `input_chain $interface` -s $subnet -j $chain2
|
2003-10-15 20:34:05 +02:00
|
|
|
|
|
|
|
[ -n "$complex" ] && \
|
|
|
|
run_iptables -A `forward_chain $interface` -s $subnet -j $frwd_chain
|
|
|
|
|
2004-01-28 01:52:03 +01:00
|
|
|
if [ "$subnet" != 0.0.0.0/0 ]; then
|
|
|
|
if ! list_search $interface $need_broadcast ; then
|
|
|
|
eval options=\$`chain_base ${interface}`_options
|
|
|
|
list_search detectnets $options && need_broadcast="$need_broadcast $interface"
|
|
|
|
fi
|
2004-01-24 00:48:30 +01:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
|
2004-01-24 00:48:30 +01:00
|
|
|
for interface in $need_broadcast ; do
|
|
|
|
run_iptables -A OUTPUT -o $interface -d 255.255.255.255 -j $chain1
|
2004-01-28 01:52:03 +01:00
|
|
|
run_iptables -A OUTPUT -o $interface -d 224.0.0.0/4 -j $chain1
|
2004-01-24 00:48:30 +01:00
|
|
|
done
|
|
|
|
|
2002-05-18 21:04:45 +02:00
|
|
|
for zone1 in $zones; do
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-03-21 05:14:20 +01:00
|
|
|
eval policy=\$${zone}2${zone1}_policy
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-03-21 05:14:20 +01:00
|
|
|
[ "$policy" = NONE ] && continue
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2003-03-21 05:14:20 +01:00
|
|
|
eval dest_hosts=\$${zone1}_hosts
|
2002-10-01 22:54:42 +02:00
|
|
|
|
2003-03-21 20:23:03 +01:00
|
|
|
chain="`rules_chain $zone $zone1`"
|
2002-09-15 00:00:52 +02:00
|
|
|
|
2003-03-21 05:14:20 +01:00
|
|
|
echo "$zone $zone1 $chain" >> ${STATEDIR}/chains
|
|
|
|
|
2003-04-01 04:00:37 +02:00
|
|
|
if [ $zone = $zone1 ]; then
|
|
|
|
eval routeback=\"\$${zone}_routeback\"
|
|
|
|
else
|
|
|
|
routeback=
|
|
|
|
fi
|
|
|
|
|
2003-10-15 20:34:05 +02:00
|
|
|
if [ -n "$complex" ]; then
|
2002-05-01 01:13:15 +02:00
|
|
|
for host1 in $dest_hosts; do
|
|
|
|
interface1=${host1%:*}
|
|
|
|
subnet1=${host1#*:}
|
2003-10-26 17:22:01 +01:00
|
|
|
if [ `list_count1 $source_hosts` -eq 1 -a "$source_hosts" = "$host1" ]; then
|
|
|
|
if list_search $host1 $routeback; then
|
|
|
|
run_iptables -A $frwd_chain -o $interface1 -d $subnet1 -j $chain
|
2003-10-19 16:57:48 +02:00
|
|
|
fi
|
2003-10-15 20:34:05 +02:00
|
|
|
else
|
|
|
|
run_iptables -A $frwd_chain -o $interface1 -d $subnet1 -j $chain
|
2002-05-30 14:55:47 +02:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
2003-10-15 20:34:05 +02:00
|
|
|
else
|
|
|
|
for host in $source_hosts; do
|
|
|
|
interface=${host%:*}
|
|
|
|
|
|
|
|
chain1=`forward_chain $interface`
|
|
|
|
|
|
|
|
for host1 in $dest_hosts; do
|
|
|
|
interface1=${host1%:*}
|
|
|
|
subnet1=${host1#*:}
|
|
|
|
|
|
|
|
if [ "$host" != "$host1" ] || list_search $host $routeback; then
|
|
|
|
run_iptables -A $chain1 -o $interface1 -d $subnet1 -j $chain
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
done
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
done
|
|
|
|
done
|
|
|
|
|
2002-05-18 15:45:23 +02:00
|
|
|
for interface in $all_interfaces; do
|
|
|
|
run_iptables -A FORWARD -i $interface -j `forward_chain $interface`
|
|
|
|
run_iptables -A INPUT -i $interface -j `input_chain $interface`
|
2002-07-05 23:57:37 +02:00
|
|
|
addnatjump POSTROUTING `masq_chain $interface` -o $interface
|
2002-05-18 15:45:23 +02:00
|
|
|
done
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
complete_standard_chain INPUT all $FW
|
|
|
|
complete_standard_chain OUTPUT $FW all
|
|
|
|
complete_standard_chain FORWARD all all
|
2003-06-11 03:01:48 +02:00
|
|
|
#
|
|
|
|
# Remove rules added to keep the firewall alive during [re]start"
|
|
|
|
#
|
2003-03-08 16:48:07 +01:00
|
|
|
for chain in INPUT OUTPUT FORWARD; do
|
2003-06-11 03:01:48 +02:00
|
|
|
run_iptables -D $chain -m state --state ESTABLISHED,RELATED -j ACCEPT
|
2003-03-08 16:48:07 +01:00
|
|
|
run_iptables -D $chain -p udp --dport 53 -j ACCEPT
|
|
|
|
done
|
2003-11-27 19:24:57 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-07-28 19:32:41 +02:00
|
|
|
# Check for disabled startup
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-07-28 19:32:41 +02:00
|
|
|
check_disabled_startup() {
|
2002-09-19 22:40:10 +02:00
|
|
|
if [ -f /etc/shorewall/startup_disabled ]; then
|
|
|
|
echo " Shorewall Startup is disabled -- to enable startup"
|
|
|
|
echo " after you have completed Shorewall configuration,"
|
|
|
|
echo " remove the file /etc/shorewall/startup_disabled"
|
|
|
|
|
2002-09-29 23:28:44 +02:00
|
|
|
[ -n "$TMP_DIR" ] && rm -rf $TMP_DIR
|
2002-09-19 22:40:10 +02:00
|
|
|
my_mutex_off
|
|
|
|
exit 2
|
|
|
|
fi
|
2003-07-28 19:32:41 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#
|
|
|
|
# Start/Restart the Firewall
|
|
|
|
#
|
|
|
|
define_firewall() # $1 = Command (Start or Restart)
|
|
|
|
{
|
|
|
|
check_disabled_startup
|
2002-09-19 22:40:10 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
echo "${1}ing Shorewall..."
|
|
|
|
|
|
|
|
verify_os_version
|
|
|
|
|
2003-02-21 23:55:36 +01:00
|
|
|
verify_ip
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
load_kernel_modules
|
|
|
|
|
|
|
|
echo "Initializing..."
