Next IPv6 Installment

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@8940 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2008-12-07 22:44:29 +00:00
parent 692e83c1c8
commit 64fd8cd1f3
3 changed files with 168 additions and 96 deletions

View File

@ -690,13 +690,13 @@ sub use_input_chain($) {
#
# Interface associated with a single zone -- use the zone's input chain if it has one
#
my $chainref = $filter_table->{zone_input_chain $interfaceref->{zone4}};
my $chainref = $filter_table->{zone_input_chain $interfaceref->{zone}};
return 0 if $chainref;
#
# Use the '<zone>2fw' chain if it is referenced.
#
$chainref = $filter_table->{join( '' , $interfaceref->{zone4} , '2' , firewall_zone )};
$chainref = $filter_table->{join( '' , $interfaceref->{zone} , '2' , firewall_zone )};
! ( $chainref->{referenced} || $chainref->{is_policy} )
}
@ -734,13 +734,13 @@ sub use_output_chain($) {
#
# Interface associated with a single zone -- use the zone's output chain if it has one
#
my $chainref = $filter_table->{zone_output_chain $interfaceref->{zone4}};
my $chainref = $filter_table->{zone_output_chain $interfaceref->{zone}};
return 0 if $chainref;
#
# Use the 'fw2<zone>' chain if it is referenced.
#
$chainref = $filter_table->{join( '', firewall_zone , '2', $interfaceref->{zone4} )};
$chainref = $filter_table->{join( '', firewall_zone , '2', $interfaceref->{zone} )};
! ( $chainref->{referenced} || $chainref->{is_policy} )
}

View File

@ -797,13 +797,15 @@ sub compiler {
#
determine_zones;
#
# Process the interfaces file.
# Process the interfaces file(s).
#
validate_interfaces_file ( $export );
validate_interfaces_file ( 'interfaces', $export );
#
# Process the hosts file.
#
validate_hosts_file;
my $ipsec = validate_hosts_file( 'hosts' );
$capabilities{POLICY_MATCH} = '' unless $ipsec || haveipseczones;
#
# Report zone contents
#

View File

@ -47,6 +47,7 @@ our @EXPORT = qw( NOTHING
all_zones
complex_zones
non_firewall_zones
haveipseczones
single_interface
validate_interfaces_file
all_interfaces
@ -93,6 +94,7 @@ use constant { NOTHING => 'NOTHING',
# children => [ <children> ]
# interfaces => [ <interfaces> ]
# bridge => <bridge>
# family => 1 = IPv4, 2 = IPv6, 3 = firewall
# hosts { <type> } => [ { <interface1> => { ipsec => 'ipsec'|'none'
# options => { <option1> => <value1>
# ...
@ -127,7 +129,7 @@ our %reservedName = ( all => 1,
# options => { <option1> = <val1> ,
# ...
# }
# zone4 => <zone name>
# zone => <zone name>
# nets => <number of nets in interface/hosts records referring to this interface>
# bridge => <bridge>
# broadcasts => 'none', 'detect' or [ <addr1>, <addr2>, ... ]
@ -135,9 +137,32 @@ our %reservedName = ( all => 1,
# }
# }
#
our @interfaces;
our %interfaces;
our @bport_zones;
our @interfaces4;
our %interfaces4;
our @bport_zones4;
our @interfaces6;
our %interfaces6;
our @bport_zones6;
our $interface_list;
our $interface_table;
our $bport_zones;
our $zone_family;
sub use_ipv4_interfaces() {
$interface_list = \@interfaces4;
$interface_table = \%interfaces4;
$bport_zones = \@bport_zones4;
$zone_family = F_INET;
}
sub use_ipv6_interfaces() {
$interface_list = \@interfaces6;
$interface_table = \%interfaces6;
$bport_zones = \@bport_zones6;
$zone_family = F_INET6;
