]>
Commit | Line | Data |
---|---|---|
3a1019f6 MT |
1 | #!/bin/sh |
2 | ||
0f5c5ce7 MT |
3 | . /etc/sysconfig/rc |
4 | . ${rc_functions} | |
5 | ||
3a1019f6 MT |
6 | eval $(/usr/local/bin/readhash /var/ipfire/ppp/settings) |
7 | eval $(/usr/local/bin/readhash /var/ipfire/ethernet/settings) | |
fe0cd647 | 8 | eval $(/usr/local/bin/readhash /var/ipfire/optionsfw/settings) |
3a1019f6 MT |
9 | IFACE=`/bin/cat /var/ipfire/red/iface 2> /dev/null | /usr/bin/tr -d '\012'` |
10 | ||
11 | if [ -f /var/ipfire/red/device ]; then | |
12 | DEVICE=`/bin/cat /var/ipfire/red/device 2> /dev/null | /usr/bin/tr -d '\012'` | |
13 | fi | |
14 | ||
c581b670 MT |
15 | function iptables() { |
16 | /sbin/iptables --wait "$@" | |
17 | } | |
18 | ||
3a1019f6 MT |
19 | iptables_init() { |
20 | # Flush all rules and delete all custom chains | |
c581b670 MT |
21 | iptables -F |
22 | iptables -t nat -F | |
23 | iptables -t mangle -F | |
b1109b8a | 24 | iptables -t raw -F |
c581b670 MT |
25 | iptables -X |
26 | iptables -t nat -X | |
27 | iptables -t mangle -X | |
b1109b8a | 28 | iptables -t raw -X |
3a1019f6 MT |
29 | |
30 | # Set up policies | |
c581b670 MT |
31 | iptables -P INPUT DROP |
32 | iptables -P FORWARD DROP | |
33 | iptables -P OUTPUT ACCEPT | |
3a1019f6 MT |
34 | |
35 | # Empty LOG_DROP and LOG_REJECT chains | |
c581b670 MT |
36 | iptables -N LOG_DROP |
37 | iptables -A LOG_DROP -m limit --limit 10/minute -j LOG | |
38 | iptables -A LOG_DROP -j DROP | |
39 | iptables -N LOG_REJECT | |
40 | iptables -A LOG_REJECT -m limit --limit 10/minute -j LOG | |
41 | iptables -A LOG_REJECT -j REJECT | |
3a1019f6 MT |
42 | |
43 | # This chain will log, then DROPs packets with certain bad combinations | |
44 | # of flags might indicate a port-scan attempt (xmas, null, etc) | |
c581b670 | 45 | iptables -N PSCAN |
5595bc03 | 46 | if [ "$DROPPORTSCAN" == "on" ]; then |
c581b670 MT |
47 | iptables -A PSCAN -p tcp -m limit --limit 10/minute -j LOG --log-prefix "DROP_TCP Scan " -m comment --comment "DROP_TCP PScan" |
48 | iptables -A PSCAN -p udp -m limit --limit 10/minute -j LOG --log-prefix "DROP_UDP Scan " -m comment --comment "DROP_UDP PScan" | |
49 | iptables -A PSCAN -p icmp -m limit --limit 10/minute -j LOG --log-prefix "DROP_ICMP Scan " -m comment --comment "DROP_ICMP PScan" | |
50 | iptables -A PSCAN -f -m limit --limit 10/minute -j LOG --log-prefix "DROP_FRAG Scan " -m comment --comment "DROP_FRAG PScan" | |
5595bc03 | 51 | fi |
c581b670 | 52 | iptables -A PSCAN -j DROP -m comment --comment "DROP_PScan" |
3a1019f6 MT |
53 | |
54 | # New tcp packets without SYN set - could well be an obscure type of port scan | |
55 | # that's not covered above, may just be a broken windows machine | |
c581b670 | 56 | iptables -N NEWNOTSYN |