|
|
|
|
|
|
|
|
initialize_netfilter
|
|
|
|
|
|
|
|
echo "Configuring Proxy ARP"
|
|
|
|
|
|
|
|
setup_proxy_arp
|
|
|
|
|
2002-06-30 16:35:32 +02:00
|
|
|
setup_nat
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
echo "Adding Common Rules"
|
|
|
|
|
|
|
|
add_common_rules
|
|
|
|
|
|
|
|
tunnels=`find_file tunnels`
|
|
|
|
|
|
|
|
[ -f $tunnels ] && \
|
|
|
|
echo "Processing $tunnels..." && setup_tunnels $tunnels
|
|
|
|
|
2002-10-23 03:22:48 +02:00
|
|
|
maclist_hosts=`find_hosts_by_option maclist`
|
2002-10-22 20:07:52 +02:00
|
|
|
|
2002-10-23 03:22:48 +02:00
|
|
|
if [ -n "$maclist_hosts" ] ; then
|
2002-10-22 20:07:52 +02:00
|
|
|
setup_mac_lists
|
|
|
|
fi
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
rules=`find_file rules`
|
|
|
|
|
2003-12-04 03:01:08 +01:00
|
|
|
echo "Processing Actions..."
|
|
|
|
|
|
|
|
process_actions
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
echo "Processing $rules..."
|
|
|
|
|
2003-09-27 16:54:16 +02:00
|
|
|
process_rules
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
policy=`find_file policy`
|
|
|
|
|
|
|
|
echo "Processing $policy..."
|
|
|
|
|
|
|
|
apply_policy_rules
|
|
|
|
|
|
|
|
masq=`find_file masq`
|
|
|
|
|
|
|
|
[ -f $masq ] && setup_masq $masq
|
|
|
|
|
|
|
|
tos=`find_file tos`
|
|
|
|
|
|
|
|
[ -f $tos ] && [ -n "$MANGLE_ENABLED" ] && process_tos $tos
|
|
|
|
|
2003-02-24 16:24:55 +01:00
|
|
|
ecn=`find_file ecn`
|
|
|
|
|
2003-03-24 22:56:31 +01:00
|
|
|
[ -f $ecn ] && [ -n "$MANGLE_ENABLED" ] && setup_ecn $ecn
|
2003-02-24 16:24:55 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
[ -n "$TC_ENABLED" ] && setup_tc
|
|
|
|
|
|
|
|
echo "Activating Rules..."
|
|
|
|
|
|
|
|
activate_rules
|
|
|
|
|
2002-07-23 18:26:45 +02:00
|
|
|
[ -n "$aliases_to_add" ] && \
|
2002-07-24 01:09:14 +02:00
|
|
|
echo "Adding IP Addresses..." && \
|
2002-07-29 16:31:50 +02:00
|
|
|
add_ip_aliases
|
2002-07-23 18:26:45 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
run_user_exit start
|
|
|
|
|
|
|
|
createchain shorewall no
|
|
|
|
|
2002-09-29 23:08:25 +02:00
|
|
|
date > $STATEDIR/restarted
|
2002-07-23 00:31:07 +02:00
|
|
|
|
2002-05-03 00:56:27 +02:00
|
|
|
report "Shorewall ${1}ed"
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
rm -rf $TMP_DIR
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Rebuild the common chain
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
refresh_firewall()
|
|
|
|
{
|
|
|
|
echo "Refreshing Shorewall..."
|
|
|
|
|
|
|
|
echo "Determining Zones and Interfaces..."
|
|
|
|
|
|
|
|
determine_zones
|
|
|
|
|
2002-12-04 22:17:14 +01:00
|
|
|
validate_interfaces_file
|
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
[ -z "$zones" ] && startup_error "No Zones Defined"
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
determine_interfaces
|
|
|
|
|
2002-05-30 14:55:47 +02:00
|
|
|
run_user_exit refresh
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
run_iptables -F common
|
|
|
|
|
|
|
|
echo "Adding Common Rules"
|
|
|
|
|
2002-09-16 18:08:15 +02:00
|
|
|
build_common_chain
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
# Blacklist
|
|
|
|
#
|
|
|
|
refresh_blacklist
|
|
|
|
|
2003-02-24 16:24:55 +01:00
|
|
|
ecn=`find_file ecn`
|
|
|
|
|
2003-03-24 22:56:31 +01:00
|
|
|
[ -f $ecn ] && [ -n "$MANGLE_ENABLED" ] && setup_ecn $ecn
|
2002-12-04 22:17:14 +01:00
|
|
|
#
|
|
|
|
# Refresh Traffic Control
|
|
|
|
#
|
2003-02-23 15:10:37 +01:00
|
|
|
[ -n "$TC_ENABLED" ] && refresh_tc
|
2002-12-04 22:17:14 +01:00
|
|
|
|
2002-05-03 00:56:27 +02:00
|
|
|
report "Shorewall Refreshed"
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
rm -rf $TMP_DIR
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Add a host or subnet to a zone
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
add_to_zone() # $1 = <interface>[:<hosts>] $2 = zone
|
|
|
|
{
|
2002-10-02 00:27:19 +02:00
|
|
|
local base
|
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
nat_chain_exists() # $1 = chain name
|
|
|
|
{
|
|
|
|
qt iptables -t nat -L $1 -n
|
|
|
|
}
|
|
|
|
|
|
|
|
do_iptables() # $@ = command
|
|
|
|
{
|
|
|
|
if ! iptables $@ ; then
|
2003-02-08 21:58:44 +01:00
|
|
|
startup_error "Can't add $1 to zone $2"
|
2002-10-01 22:54:42 +02:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
output_rule_num() {
|
2002-10-02 01:43:03 +02:00
|
|
|
local num=`iptables -L OUTPUT -n --line-numbers | grep icmp | cut -d' ' -f1 | head -n1`
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-02 01:43:03 +02:00
|
|
|
[ -n "$num" ] && echo $(($num+1))
|
2002-10-01 22:54:42 +02:00
|
|
|
}
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Isolate interface and host parts
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
interface=${1%:*}
|
|
|
|
host=${1#*:}
|
|
|
|
|
|
|
|
[ -z "$host" ] && host="0.0.0.0/0"
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Load $zones
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
determine_zones
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Validate Zone
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
zone=$2
|
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
validate_zone $zone || startup_error "Unknown zone: $zone"
|
2002-10-01 22:54:42 +02:00
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
[ "$zone" = $FW ] && startup_error "Can't add $1 to firewall zone"
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Be sure that Shorewall has been restarted using a DZ-aware version of the code
|
|
|
|
#
|
2003-02-08 21:58:44 +01:00
|
|
|