}
#
# Initialize globals -- we take this novel approach to globals initialization to allow
@ -153,9 +178,15 @@ sub initialize() {
%zones = ();
$firewall_zone = '';
@interfaces = ();
%interfaces = ();
@bport_zones = ();
@interfaces4 = ();
%interfaces4 = ();
@bport_zones4 = ();
@interfaces6 = ();
%interfaces6 = ();
@bport_zones6 = ();
use_ipv4_interfaces;
}
INIT {
@ -240,6 +271,7 @@ sub determine_zones()
my @z;
my $ipv4 = 0;
my $ipv6 = 0;
my $fn = open_file 'zones';
@ -262,28 +294,43 @@ sub determine_zones()
push @{$zones{$p}{children}}, $zone;
}
}
fatal_error "Invalid zone name ($zone)" unless "\L$zone" =~ /^[a-z]\w*$/ && length $zone <= $globals{MAXZONENAMELENGTH};
fatal_error "Invalid zone name ($zone)" if $reservedName{$zone} || $zone =~ /^all2|2all$/;
fatal_error( "Duplicate zone name ($zone)" ) if $zones{$zone};
$type = "ipv4" unless $type;
my $family = F_INET;
if ( $type =~ /ipv4/i ) {
$type = 'ipv4';
$ipv4 = 1;
} elsif ( $type =~ /ipv6/i ) {
$type = 'ipv6';
$ipv6 = 1;
$family = F_INET6;
} elsif ( $type =~ /^ipsec4?$/i ) {
$type = 'ipsec4';
} elsif ( $type =~ /^ipsec6$/i ) {
$type = 'ipsec6';
$family = F_INET6;
} elsif ( $type =~ /^bport4?$/i ) {
warning_message "Bridge Port zones should have a parent zone" unless @parents;
$type = 'bport4';
push @bport_zones, $zone;
push @bport_zones4, $zone;
} elsif ( $type =~ /^bport6$/i ) {
warning_message "Bridge Port zones should have a parent zone" unless @parents;
$type = 'bport6';
$family = F_INET6;
push @bport_zones6, $zone;
} elsif ( $type eq 'firewall' ) {
fatal_error 'Firewall zone may not be nested' if @parents;
fatal_error "Only one firewall zone may be defined ($zone)" if $firewall_zone;
$firewall_zone = $zone;
$ENV{FW} = $zone;
$type = "firewall";
$family = F_INET | F_INET6;
} elsif ( $type eq '-' ) {
$type = 'ipv4';
$ipv4 = 1;
@ -291,6 +338,10 @@ sub determine_zones()
fatal_error "Invalid zone type ($type)" ;
}
for ( @parents ) {
fatal_error "Incompatible Parent/Child Zones Types ($_)" unless $zones{$_}{family} == $family
}
for ( $options, $in_options, $out_options ) {
$_ = '' if $_ eq '-';
}
@ -299,10 +350,11 @@ sub determine_zones()
parents => \@parents,
exclusions => [],
bridge => '',
family => $family,
options => { in_out => parse_zone_option_list( $options || '', $type ) ,
in => parse_zone_option_list( $in_options || '', $type ) ,
out => parse_zone_option_list( $out_options || '', $type ) ,
complex => ($type eq 'ipsec4' || $options || $in_options || $out_options ? 1 : 0) ,
complex => ($type =~ /^ipsec/ || $options || $in_options || $out_options ? 1 : 0) ,
nested => @parents > 0 } ,
interfaces => {} ,
children => [] ,
@ -311,8 +363,8 @@ sub determine_zones()
push @z, $zone;
}
fatal_error "No firewall zone defined" unless $firewall_zone;
fatal_error "No IPv4 zones defined" unless $ipv4;
fatal_error "No firewall zone defined" unless $firewall_zone;
fatal_error "No IPv4 or IPv6 zones defined" unless $ipv4 || $ipv6;
my %ordered;
@ -340,7 +392,7 @@ sub determine_zones()
#
sub haveipseczones() {
for my $zoneref ( values %zones ) {
return 1 if $zoneref->{type} eq 'ipsec4';
return 1 if $zoneref->{type} =~ /^ipsec/;
}
0;
@ -384,7 +436,7 @@ sub zone_report()
}
unless ( $printed ) {