5595bc03 | 57 | if [ "$DROPNEWNOTSYN" == "on" ]; then |
c581b670 | 58 | iptables -A NEWNOTSYN -m limit --limit 10/minute -j LOG --log-prefix "DROP_NEWNOTSYN " |
5595bc03 | 59 | fi |
c581b670 | 60 | iptables -A NEWNOTSYN -j DROP -m comment --comment "DROP_NEWNOTSYN" |
3a1019f6 MT |
61 | |
62 | # Chain to contain all the rules relating to bad TCP flags | |
c581b670 | 63 | iptables -N BADTCP |
3a1019f6 | 64 | |
c581b670 MT |
65 | # Don't check loopback |
66 | iptables -A BADTCP -i lo -j RETURN | |
d8158ca6 | 67 | |
3a1019f6 | 68 | # Disallow packets frequently used by port-scanners |
dccbf1bf AF |
69 | # NMAP FIN/URG/PSH (XMAS scan) |
70 | iptables -A BADTCP -p tcp --tcp-flags ALL FIN,URG,PSH -j PSCAN | |
71 | # SYN/RST/ACK/FIN/URG | |
72 | iptables -A BADTCP -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j PSCAN | |
73 | # ALL/ALL | |
74 | iptables -A BADTCP -p tcp --tcp-flags ALL ALL -j PSCAN | |
75 | # FIN Stealth | |
c581b670 | 76 | iptables -A BADTCP -p tcp --tcp-flags ALL FIN -j PSCAN |
3a1019f6 | 77 | # SYN/RST (also catches xmas variants that set SYN+RST+...) |
c581b670 | 78 | iptables -A BADTCP -p tcp --tcp-flags SYN,RST SYN,RST -j PSCAN |
3a1019f6 | 79 | # SYN/FIN (QueSO or nmap OS probe) |
c581b670 | 80 | iptables -A BADTCP -p tcp --tcp-flags SYN,FIN SYN,FIN -j PSCAN |
dccbf1bf AF |
81 | # Null |
82 | iptables -A BADTCP -p tcp --tcp-flags ALL NONE -j PSCAN | |
3a1019f6 | 83 | # NEW TCP without SYN |
c581b670 | 84 | iptables -A BADTCP -p tcp ! --syn -m conntrack --ctstate NEW -j NEWNOTSYN |
b85d2a98 | 85 | |
c581b670 MT |
86 | iptables -A INPUT -p tcp -j BADTCP |
87 | iptables -A FORWARD -p tcp -j BADTCP | |
c0359d6d | 88 | |
b1109b8a | 89 | # Connection tracking chains |
c581b670 | 90 | iptables -N CONNTRACK |
b1109b8a | 91 | iptables -A CONNTRACK -m conntrack --ctstate ESTABLISHED -j ACCEPT |
dccbf1bf | 92 | iptables -A CONNTRACK -m conntrack --ctstate INVALID -j DROP |
0f535060 | 93 | iptables -A CONNTRACK -p icmp -m conntrack --ctstate RELATED -j ACCEPT |
b1109b8a MT |
94 | iptables -t raw -N CONNTRACK |
95 | iptables -t raw -A PREROUTING -j CONNTRACK | |
96 | ||
97 | # Conntrack helpers (https://home.regit.org/netfilter-en/secure-use-of-helpers/) | |
98 | ||
99 | # SIP | |
100 | iptables -A CONNTRACK -m conntrack --ctstate RELATED \ | |
101 | -m helper --helper sip -j ACCEPT | |
102 | for proto in udp tcp; do | |
103 | iptables -t raw -A CONNTRACK -p "${proto}" --dport 5060 -j CT --helper sip | |
104 | done | |
105 | ||
106 | # FTP | |
107 | iptables -A CONNTRACK -m conntrack --ctstate RELATED \ | |
108 | -m helper --helper ftp -p tcp --dport 1024: -j ACCEPT | |
109 | iptables -t raw -A CONNTRACK -p tcp --dport 21 -j CT --helper ftp | |
110 | ||
111 | # PPTP | |