[ -f ${STATEDIR}/chains ] || startup_error "${STATEDIR}/chains -- file not found"
|
|
|
|
[ -f ${STATEDIR}/zones ] || startup_error "${STATEDIR}/zones -- file not found"
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Be sure that the interface was present at last [re]start
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
if ! chain_exists `input_chain $interface` ; then
|
2003-02-08 21:58:44 +01:00
|
|
|
startup_error "Unknown interface $interface"
|
2002-10-01 22:54:42 +02:00
|
|
|
fi
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Build lists of interfaces with special rules
|
|
|
|
#
|
2002-10-02 01:43:03 +02:00
|
|
|
dhcp_interfaces=`find_interfaces_by_option dhcp`
|
|
|
|
blacklist_interfaces=`find_interfaces_by_option blacklist`
|
2003-01-21 00:06:55 +01:00
|
|
|
maclist_interfaces=`find_interfaces_by_option maclist`
|
2002-11-10 22:34:20 +01:00
|
|
|
tcpflags_interfaces=`find_interfaces_by_option tcpflags`
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Normalize the first argument to this function
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
newhost="$interface:$host"
|
2003-02-23 15:22:14 +01:00
|
|
|
|
|
|
|
terminator=fatal_error
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Create a new Zone state file
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
> ${STATEDIR}/zones_$$
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Add $1 to the Zone state file
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
while read z hosts; do
|
|
|
|
if [ "$z" = "$zone" ]; then
|
|
|
|
for h in $hosts; do
|
|
|
|
if [ "$h" = "$newhost" ]; then
|
|
|
|
rm -f ${STATEDIR}/zones_$$
|
2003-02-08 21:58:44 +01:00
|
|
|
startup_error "$1 already in zone $zone"
|
2002-10-01 22:54:42 +02:00
|
|
|
fi
|
|
|
|
done
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
[ -z "$hosts" ] && hosts=$newhost || hosts="$hosts $newhost"
|
|
|
|
fi
|
|
|
|
|
2002-10-01 23:46:48 +02:00
|
|
|
eval ${z}_hosts=\"$hosts\"
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
echo "$z $hosts" >> ${STATEDIR}/zones_$$
|
|
|
|
done < ${STATEDIR}/zones
|
|
|
|
|
|
|
|
mv -f ${STATEDIR}/zones_$$ ${STATEDIR}/zones
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# If the zone passed in the command has a dnat chain then insert a rule in
|
|
|
|
# the nat table PREROUTING chain to jump to that chain when the source
|
2003-02-20 00:52:03 +01:00
|
|
|
# matches the new host(s)#
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
chain=${zone}_dnat
|
|
|
|
|
|
|
|
if nat_chain_exists $chain; then
|
2002-10-02 00:27:19 +02:00
|
|
|
do_iptables -t nat -I PREROUTING -i $interface -s $host -j $chain
|
2002-10-01 22:54:42 +02:00
|
|
|
fi
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Insert new rules into the input chains for the passed interface
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
while read z1 z2 chain; do
|
|
|
|
if [ "$z1" = "$zone" ]; then
|
|
|
|
if [ "$z2" = "$FW" ]; then
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
2002-10-22 20:33:37 +02:00
|
|
|
# We will insert the rule right after the DHCP, 'ping' and
|
|
|
|
# MAC rules (if any)
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
2002-10-02 01:43:03 +02:00
|
|
|
if list_search $interface $dhcp_interfaces; then
|
|
|
|
rulenum=3
|
|
|
|
else
|
|
|
|
rulenum=2
|
|
|
|
fi
|
|
|
|
|
2003-02-08 21:44:00 +01:00
|
|
|
if list_search $interface $maclist_interfaces; then
|
2002-10-22 20:33:37 +02:00
|
|
|
rulenum=$(($rulenum + 1))
|
|
|
|
fi
|
|
|
|
|
2003-02-08 21:44:00 +01:00
|
|
|
if list_search $interface $tcpflags_interfaces; then
|
2002-11-10 22:34:20 +01:00
|
|
|
rulenum=$(($rulenum + 1))
|
|
|
|
fi
|
|
|
|
|
2003-02-23 15:10:37 +01:00
|
|
|
do_iptables -I `input_chain $interface` $rulenum -s $host -j $chain
|
2002-10-01 22:54:42 +02:00
|
|
|
else
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Insert rules into the passed interface's forward chain
|
|
|
|
#
|
2002-10-22 20:33:37 +02:00
|
|
|
# We insert them after any blacklist/MAC verification rules
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
source_chain=`forward_chain $interface`
|
2002-10-01 23:46:48 +02:00
|
|
|
eval dest_hosts=\"\$${z2}_hosts\"
|
2002-10-01 22:54:42 +02:00
|
|
|
|
2002-10-02 00:27:19 +02:00
|
|
|
base=`chain_base $interface`
|
|
|
|
|
|
|
|
eval rulenum=\$${base}_rulenum
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-02 01:43:03 +02:00
|
|
|
if [ -z "$rulenum" ]; then
|
|
|
|
if list_search $interface $blacklist_interfaces; then
|
|
|
|
rulenum=3
|
|
|
|
else
|
|
|
|
rulenum=2
|
|
|
|
fi
|
2002-10-22 20:33:37 +02:00
|
|
|
|
2003-02-08 21:44:00 +01:00
|
|
|
if list_search $interface $maclist_interfaces; then
|
2002-10-22 20:33:37 +02:00
|
|
|
rulenum=$(($rulenum + 1))
|
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-02-08 21:44:00 +01:00
|
|
|
if list_search $interface $tcpflags_interfaces; then
|
2002-11-10 22:34:20 +01:00
|
|
|
rulenum=$(($rulenum + 1))
|
|
|
|
fi
|
2002-10-02 01:43:03 +02:00
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
for h in $dest_hosts; do
|
2002-10-01 23:46:48 +02:00
|
|
|
iface=${h%:*}
|
|
|
|
hosts=${h#*:}
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-01 23:46:48 +02:00
|
|
|
if [ "$iface" != "$interface" -o "$hosts" != "$host" ]; then
|
2002-10-02 00:27:19 +02:00
|
|
|
do_iptables -I $source_chain $rulenum -s $host -o $iface -d $hosts -j $chain
|
|
|
|
rulenum=$(($rulenum + 1))
|
2002-10-01 23:46:48 +02:00
|
|
|
fi
|
2002-10-01 22:54:42 +02:00
|
|
|
done
|
2002-10-02 00:27:19 +02:00
|
|
|
|
|
|
|