fatal_error "No bridge has been associated with zone $zone" if $type eq 'bport4' && ! $zoneref->{bridge};
fatal_error "No bridge has been associated with zone $zone" if $type =~ /^bport*/ && ! $zoneref->{bridge};
warning_message "*** $zone is an EMPTY ZONE ***" unless $type eq 'firewall';
}
@ -402,7 +454,7 @@ sub dump_zone_contents()
my $exclusions = $zoneref->{exclusions};
my $entry = "$zone $type";
$entry .= ":$zoneref->{bridge}" if $type eq 'bport4';
$entry .= ":$zoneref->{bridge}" if $type =~ /^bport/;
if ( $hostref ) {
for my $type ( sort keys %$hostref ) {
@ -455,7 +507,7 @@ sub add_group_to_zone($$$$$)
my $arrayref;
my $zoneref = $zones{$zone};
my $zonetype = $zoneref->{type};
my $ifacezone = $interfaces{$interface}{zone4};
my $ifacezone = $interface_table->{$interface}{zone};
$zoneref->{interfaces}{$interface} = 1;
@ -467,7 +519,7 @@ sub add_group_to_zone($$$$$)
$ifacezone = '' unless defined $ifacezone;
for my $host ( @$networks ) {
$interfaces{$interface}{nets}++;
$interface_table->{$interface}{nets}++;
fatal_error "Invalid Host List" unless defined $host and $host ne '';
@ -519,6 +571,7 @@ sub find_zone( $ ) {
my $zoneref = $zones{$zone};
fatal_error "Unknown zone ($zone)" unless $zoneref;
fatal_error "Zone has wrong address family" unless $zoneref->{family} & $zone_family;
$zoneref;
}
@ -528,19 +581,21 @@ sub zone_type( $ ) {
}
sub defined_zone( $ ) {
$zones{$_[0]};
my $zoneref = $zones{$_[0]};
$zoneref && $zoneref->{family} & $zone_family ? $zoneref : undef;
}
sub all_zones() {
@zones;
grep ( $zones{$_}{family} & $zone_family , @zones );
}
sub non_firewall_zones() {
grep ( $zones{$_}{type} ne 'firewall' , @zones );
grep ( $zones{$_}{type} ne 'firewall' , all_zones() );
}
sub complex_zones() {
grep( $zones{$_}{options}{complex} , @zones );
grep( $zones{$_}{options}{complex} , all_zones() );
}
sub firewall_zone() {
@ -551,9 +606,9 @@ sub firewall_zone() {
# Parse the interfaces file.
#
sub validate_interfaces_file( $ )
sub validate_interfaces_file( $$ )
{
my $export = shift;
my ( $filename, $export ) = @_;
my $num = 0;
use constant { SIMPLE_IF_OPTION => 1,
@ -565,27 +620,38 @@ sub validate_interfaces_file( $ )
IF_OPTION_ZONEONLY => 8 };
my %validoptions = (arp_filter => BINARY_IF_OPTION,
arp_ignore => ENUM_IF_OPTION,
blacklist => SIMPLE_IF_OPTION,
bridge => SIMPLE_IF_OPTION,
detectnets => OBSOLETE_IF_OPTION,
dhcp => SIMPLE_IF_OPTION,
maclist => SIMPLE_IF_OPTION,
logmartians => BINARY_IF_OPTION,
norfc1918 => SIMPLE_IF_OPTION,
nosmurfs => SIMPLE_IF_OPTION,
optional => SIMPLE_IF_OPTION,
proxyarp => BINARY_IF_OPTION,
routeback => SIMPLE_IF_OPTION + IF_OPTION_ZONEONLY,
routefilter => BINARY_IF_OPTION,
sourceroute => BINARY_IF_OPTION,
tcpflags => SIMPLE_IF_OPTION,
upnp => SIMPLE_IF_OPTION,
mss => NUMERIC_IF_OPTION,
);
my %validoptions = $zone_family == F_INET ? (arp_filter => BINARY_IF_OPTION,
arp_ignore => ENUM_IF_OPTION,
blacklist => SIMPLE_IF_OPTION,
bridge => SIMPLE_IF_OPTION,
detectnets => OBSOLETE_IF_OPTION,
dhcp => SIMPLE_IF_OPTION,
maclist => SIMPLE_IF_OPTION,
logmartians => BINARY_IF_OPTION,
norfc1918 => SIMPLE_IF_OPTION,
nosmurfs => SIMPLE_IF_OPTION,
optional => SIMPLE_IF_OPTION,
proxyarp => BINARY_IF_OPTION,
routeback => SIMPLE_IF_OPTION + IF_OPTION_ZONEONLY,
routefilter => BINARY_IF_OPTION,