112 | iptables -A CONNTRACK -m conntrack --ctstate RELATED \ | |
113 | -m helper --helper pptp -j ACCEPT | |
114 | iptables -t raw -A CONNTRACK -p udp --dport 1723 -j CT --helper pptp | |
115 | ||
116 | # TFTP | |
117 | iptables -A CONNTRACK -m conntrack --ctstate RELATED \ | |
118 | -m helper --helper tftp -j ACCEPT | |
119 | iptables -t raw -A CONNTRACK -p udp --dport 69 -j CT --helper tftp | |
3a1019f6 | 120 | |
3a1019f6 | 121 | # Fix for braindead ISP's |
c581b670 | 122 | iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu |
3a1019f6 MT |
123 | |
124 | # CUSTOM chains, can be used by the users themselves | |
c581b670 MT |
125 | iptables -N CUSTOMINPUT |
126 | iptables -A INPUT -j CUSTOMINPUT | |
127 | iptables -N CUSTOMFORWARD | |
128 | iptables -A FORWARD -j CUSTOMFORWARD | |
129 | iptables -N CUSTOMOUTPUT | |
130 | iptables -A OUTPUT -j CUSTOMOUTPUT | |
131 | iptables -t nat -N CUSTOMPREROUTING | |
132 | iptables -t nat -A PREROUTING -j CUSTOMPREROUTING | |
133 | iptables -t nat -N CUSTOMPOSTROUTING | |
134 | iptables -t nat -A POSTROUTING -j CUSTOMPOSTROUTING | |
3a1019f6 | 135 | |
2a5b19c5 AF |
136 | # P2PBLOCK |
137 | iptables -N P2PBLOCK | |
138 | iptables -A INPUT -j P2PBLOCK | |
139 | iptables -A FORWARD -j P2PBLOCK | |
140 | iptables -A OUTPUT -j P2PBLOCK | |
141 | ||
815eaff4 | 142 | # Guardian (IPS) chains |
c581b670 MT |
143 | iptables -N GUARDIAN |
144 | iptables -A INPUT -j GUARDIAN | |
145 | iptables -A FORWARD -j GUARDIAN | |
815eaff4 | 146 | |
1e555330 | 147 | # Block OpenVPN transfer networks |
c581b670 | 148 | iptables -N OVPNBLOCK |
a0a5c14f | 149 | iptables -A INPUT -i tun+ -j OVPNBLOCK |
a0a5c14f MT |
150 | iptables -A FORWARD -i tun+ -j OVPNBLOCK |
151 | iptables -A FORWARD -o tun+ -j OVPNBLOCK | |
1e555330 | 152 | |
51ab1de1 | 153 | # OpenVPN transfer network translation |
c581b670 MT |
154 | iptables -t nat -N OVPNNAT |
155 | iptables -t nat -A POSTROUTING -j OVPNNAT | |
51ab1de1 | 156 | |
daa1ceba | 157 | # IPTV chains for IGMPPROXY |
c581b670 MT |
158 | iptables -N IPTVINPUT |
159 | iptables -A INPUT -j IPTVINPUT | |
160 | iptables -N IPTVFORWARD | |
161 | iptables -A FORWARD -j IPTVFORWARD | |
daa1ceba | 162 | |
8e59a602 MT |
163 | # Allow to ping the firewall. |
164 | iptables -N ICMPINPUT | |
165 | iptables -A INPUT -j ICMPINPUT | |
166 | iptables -A ICMPINPUT -p icmp --icmp-type 8 -j ACCEPT | |
3a1019f6 | 167 | |
afc611d4 | 168 | # Accept everything on loopback |
c581b670 MT |
169 | iptables -N LOOPBACK |
170 | iptables -A LOOPBACK -i lo -j ACCEPT | |
171 | iptables -A LOOPBACK -o lo -j ACCEPT | |
afc611d4 | 172 | |
3b9a23ce | 173 | # Filter all packets with loopback addresses on non-loopback interfaces. |
c581b670 MT |
174 | iptables -A LOOPBACK -s 127.0.0.0/8 -j DROP |