eval ${base}_rulenum=$rulenum
|
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
fi
|
|
|
|
elif [ "$z2" = "$zone" ]; then
|
|
|
|
if [ "$z1" = "$FW" ]; then
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Add a rule to the OUTPUT chain -- always after the icmp * ACCEPT rule
|
|
|
|
#
|
2002-10-02 00:27:19 +02:00
|
|
|
do_iptables -I OUTPUT `output_rule_num` -o $interface -d $host -j $chain
|
2002-10-01 22:54:42 +02:00
|
|
|
else
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Insert rules into the source interface's forward chain
|
|
|
|
#
|
|
|
|
# We insert them after any blacklist rules
|
|
|
|
#
|
2002-10-01 23:46:48 +02:00
|
|
|
eval source_hosts=\"\$${z1}_hosts\"
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
for h in $source_hosts; do
|
|
|
|
iface=${h%:*}
|
|
|
|
hosts=${h#*:}
|
|
|
|
|
2002-10-02 01:49:17 +02:00
|
|
|
base=`chain_base $iface`
|
2002-10-02 00:27:19 +02:00
|
|
|
|
|
|
|
eval rulenum=\$${base}_rulenum
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-02 01:43:03 +02:00
|
|
|
if [ -z "$rulenum" ]; then
|
|
|
|
if list_search $iface $blacklist_interfaces; then
|
|
|
|
rulenum=3
|
|
|
|
else
|
|
|
|
rulenum=2
|
|
|
|
fi
|
|
|
|
fi
|
2002-10-02 00:27:19 +02:00
|
|
|
|
2002-10-01 23:46:48 +02:00
|
|
|
if [ "$iface" != "$interface" -o "$hosts" != "$host" ]; then
|
2002-10-02 00:27:19 +02:00
|
|
|
do_iptables -I `forward_chain $iface` $rulenum -s $hosts -o $interface -d $host -j $chain
|
|
|
|
rulenum=$(($rulenum + 1))
|
2002-10-01 22:54:42 +02:00
|
|
|
fi
|
2002-10-02 00:27:19 +02:00
|
|
|
|
|
|
|
eval ${base}_rulenum=$rulenum
|
2002-10-01 22:54:42 +02:00
|
|
|
done
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done < ${STATEDIR}/chains
|
|
|
|
|
2003-04-18 05:09:51 +02:00
|
|
|
rm -rf $TMP_DIR
|
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
echo "$1 added to zone $2"
|
2003-02-23 15:10:37 +01:00
|
|
|
}
|
2002-10-01 22:54:42 +02:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Delete a host or subnet from a zone
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
delete_from_zone() # $1 = <interface>[:<hosts>] $2 = zone
|
|
|
|
{
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Delete the subnect host(s) from the zone state file
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
delete_from_zones_file()
|
|
|
|
{
|
|
|
|
> ${STATEDIR}/zones_$$
|
|
|
|
|
|
|
|
while read z hosts; do
|
|
|
|
if [ "$z" = "$zone" ]; then
|
|
|
|
temp=$hosts
|
|
|
|
hosts=
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
for h in $temp; do
|
2002-10-02 00:27:19 +02:00
|
|
|
if [ "$h" = "$delhost" ]; then
|
2002-10-01 22:54:42 +02:00
|
|
|
echo Yes
|
|
|
|
else
|
|
|
|
hosts="$hosts $h"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
fi
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
echo "$z $hosts" >> ${STATEDIR}/zones_$$
|
|
|
|
done < ${STATEDIR}/zones
|
|
|
|
|
|
|
|
mv -f ${STATEDIR}/zones_$$ ${STATEDIR}/zones
|
|
|
|
}
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Isolate interface and host parts
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
interface=${1%:*}
|
|
|
|
host=${1#*:}
|
|
|
|
|
|
|
|
[ -z "$host" ] && host="0.0.0.0/0"
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Load $zones
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
determine_zones
|
|
|
|
|
|
|
|
zone=$2
|
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
validate_zone $zone || startup_error "Unknown zone: $zone"
|
2002-10-01 22:54:42 +02:00
|
|
|
|
2003-02-08 21:58:44 +01:00
|
|
|
[ "$zone" = $FW ] && startup_error "Can't remove $1 from firewall zone"
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Be sure that Shorewall has been restarted using a DZ-aware version of the code
|
|
|
|
#
|
2003-02-08 21:58:44 +01:00
|
|
|
[ -f ${STATEDIR}/chains ] || startup_error "${STATEDIR}/chains -- file not found"
|
|
|
|
[ -f ${STATEDIR}/zones ] || startup_error "${STATEDIR}/zones -- file not found"
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Be sure that the interface was present at last [re]start
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
if ! chain_exists `input_chain $interface` ; then
|
2003-02-08 21:58:44 +01:00
|
|
|
startup_error "Unknown interface $interface"
|
2002-10-01 22:54:42 +02:00
|
|
|
fi
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Normalize the first argument to this function
|
|
|
|
#
|
2002-10-02 00:27:19 +02:00
|
|
|
delhost="$interface:$host"
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Delete the passed hosts from the zone state file
|
|
|
|
#
|
2002-10-02 01:58:48 +02:00
|
|
|
[ -z "`delete_from_zones_file`" ] && \
|
|
|
|
error_message "Warning: $1 does not appear to be in zone $2"
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Construct the zone host maps
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
while read z hosts; do
|
2002-10-01 23:46:48 +02:00
|
|
|
eval ${z}_hosts=\"$hosts\"
|
2002-10-01 22:54:42 +02:00
|
|
|
done < ${STATEDIR}/zones
|
2003-02-23 15:22:14 +01:00
|
|
|
|
|
|
|
terminator=fatal_error
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Delete any nat table entries for the host(s)
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
qt iptables -t nat -D PREROUTING -i $interface -s $host -j ${zone}_dnat
|
2002-10-02 03:24:57 +02:00
|
|
|
#
|
|
|
|
# Delete rules rules the input chains for the passed interface
|
|
|
|
#
|
2002-10-01 22:54:42 +02:00
|
|
|
while read z1 z2 chain; do
|
|
|
|
if [ "$z1" = "$zone" ]; then
|
|
|
|
if [ "$z2" = "$FW" ]; then
|