sourceroute => BINARY_IF_OPTION,
tcpflags => SIMPLE_IF_OPTION,
upnp => SIMPLE_IF_OPTION,
mss => NUMERIC_IF_OPTION,
) :
(blacklist => SIMPLE_IF_OPTION,
bridge => SIMPLE_IF_OPTION,
maclist => SIMPLE_IF_OPTION,
nosmurfs => SIMPLE_IF_OPTION,
optional => SIMPLE_IF_OPTION,
proxyndp => BINARY_IF_OPTION,
routeback => SIMPLE_IF_OPTION + IF_OPTION_ZONEONLY,
sourceroute => BINARY_IF_OPTION,
tcpflags => SIMPLE_IF_OPTION,
mss => NUMERIC_IF_OPTION,
);
my $fn = open_file 'interfaces';
my $fn = open_file $filename;
my $first_entry = 1;
@ -608,6 +674,7 @@ sub validate_interfaces_file( $ )
$zoneref = $zones{$zone};
fatal_error "Unknown zone ($zone)" unless $zoneref;
fatal_error "Zone $zone has wrong address family" unless $zoneref->{family} == $zone_family;
fatal_error "Firewall zone not allowed in ZONE column of interface record" if $zoneref->{type} eq 'firewall';
}
@ -622,9 +689,9 @@ sub validate_interfaces_file( $ )
fatal_error qq("Virtual" interfaces are not supported -- see http://www.shorewall.net/Shorewall_and_Aliased_Interfaces.html) if $port =~ /^\d+$/;
require_capability( 'PHYSDEV_MATCH', 'Bridge Ports', '');
fatal_error "Your iptables is not recent enough to support bridge ports" unless $capabilities{KLUDGEFREE};
fatal_error "Duplicate Interface ($port)" if $interfaces{$port};
fatal_error "$interface is not a defined bridge" unless $interfaces{$interface} && $interfaces{$interface}{options}{bridge};
fatal_error "Bridge Ports may only be associated with 'bport' zones" if $zone && $zoneref->{type} ne 'bport4';
fatal_error "Duplicate Interface ($port)" if $interface_table->{$port};
fatal_error "$interface is not a defined bridge" unless $interface_table->{$interface} && $interface_table->{$interface}{options}{bridge};
fatal_error "Bridge Ports may only be associated with 'bport' zones" if $zone && ! $zoneref->{type} =~ /^bport/;
if ( $zone ) {
if ( $zoneref->{bridge} ) {
@ -643,8 +710,8 @@ sub validate_interfaces_file( $ )
$bridge = $interface;
$interface = $port;
} else {
fatal_error "Duplicate Interface ($interface)" if $interfaces{$interface};
fatal_error "Zones of type 'bport' may only be associated with bridge ports" if $zone && $zoneref->{type} eq 'bport4';
fatal_error "Duplicate Interface ($interface)" if $interface_table->{$interface};
fatal_error "Zones of type 'bport' may only be associated with bridge ports" if $zone && $zoneref->{type} =~ /^bport/;
$bridge = $interface;
}
@ -661,6 +728,7 @@ sub validate_interfaces_file( $ )
my $broadcasts;
unless ( $networks eq '' || $networks eq 'detect' ) {
fatal_error "BROADCAST may not be specified for IPv6 Interfaces" if $zone_family == F_INET6;
my @broadcasts = split $networks, 'address';
for my $address ( @broadcasts ) {
@ -736,21 +804,21 @@ sub validate_interfaces_file( $ )
$optionsref = \%options;
$interfaces{$interface} = { name => $interface ,
bridge => $bridge ,
nets => 0 ,
number => ++$num ,
root => $root ,
broadcasts => $broadcasts ,
options => $optionsref };
$interface_table->{$interface} = { name => $interface ,
bridge => $bridge ,
nets => 0 ,
number => ++$num ,
root => $root ,
broadcasts => $broadcasts ,
options => $optionsref };
push @ifaces, $interface;
my @networks = allip;