175 | iptables -A LOOPBACK -d 127.0.0.0/8 -j DROP | |
3b9a23ce MT |
176 | |
177 | for i in INPUT FORWARD OUTPUT; do | |
c581b670 | 178 | iptables -A ${i} -j LOOPBACK |
3b9a23ce | 179 | done |
afc611d4 | 180 | |
3a1019f6 | 181 | # Accept everything connected |
b85d2a98 | 182 | for i in INPUT FORWARD OUTPUT; do |
c581b670 | 183 | iptables -A ${i} -j CONNTRACK |
b85d2a98 MT |
184 | done |
185 | ||
8490e496 MT |
186 | # Allow DHCP |
187 | iptables -N DHCPINPUT | |
188 | iptables -A DHCPINPUT -p udp --sport 68 --dport 67 -j ACCEPT | |
189 | iptables -A DHCPINPUT -p tcp --sport 68 --dport 67 -j ACCEPT | |
190 | ||
191 | iptables -N DHCPOUTPUT | |
192 | iptables -A DHCPOUTPUT -p udp --sport 67 --dport 68 -j ACCEPT | |
193 | iptables -A DHCPOUTPUT -p tcp --sport 67 --dport 68 -j ACCEPT | |
194 | ||
195 | # Allow DHCP on GREEN | |
196 | iptables -N DHCPGREENINPUT | |
197 | iptables -N DHCPGREENOUTPUT | |
198 | if [ -n "${GREEN_DEV}" ]; then | |
199 | iptables -A INPUT -i "${GREEN_DEV}" -j DHCPGREENINPUT | |
200 | iptables -A OUTPUT -o "${GREEN_DEV}" -j DHCPGREENOUTPUT | |
201 | fi | |
202 | ||
203 | # allow DHCP on BLUE to be turned on/off | |
204 | iptables -N DHCPBLUEINPUT | |
205 | iptables -N DHCPBLUEOUTPUT | |
206 | if [ -n "${BLUE_DEV}" ]; then | |
207 | iptables -A INPUT -i "${BLUE_DEV}" -j DHCPBLUEINPUT | |
208 | iptables -A OUTPUT -o "${BLUE_DEV}" -j DHCPBLUEOUTPUT | |
209 | fi | |
210 | ||
cab02e2a SS |
211 | # GeoIP block |
212 | iptables -N GEOIPBLOCK | |
213 | iptables -A INPUT -j GEOIPBLOCK | |
214 | iptables -A FORWARD -j GEOIPBLOCK | |
215 | ||
5fd30232 | 216 | # trafic from ipsecX/TUN/TAP interfaces, before "-i GREEN_DEV" accept everything |
c581b670 MT |
217 | iptables -N IPSECINPUT |
218 | iptables -N IPSECFORWARD | |
219 | iptables -N IPSECOUTPUT | |
220 | iptables -A INPUT -j IPSECINPUT | |
221 | iptables -A FORWARD -j IPSECFORWARD | |
222 | iptables -A OUTPUT -j IPSECOUTPUT | |
223 | iptables -t nat -N IPSECNAT | |
224 | iptables -t nat -A POSTROUTING -j IPSECNAT | |
b68e5c14 | 225 | |
3a1019f6 | 226 | # localhost and ethernet. |
c0e0848f MT |
227 | # Always allow accessing the web GUI from GREEN. |
228 | iptables -N GUIINPUT | |
229 | iptables -A INPUT -j GUIINPUT | |
230 | iptables -A GUIINPUT -i "${GREEN_DEV}" -p tcp --dport 444 -j ACCEPT | |
8490e496 | 231 | |
81393987 | 232 | # WIRELESS chains |
c581b670 MT |
233 | iptables -N WIRELESSINPUT |
234 | iptables -A INPUT -m conntrack --ctstate NEW -j WIRELESSINPUT | |
235 | iptables -N WIRELESSFORWARD | |
236 | iptables -A FORWARD -m conntrack --ctstate NEW -j WIRELESSFORWARD | |
987b75bc | 237 | |
ab4876ad | 238 | # OpenVPN |
c581b670 MT |
239 | iptables -N OVPNINPUT |
240 | iptables -A INPUT -j OVPNINPUT | |
ab4876ad | 241 | |
987b75bc | 242 | # TOR |