2003-02-23 15:10:37 +01:00
|
|
|
qt iptables -D `input_chain $interface` -s $host -j $chain
|
2002-10-01 22:54:42 +02:00
|
|
|
else
|
|
|
|
source_chain=`forward_chain $interface`
|
2002-10-01 23:46:48 +02:00
|
|
|
eval dest_hosts=\"\$${z2}_hosts\"
|
2002-10-01 22:54:42 +02:00
|
|
|
|
2002-10-02 00:27:19 +02:00
|
|
|
for h in $dest_hosts $delhost; do
|
2002-10-01 23:46:48 +02:00
|
|
|
iface=${h%:*}
|
|
|
|
hosts=${h#*:}
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-01 23:46:48 +02:00
|
|
|
if [ "$iface" != "$interface" -o "$hosts" != "$host" ]; then
|
|
|
|
qt iptables -D $source_chain -s $host -o $iface -d $hosts -j $chain
|
|
|
|
fi
|
2002-10-01 22:54:42 +02:00
|
|
|
done
|
|
|
|
fi
|
|
|
|
elif [ "$z2" = "$zone" ]; then
|
|
|
|
if [ "$z1" = "$FW" ]; then
|
|
|
|
qt iptables -D OUTPUT -o $interface -d $host -j $chain
|
|
|
|
else
|
2002-10-01 23:46:48 +02:00
|
|
|
eval source_hosts=\"\$${z1}_hosts\"
|
2003-04-21 17:12:59 +02:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
for h in $source_hosts; do
|
|
|
|
iface=${h%:*}
|
|
|
|
hosts=${h#*:}
|
|
|
|
|
2002-10-01 23:46:48 +02:00
|
|
|
if [ "$iface" != "$interface" -o "$hosts" != "$host" ]; then
|
2002-10-01 22:54:42 +02:00
|
|
|
qt iptables -D `forward_chain $iface` -s $hosts -o $interface -d $host -j $chain
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done < ${STATEDIR}/chains
|
|
|
|
|
2003-04-18 05:09:51 +02:00
|
|
|
rm -rf $TMP_DIR
|
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
echo "$1 removed from zone $2"
|
2003-02-23 15:10:37 +01:00
|
|
|
}
|
2002-10-01 22:54:42 +02:00
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Determine the value for a parameter that defaults to Yes
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
added_param_value_yes() # $1 = Parameter Name, $2 = Parameter value
|
|
|
|
{
|
|
|
|
local val="$2"
|
|
|
|
|
|
|
|
if [ -z "$val" ]; then
|
|
|
|
echo "Yes"
|
|
|
|
else case $val in
|
2002-07-06 00:24:40 +02:00
|
|
|
[Yy][Ee][Ss])
|
2002-05-01 01:13:15 +02:00
|
|
|
echo "Yes"
|
|
|
|
;;
|
|
|
|
[Nn][Oo])
|
|
|
|
echo ""
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
startup_error "Invalid value ($val) for $1"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Determine the value for a parameter that defaults to No
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
added_param_value_no() # $1 = Parameter Name, $2 = Parameter value
|
|
|
|
{
|
|
|
|
local val="$2"
|
|
|
|
|
|
|
|
if [ -z "$val" ]; then
|
|
|
|
echo ""
|
|
|
|
else case $val in
|
2002-07-06 00:24:40 +02:00
|
|
|
[Yy][Ee][Ss])
|
2002-05-01 01:13:15 +02:00
|
|
|
echo "Yes"
|
|
|
|
;;
|
|
|
|
[Nn][Oo])
|
|
|
|
echo ""
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
startup_error "Invalid value ($val) for $1"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Initialize this program
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
do_initialize() {
|
2003-07-01 22:29:01 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
# Run all utility programs using the C locale
|
|
|
|
#
|
|
|
|
# Thanks to Vincent Planchenault for this tip #
|
|
|
|
|
|
|
|
export LC_ALL=C
|
|
|
|
|
|
|
|
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
2003-02-23 15:10:37 +01:00
|
|
|
# Establish termination function
|
|
|
|
#
|
|
|
|
terminator=startup_error
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
# Clear all configuration variables
|
|
|
|
#
|
|
|
|
version=
|
|
|
|
FW=
|
|
|
|
SUBSYSLOCK=
|
|
|
|
STATEDIR=
|
2003-02-08 21:58:44 +01:00
|
|
|
ALLOWRELATED=Yes
|
2002-05-01 01:13:15 +02:00
|
|
|
LOGRATE=
|
|
|
|
LOGBURST=
|
|
|
|
LOGPARMS=
|
2003-08-22 17:27:08 +02:00
|
|
|
LOGLIMIT=
|
2002-05-01 01:13:15 +02:00
|
|
|
ADD_IP_ALIASES=
|
|
|
|
ADD_SNAT_ALIASES=
|
|
|
|
TC_ENABLED=
|
|
|
|
LOGUNCLEAN=
|
|
|
|
BLACKLIST_DISPOSITION=
|
|
|
|
BLACKLIST_LOGLEVEL=
|
|
|
|
CLAMPMSS=
|
|
|
|
ROUTE_FILTER=
|
|
|
|
NAT_BEFORE_RULES=
|
2002-07-09 23:21:28 +02:00
|
|
|
DETECT_DNAT_IPADDRS=
|
2002-07-24 05:47:34 +02:00
|
|
|
MUTEX_TIMEOUT=
|
2002-08-23 20:51:55 +02:00
|
|
|
NEWNOTSYN=
|
2002-08-06 20:45:13 +02:00
|
|
|
LOGNEWNOTSYN=
|
2002-08-12 19:33:05 +02:00
|
|
|
FORWARDPING=
|
2002-10-22 20:07:52 +02:00
|
|
|
MACLIST_DISPOSITION=
|
|
|
|
MACLIST_LOG_LEVEL=
|
2002-11-10 22:34:20 +01:00
|
|
|
TCP_FLAGS_DISPOSITION=
|
|
|
|
TCP_FLAGS_LOG_LEVEL=
|
2002-12-13 04:23:46 +01:00
|
|
|
RFC1918_LOG_LEVEL=
|
2002-12-16 20:25:20 +01:00
|
|
|
MARK_IN_FORWARD_CHAIN=
|
2003-02-08 21:58:44 +01:00
|
|
|
SHARED_DIR=/usr/share/shorewall
|
2003-01-07 00:01:23 +01:00
|
|
|
FUNCTIONS=
|
|
|
|
VERSION_FILE=
|
2003-05-21 23:36:05 +02:00
|
|
|
LOGFORMAT=
|
2003-05-27 19:42:12 +02:00
|
|
|
LOGRULENUMBERS=
|
2003-07-30 01:04:04 +02:00
|
|
|
ADMINISABSENTMINDED=
|
2003-10-11 18:06:00 +02:00
|
|
|
BLACKLISTNEWONLY=
|
2003-12-01 17:10:08 +01:00
|
|
|
MODULE_SUFFIX=
|
2003-12-04 03:01:08 +01:00
|
|
|
ACTIONS=
|
2003-01-07 00:01:23 +01:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
stopping=
|
|
|
|
have_mutex=
|
|
|
|
masq_seq=1
|
2002-05-18 15:45:23 +02:00
|
|
|
nonat_seq=1
|
2002-07-23 18:26:45 +02:00
|
|
|
aliases_to_add=
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
TMP_DIR=/tmp/shorewall-$$
|
|
|
|
rm -rf $TMP_DIR
|
|
|
|
mkdir -p $TMP_DIR && chmod 700 $TMP_DIR || \
|
|
|
|
startup_error "Can't create $TMP_DIR"
|
|
|
|
|
|
|
|
trap "rm -rf $TMP_DIR; my_mutex_off; exit 2" 1 2 3 4 5 6 9
|
|
|
|
|
2003-03-08 18:55:34 +01:00
|
|
|
FUNCTIONS=$SHARED_DIR/functions
|
|
|
|
|
|
|
|
if [ -f $FUNCTIONS ]; then
|
2003-07-05 19:55:43 +02:00
|
|
|
echo "Loading $FUNCTIONS..."