add_group_to_zone( $zone, $zoneref->{type}, $interface, \@networks, $optionsref ) if $zone;
$interfaces{$interface}{zone4} = $zone; #Must follow the call to add_group_to_zone()
$interface_table->{$interface}{zone} = $zone; #Must follow the call to add_group_to_zone()
progress_message " Interface \"$currentline\" Validated";
@ -760,24 +828,24 @@ sub validate_interfaces_file( $ )
# We now assemble the @interfaces array such that bridge ports immediately precede their associated bridge
#
for my $interface ( @ifaces ) {
my $interfaceref = $interfaces{$interface};
my $interfaceref = $interface_table->{$interface};
if ( $interfaceref->{options}{bridge} ) {
my @ports = grep $interfaces{$_}{options}{port} && $interfaces{$_}{bridge} eq $interface, @ifaces;
my @ports = grep $interface_table->{$_}{options}{port} && $interface_table->{$_}{bridge} eq $interface, @ifaces;
if ( @ports ) {
push @interfaces, @ports;
push @{$interface_list}, @ports;
} else {
$interfaceref->{options}{routeback} = 1; #so the bridge will work properly
}
}
push @interfaces, $interface unless $interfaceref->{options}{port};
push @{$interface_list}, $interface unless $interfaceref->{options}{port};
}
#
# Be sure that we have at least one interface
#
fatal_error "No network interfaces defined" unless @interfaces;
fatal_error "No network interfaces defined" unless @{$interface_list};
}
#
@ -788,19 +856,19 @@ sub validate_interfaces_file( $ )
sub known_interface($)
{
my $interface = $_[0];
my $interfaceref = $interfaces{$interface};
my $interfaceref = $interface_table->{$interface};
return $interfaceref if $interfaceref;
for my $i ( @interfaces ) {
$interfaceref = $interfaces{$i};
for my $i ( @{$interface_list} ) {
$interfaceref = $interface_table->{$i};
my $val = $interfaceref->{root};
next if $val eq $i;
if ( substr( $interface, 0, length $val ) eq $val ) {
#
# Cache this result for future reference. We set the 'name' to the name of the entry that appears in /etc/shorewall/interfaces.
#
return $interfaces{$interface} = { options => $interfaceref->{options}, bridge => $interfaceref->{bridge} , name => $i , number => $interfaceref->{number} };
return $interface_table->{$interface} = { options => $interfaceref->{options}, bridge => $interfaceref->{bridge} , name => $i , number => $interfaceref->{number} };
}
}
@ -811,14 +879,14 @@ sub known_interface($)
# Return interface number
#
sub interface_number( $ ) {
$interfaces{$_[0]}{number} || 256;
$interface_table->{$_[0]}{number} || 256;
}
#
# Return the interfaces list
#
sub all_interfaces() {
@interfaces;
@{$interface_list};
}
#
@ -826,7 +894,7 @@ sub all_interfaces() {
#
sub find_interface( $ ) {
my $interface = $_[0];
my $interfaceref = $interfaces{ $interface };
my $interfaceref = $interface_table->{ $interface };
fatal_error "Unknown Interface ($interface)" unless $interfaceref;
@ -837,7 +905,7 @@ sub find_interface( $ ) {
# Returns true if there are bridge port zones defined in the config
#
sub have_bridges() {
@bport_zones > 0;
@{$bport_zones} > 0;
}
#
@ -845,7 +913,7 @@ sub have_bridges() {
# return ''
#
sub port_to_bridge( $ ) {
my $portref = $interfaces{$_[0]};
my $portref = $interface_table->{$_[0]};
return $portref && $portref->{options}{port} ? $portref->{bridge} : '';