|
2003-03-08 18:55:34 +01:00
|
|
|
. $FUNCTIONS
|
2003-03-07 00:21:25 +01:00
|
|
|
else
|
2003-03-08 18:55:34 +01:00
|
|
|
startup_error "$FUNCTIONS does not exist!"
|
2003-03-07 00:21:25 +01:00
|
|
|
fi
|
|
|
|
|
2003-03-08 19:01:32 +01:00
|
|
|
VERSION_FILE=$SHARED_DIR/version
|
|
|
|
|
|
|
|
[ -f $VERSION_FILE ] && version=`cat $VERSION_FILE`
|
|
|
|
|
2003-03-08 18:55:34 +01:00
|
|
|
run_user_exit params
|
2003-03-07 00:21:25 +01:00
|
|
|
|
2003-03-08 18:55:34 +01:00
|
|
|
config=`find_file shorewall.conf`
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2003-01-07 00:01:23 +01:00
|
|
|
if [ -f $config ]; then
|
2003-03-07 00:21:25 +01:00
|
|
|
echo "Processing $config..."
|
2003-01-07 00:01:23 +01:00
|
|
|
. $config
|
|
|
|
else
|
|
|
|
echo "$config does not exist!" >&2
|
|
|
|
exit 2
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
2003-07-22 16:25:36 +02:00
|
|
|
#
|
|
|
|
# Determine the capabilities of the installed iptables/netfilter
|
|
|
|
#
|
|
|
|
determine_capabilities
|
2002-05-01 01:13:15 +02:00
|
|
|
|
|
|
|
[ -z "${STATEDIR}" ] && STATEDIR=/var/state/shorewall
|
|
|
|
|
|
|
|
[ -d $STATEDIR ] || mkdir -p $STATEDIR
|
|
|
|
|
|
|
|
[ -z "$FW" ] && FW=fw
|
|
|
|
|
|
|
|
ALLOWRELATED="`added_param_value_yes ALLOWRELATED $ALLOWRELATED`"
|
2003-02-08 21:58:44 +01:00
|
|
|
[ -n "$ALLOWRELATED" ] || \
|
|
|
|
startup_error "ALLOWRELATED=No is not supported"
|
2002-05-01 01:13:15 +02:00
|
|
|
ADD_IP_ALIASES="`added_param_value_yes ADD_IP_ALIASES $ADD_IP_ALIASES`"
|
|
|
|
TC_ENABLED="`added_param_value_yes TC_ENABLED $TC_ENABLED`"
|
|
|
|
|
|
|
|
if [ -n "${LOGRATE}${LOGBURST}" ]; then
|
2003-08-22 17:27:08 +02:00
|
|
|
LOGLIMIT="--match limit"
|
|
|
|
[ -n "$LOGRATE" ] && LOGLIMIT="$LOGLIMIT --limit $LOGRATE"
|
|
|
|
[ -n "$LOGBURST" ] && LOGLIMIT="$LOGLIMIT --limit-burst $LOGBURST"
|
2002-05-01 01:13:15 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$IP_FORWARDING" ]; then
|
|
|
|
case "$IP_FORWARDING" in
|
|
|
|
[Oo][Nn]|[Oo][Ff][Ff]|[Kk][Ee][Ee][Pp])
|
2002-07-06 00:24:40 +02:00
|
|
|
;;
|
|
|
|
*)
|
2002-05-01 01:13:15 +02:00
|
|
|
startup_error "Invalid value ($IP_FORWARDING) for IP_FORWARDING"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
else
|
|
|
|
IP_FORWARDING=On
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "$TC_ENABLED" -a -z "$MANGLE_ENABLED" ]; then
|
|
|
|
startup_error "Traffic Control requires Mangle"
|
|
|
|
fi
|
|
|
|
|
|
|
|
[ -z "$BLACKLIST_DISPOSITION" ] && BLACKLIST_DISPOSITION=DROP
|
|
|
|
|
|
|
|
CLAMPMSS=`added_param_value_no CLAMPMSS $CLAMPMSS`
|
|
|
|
ADD_SNAT_ALIASES=`added_param_value_no ADD_SNAT_ALIASES $ADD_SNAT_ALIASES`
|
|
|
|
ROUTE_FILTER=`added_param_value_no ROUTE_FILTER $ROUTE_FILTER`
|
|
|
|
NAT_BEFORE_RULES=`added_param_value_yes NAT_BEFORE_RULES $NAT_BEFORE_RULES`
|
2002-07-09 23:21:28 +02:00
|
|
|
DETECT_DNAT_IPADDRS=`added_param_value_no DETECT_DNAT_IPADDRS $DETECT_DNAT_IPADDRS`
|
2002-08-12 19:33:05 +02:00
|
|
|
FORWARDPING=`added_param_value_no FORWARDPING $FORWARDPING`
|
2003-02-08 21:58:44 +01:00
|
|
|
[ -n "$FORWARDPING" ] && \
|
|
|
|
startup_error "FORWARDPING=Yes is no longer supported"
|
|
|
|
|
2002-08-23 20:51:55 +02:00
|
|
|
NEWNOTSYN=`added_param_value_yes NEWNOTSYN $NEWNOTSYN`
|
2002-10-22 20:07:52 +02:00
|
|
|
|
2003-06-12 01:57:35 +02:00
|
|
|
maclist_target=reject
|
2003-02-23 15:10:37 +01:00
|
|
|
|
2002-10-22 20:07:52 +02:00
|
|
|
if [ -n "$MACLIST_DISPOSITION" ] ; then
|
|
|
|
case $MACLIST_DISPOSITION in
|
|
|
|
REJECT)
|
|
|
|
;;
|
|
|
|
ACCEPT|DROP)
|
|
|
|
maclist_target=$MACLIST_DISPOSITION
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
startup_error "Invalid value ($MACLIST_DISPOSITION) for MACLIST_DISPOSITION"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
else
|
2003-06-12 01:57:35 +02:00
|
|
|
MACLIST_DISPOSITION=REJECT
|
2002-10-22 20:07:52 +02:00
|
|
|
fi
|
|
|
|
|
2002-11-10 22:34:20 +01:00
|
|
|
if [ -n "$TCP_FLAGS_DISPOSITION" ] ; then
|
|
|
|
case $TCP_FLAGS_DISPOSITION in
|
|
|
|
REJECT|ACCEPT|DROP)
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
startup_error "Invalid value ($TCP_FLAGS_DISPOSITION) for TCP_FLAGS_DISPOSITION"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
else
|
|
|
|
TCP_FLAGS_DISPOSITION=DROP
|
|
|
|
fi
|
|
|
|
|
2002-12-13 04:23:46 +01:00
|
|
|
[ -z "$RFC1918_LOG_LEVEL" ] && RFC1918_LOG_LEVEL=info
|
2002-12-16 20:25:20 +01:00
|
|
|
MARK_IN_FORWARD_CHAIN=`added_param_value_no MARK_IN_FORWARD_CHAIN $MARK_IN_FORWARD_CHAIN`
|
2002-12-19 00:56:34 +01:00
|
|
|
[ -n "$MARK_IN_FORWARD_CHAIN" ] && marking_chain=tcfor || marking_chain=tcpre
|
2002-12-31 17:04:31 +01:00
|
|
|
if [ -n "$TC_ENABLED" ]; then
|
|
|
|
CLEAR_TC=`added_param_value_yes CLEAR_TC $CLEAR_TC`
|
|
|
|
else
|
|
|
|
CLEAR_TC=
|
|
|
|
fi
|
2003-05-27 19:42:12 +02:00
|
|
|
|
2003-05-22 22:37:24 +02:00
|
|
|
if [ -n "$LOGFORMAT" ]; then
|
2003-05-27 19:49:13 +02:00
|
|
|
if [ -n "`echo $LOGFORMAT | grep '%d'`" ]; then
|
|
|
|
LOGRULENUMBERS=Yes
|
2003-05-28 21:20:23 +02:00
|
|
|
temp=`printf "$LOGFORMAT" fooxx 1 barxx 2> /dev/null`
|
|
|
|
if [ $? -ne 0 ]; then
|
2003-05-27 19:49:13 +02:00
|
|
|
startup_error "Invalid LOGFORMAT string: \"$LOGFORMAT\""
|
|
|
|
fi
|
|
|
|
else
|
2003-05-28 21:20:23 +02:00
|
|
|
temp=`printf "$LOGFORMAT" fooxx barxx 2> /dev/null`
|
|
|
|
if [ $? -ne 0 ]; then
|
2003-05-27 19:49:13 +02:00
|
|
|
startup_error "Invalid LOGFORMAT string: \"$LOGFORMAT\""
|
|
|
|
fi
|
2003-05-22 22:37:24 +02:00
|
|
|
fi
|
2003-05-28 21:20:23 +02:00
|
|
|
|
|
|
|
if [ ${#temp} -gt 29 ]; then
|
|
|
|
startup_error "LOGFORMAT string is too long: \"$LOGFORMAT\""
|
|
|
|
fi
|
2003-05-22 22:37:24 +02:00
|
|
|
else
|
2003-05-27 19:42:12 +02:00
|
|
|
LOGFORMAT="Shorewall:%s:%s:"
|
2003-05-22 22:37:24 +02:00
|
|
|
fi
|
2003-07-30 01:04:04 +02:00
|
|
|
ADMINISABSENTMINDED=`added_param_value_no ADMINISABSENTMINDED $ADMINISABSENTMINDED`
|
2003-10-11 18:06:00 +02:00
|
|
|
BLACKLISTNEWONLY=`added_param_value_no BLACKLISTNEWONLY $BLACKLISTNEWONLY`
|
2003-12-01 17:10:08 +01:00
|
|
|
[ -n "$MODULE_SUFFIX" ] || MODULE_SUFFIX="o gz ko o.gz"
|
|
|
|
|
2003-01-07 00:01:23 +01:00
|
|
|
#
|
|
|
|
# Strip the files that we use often
|
|
|
|
#
|
|
|
|
strip_file interfaces
|
|
|
|
strip_file hosts
|
2003-06-27 23:02:52 +02:00
|
|
|
#
|
2003-07-01 22:29:01 +02:00
|
|
|
# Check out the user's shell
|
|
|
|
#
|
|
|
|
[ -n "$SHOREWALL_SHELL" ] || SHOREWALL_SHELL=/bin/sh
|
2003-06-27 23:02:52 +02:00
|
|
|
|
2003-07-01 22:29:01 +02:00
|
|
|
temp=`decodeaddr 192.168.1.1`
|
2003-07-04 17:08:29 +02:00
|
|
|
if [ `encodeaddr $temp` != 192.168.1.1 ]; then
|
2003-07-01 22:29:01 +02:00
|
|
|
startup_error "Shell $SHOREWALL_SHELL is broken and may not be used with Shorewall"
|
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# Give Usage Information
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
usage() {
|
2002-10-01 22:54:42 +02:00
|
|
|
echo "Usage: $0 [debug] {start|stop|reset|restart|status|refresh|clear|{add|delete} <interface>[:hosts] zone}}"
|
2002-05-01 01:13:15 +02:00
|
|
|
exit 1
|
|
|
|
}
|
|
|
|
|
2002-10-23 18:48:40 +02:00
|
|
|
#
|
|
|
|
# E X E C U T I O N B E G I N S H E R E
|
|
|
|
#
|
2002-05-01 01:13:15 +02:00
|
|
|
#
|
|
|
|
# Start trace if first arg is "debug"
|
|
|
|
#
|
|
|
|
[ $# -gt 1 ] && [ "$1" = "debug" ] && { set -x ; shift ; }
|
|
|
|
|
|
|
|
nolock=
|
|
|
|
|
|
|
|
[ $# -gt 1 ] && [ "$1" = "nolock" ] && { nolock=Yes; shift ; }
|
|
|
|
|
2002-07-30 01:53:26 +02:00
|
|
|
trap "my_mutex_off; exit 2" 1 2 3 4 5 6 9
|
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
command="$1"
|
|
|
|
|
|
|
|
case "$command" in
|
|
|
|
stop)
|
2002-10-01 22:54:42 +02:00
|
|
|
[ $# -ne 1 ] && usage
|
2002-05-01 01:13:15 +02:00
|
|
|
do_initialize
|
|
|
|
my_mutex_on
|
2003-07-28 19:32:41 +02:00
|
|
|
#
|
|
|
|
# Don't want to do a 'stop' when startup is disabled
|
|
|
|
#
|
|
|
|
check_disabled_startup
|
2002-05-01 01:13:15 +02:00
|
|
|
echo -n "Stopping Shorewall..."
|
|
|
|
stop_firewall
|
|
|
|
[ -n "$SUBSYSLOCK" ] && rm -f $SUBSYSLOCK
|
|
|
|
echo "done."