}
@ -853,7 +921,7 @@ sub port_to_bridge( $ ) {
# Return the bridge associated with the passed interface.
#
sub source_port_to_bridge( $ ) {
my $portref = $interfaces{$_[0]};
my $portref = $interface_table->{$_[0]};
return $portref ? $portref->{bridge} : '';
}
@ -861,7 +929,7 @@ sub source_port_to_bridge( $ ) {
# Return the 'optional' setting of the passed interface
#
sub interface_is_optional($) {
my $optionsref = $interfaces{$_[0]}{options};
my $optionsref = $interface_table->{$_[0]}{options};
$optionsref && $optionsref->{optional};
}
@ -872,8 +940,8 @@ sub find_interfaces_by_option( $ ) {
my $option = $_[0];
my @ints = ();
for my $interface ( @interfaces ) {
my $optionsref = $interfaces{$interface}{options};
for my $interface ( @{$interface_list} ) {
my $optionsref = $interface_table->{$interface}{options};
if ( $optionsref && defined $optionsref->{$option} ) {
push @ints , $interface
}
@ -888,7 +956,7 @@ sub find_interfaces_by_option( $ ) {
sub get_interface_option( $$ ) {
my ( $interface, $option ) = @_;
$interfaces{$interface}{options}{$option};
$interface_table->{$interface}{options}{$option};
}
#
@ -897,14 +965,16 @@ sub get_interface_option( $$ ) {
sub set_interface_option( $$$ ) {
my ( $interface, $option, $value ) = @_;
$interfaces{$interface}{options}{$option} = $value;
$interface_table->{$interface}{options}{$option} = $value;
}
#
# Validates the hosts file. Generates entries in %zone{..}{hosts}
#
sub validate_hosts_file()
sub validate_hosts_file( $ )
{
my $filename = shift;
my %validoptions = (
blacklist => 1,
maclist => 1,
@ -917,11 +987,11 @@ sub validate_hosts_file()
destonly => 1,
sourceonly => 1,
);
my $ipsec = 0;
my $first_entry = 1;
my $fn = open_file 'hosts';
my $fn = open_file $filename;
while ( read_a_line ) {
@ -944,16 +1014,16 @@ sub validate_hosts_file()
$interface = $1;
$hosts = $2;
$zoneref->{options}{complex} = 1 if $hosts =~ /^\+/;
fatal_error "Unknown interface ($interface)" unless $interfaces{$interface}{root};
fatal_error "Unknown interface ($interface)" unless $interface_table->{$interface}{root};
} else {
fatal_error "Invalid HOST(S) column contents: $hosts";
}
if ( $type eq 'bport4' ) {
if ( $type =~ /^bport/ ) {
if ( $zoneref->{bridge} eq '' ) {
fatal_error 'Bridge Port Zones may only be associated with bridge ports' unless $interfaces{$interface}{options}{port};
$zoneref->{bridge} = $interfaces{$interface}{bridge};
} elsif ( $zoneref->{bridge} ne $interfaces{$interface}{bridge} ) {
fatal_error 'Bridge Port Zones may only be associated with bridge ports' unless $interface_table->{$interface}{options}{port};
$zoneref->{bridge} = $interface_table->{$interface}{bridge};
} elsif ( $zoneref->{bridge} ne $interface_table->{$interface}{bridge} ) {
fatal_error "Interface $interface is not a port on bridge $zoneref->{bridge}";
}
}
@ -1000,7 +1070,7 @@ sub validate_hosts_file()
progress_message " Host \"$currentline\" validated";
}
$capabilities{POLICY_MATCH} = '' unless $ipsec || haveipseczones;
return $ipsec;
}
#
@ -1011,7 +1081,7 @@ sub find_hosts_by_option( $ ) {
my $option = $_[0];
my @hosts;
for my $zone ( grep $zones{$_}{type} ne 'firewall' , @zones ) {
for my $zone ( non_firewall_zones() ) {
while ( my ($type, $interfaceref) = each %{$zones{$zone}{hosts}} ) {
while ( my ( $interface, $arrayref) = ( each %{$interfaceref} ) ) {
for my $host ( @{$arrayref} ) {
@ -1025,8 +1095,8 @@ sub find_hosts_by_option( $ ) {
}
}
for my $interface ( @interfaces ) {
if ( ! $interfaces{$interface}{zone4} && $interfaces{$interface}{options}{$option} ) {
for my $interface ( @{$interface_list} ) {
if ( ! $interface_table->{$interface}{zone} && $interface_table->{$interface}{options}{$option} ) {
push @hosts, [ $interface, 'none', ALLIP ];
}
}