|
|
|
|
my_mutex_off
|
|
|
|
;;
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
start)
|
2002-10-01 22:54:42 +02:00
|
|
|
[ $# -ne 1 ] && usage
|
2002-05-01 01:13:15 +02:00
|
|
|
do_initialize
|
|
|
|
my_mutex_on
|
|
|
|
if qt iptables -L shorewall -n ; then
|
|
|
|
[ -n "$SUBSYSLOCK" ] && touch $SUBSYSLOCK
|
|
|
|
echo "Shorewall Already Started"
|
2002-09-29 23:28:44 +02:00
|
|
|
[ -n "$TMP_DIR" ] && rm -rf $TMP_DIR
|
2002-05-01 01:13:15 +02:00
|
|
|
my_mutex_off
|
|
|
|
exit 0;
|
|
|
|
fi
|
|
|
|
define_firewall "Start" && [ -n "$SUBSYSLOCK" ] && touch $SUBSYSLOCK
|
2002-05-18 15:45:23 +02:00
|
|
|
my_mutex_off
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
restart)
|
2002-10-01 22:54:42 +02:00
|
|
|
[ $# -ne 1 ] && usage
|
2002-05-01 01:13:15 +02:00
|
|
|
do_initialize
|
|
|
|
my_mutex_on
|
|
|
|
if qt iptables -L shorewall -n ; then
|
|
|
|
define_firewall "Restart"
|
|
|
|
else
|
|
|
|
echo "Shorewall Not Currently Running"
|
|
|
|
define_firewall "Start"
|
|
|
|
fi
|
|
|
|
|
|
|
|
[ $? -eq 0 ] && [ -n "$SUBSYSLOCK" ] && touch $SUBSYSLOCK
|
|
|
|
my_mutex_off
|
|
|
|
;;
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
status)
|
2002-10-01 22:54:42 +02:00
|
|
|
[ $# -ne 1 ] && usage
|
2002-11-11 00:15:53 +01:00
|
|
|
echo "Shorewall-$version Status at $HOSTNAME - `date`"
|
|
|
|
echo
|
2002-05-01 01:13:15 +02:00
|
|
|
iptables -L -n -v
|
|
|
|
;;
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
reset)
|
2002-10-01 22:54:42 +02:00
|
|
|
[ $# -ne 1 ] && usage
|
2002-10-30 16:56:46 +01:00
|
|
|
do_initialize
|
|
|
|
my_mutex_on
|
|
|
|
if ! qt iptables -L shorewall -n ; then
|
|
|
|
echo "Shorewall Not Started"
|
|
|
|
[ -n "$TMP_DIR" ] && rm -rf $TMP_DIR
|
|
|
|
my_mutex_off
|
|
|
|
exit 2;
|
|
|
|
fi
|
|
|
|
iptables -Z
|
|
|
|
iptables -t nat -Z
|
|
|
|
iptables -t mangle -Z
|
2002-05-03 00:56:27 +02:00
|
|
|
report "Shorewall Counters Reset"
|
2002-09-29 23:08:25 +02:00
|
|
|
date > $STATEDIR/restarted
|
2002-10-30 16:56:46 +01:00
|
|
|
my_mutex_off
|
2002-05-01 01:13:15 +02:00
|
|
|
;;
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
refresh)
|
2002-10-01 22:54:42 +02:00
|
|
|
[ $# -ne 1 ] && usage
|
2002-05-01 01:13:15 +02:00
|
|
|
do_initialize
|
|
|
|
my_mutex_on
|
|
|
|
if ! qt iptables -L shorewall -n ; then
|
|
|
|
echo "Shorewall Not Started"
|
2002-09-29 23:28:44 +02:00
|
|
|
[ -n "$TMP_DIR" ] && rm -rf $TMP_DIR
|
2002-05-01 01:13:15 +02:00
|
|
|
my_mutex_off
|
|
|
|
exit 2;
|
2002-07-06 00:24:40 +02:00
|
|
|
fi
|
2002-05-01 01:13:15 +02:00
|
|
|
refresh_firewall;
|
|
|
|
my_mutex_off
|
|
|
|
;;
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
clear)
|
2002-10-01 22:54:42 +02:00
|
|
|
[ $# -ne 1 ] && usage
|
2002-05-01 01:13:15 +02:00
|
|
|
do_initialize
|
|
|
|
my_mutex_on
|
|
|
|
echo -n "Clearing Shorewall..."
|
|
|
|
clear_firewall
|
|
|
|
[ -n "$SUBSYSLOCK" ] && rm -f $SUBSYSLOCK
|
|
|
|
echo "done."
|
|
|
|
my_mutex_off
|
|
|
|
;;
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2003-02-27 23:28:06 +01:00
|
|
|
check)
|
|
|
|
[ $# -ne 1 ] && usage
|
|
|
|
do_initialize
|
|
|
|
check_config
|
|
|
|
;;
|
2003-03-24 22:56:31 +01:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
add)
|
|
|
|
[ $# -ne 3 ] && usage
|
|
|
|
do_initialize
|
|
|
|
my_mutex_on
|
|
|
|
if ! qt iptables -L shorewall -n ; then
|
|
|
|
echo "Shorewall Not Started"
|
|
|
|
[ -n "$TMP_DIR" ] && rm -rf $TMP_DIR
|
|
|
|
my_mutex_off
|
|
|
|
exit 2;
|
|
|
|
fi
|
|
|
|
add_to_zone $2 $3
|
|
|
|
my_mutex_off
|
|
|
|
;;
|
2002-11-03 16:42:23 +01:00
|
|
|
|
2002-10-01 22:54:42 +02:00
|
|
|
delete)
|
|
|
|
[ $# -ne 3 ] && usage
|
|
|
|
do_initialize
|
|
|
|
my_mutex_on
|
|
|
|
if ! qt iptables -L shorewall -n ; then
|
|
|
|
echo "Shorewall Not Started"
|
|
|
|
[ -n "$TMP_DIR" ] && rm -rf $TMP_DIR
|
|
|
|
my_mutex_off
|
|
|
|
exit 2;
|
|
|
|
fi
|
|
|
|
delete_from_zone $2 $3
|
|
|
|
my_mutex_off
|
|
|
|
;;
|
2002-11-03 16:42:23 +01:00
|
|
|
|
2003-07-05 19:55:43 +02:00
|
|
|
call)
|
|
|
|
#
|
|
|
|
# Undocumented way to call functions in /usr/share/shorewall/firewall directly
|
|
|
|
#
|
|
|
|
shift;
|
|
|
|
do_initialize
|
2003-07-05 21:52:34 +02:00
|
|
|
EMPTY=
|
2003-07-05 19:55:43 +02:00
|
|
|
$@
|
|
|
|
;;
|
2002-05-01 01:13:15 +02:00
|
|
|
*)
|
|
|
|
usage
|
|
|
|
;;
|
2002-05-30 14:55:47 +02:00
|
|
|
|
2002-05-01 01:13:15 +02:00
|
|
|
esac
|