c581b670 MT |
243 | iptables -N TOR_INPUT |
244 | iptables -A INPUT -j TOR_INPUT | |
12dcfbbd | 245 | |
d5f1422d | 246 | # Jump into the actual firewall ruleset. |
c581b670 MT |
247 | iptables -N INPUTFW |
248 | iptables -A INPUT -j INPUTFW | |
d5f1422d | 249 | |
c581b670 MT |
250 | iptables -N OUTGOINGFW |
251 | iptables -A OUTPUT -j OUTGOINGFW | |
d5f1422d | 252 | |
c581b670 MT |
253 | iptables -N FORWARDFW |
254 | iptables -A FORWARD -j FORWARDFW | |
d5f1422d | 255 | |
fac38614 | 256 | # SNAT rules |
c581b670 MT |
257 | iptables -t nat -N NAT_SOURCE |
258 | iptables -t nat -A POSTROUTING -j NAT_SOURCE | |
fac38614 | 259 | |
bb12dd7b | 260 | # Custom prerouting chains (for transparent proxy) |
c581b670 MT |
261 | iptables -t nat -N SQUID |
262 | iptables -t nat -A PREROUTING -j SQUID | |
bb12dd7b MT |
263 | |
264 | # DNAT rules | |
c581b670 MT |
265 | iptables -t nat -N NAT_DESTINATION |
266 | iptables -t nat -A PREROUTING -j NAT_DESTINATION | |
99f11a16 | 267 | iptables -t nat -A OUTPUT -j NAT_DESTINATION |
bb12dd7b | 268 | |
6e87f0aa MT |
269 | iptables -t mangle -N NAT_DESTINATION |
270 | iptables -t mangle -A PREROUTING -j NAT_DESTINATION | |
271 | ||
272 | iptables -t nat -N NAT_DESTINATION_FIX | |
273 | iptables -t nat -A POSTROUTING -j NAT_DESTINATION_FIX | |
274 | ||
275 | iptables -t nat -A NAT_DESTINATION_FIX \ | |
276 | -m mark --mark 1 -j SNAT --to-source "${GREEN_ADDRESS}" | |
277 | ||
278 | if [ -n "${BLUE_ADDRESS}" ]; then | |
279 | iptables -t nat -A NAT_DESTINATION_FIX \ | |
280 | -m mark --mark 2 -j SNAT --to-source "${BLUE_ADDRESS}" | |
281 | fi | |
282 | ||
283 | if [ -n "${ORANGE_ADDRESS}" ]; then | |
284 | iptables -t nat -A NAT_DESTINATION_FIX \ | |
285 | -m mark --mark 3 -j SNAT --to-source "${ORANGE_ADDRESS}" | |
286 | fi | |
287 | ||
7e7495b3 | 288 | # upnp chain for our upnp daemon |
c581b670 MT |
289 | iptables -t nat -N UPNPFW |
290 | iptables -t nat -A PREROUTING -j UPNPFW | |
291 | iptables -N UPNPFW | |
292 | iptables -A FORWARD -m conntrack --ctstate NEW -j UPNPFW | |
3a1019f6 | 293 | |
6e87f0aa MT |
294 | # RED chain, used for the red interface |
295 | iptables -N REDINPUT | |
296 | iptables -A INPUT -j REDINPUT | |
297 | iptables -N REDFORWARD | |
298 | iptables -A FORWARD -j REDFORWARD | |
299 | iptables -t nat -N REDNAT | |
300 | iptables -t nat -A POSTROUTING -j REDNAT | |
301 | ||
ab4876ad MT |
302 | # Apply OpenVPN firewall rules |
303 | /usr/local/bin/openvpnctrl --firewall-rules | |
ff4770c7 AM |
304 | |
305 | # run wirelessctrl | |
306 | /usr/local/bin/wirelessctrl | |
307 | ||
c581b670 MT |
308 | # POLICY CHAIN |
309 | iptables -N POLICYIN | |
310 | iptables -A INPUT -j POLICYIN | |
311 | iptables -N POLICYFWD | |
312 | iptables -A FORWARD -j POLICYFWD | |
313 | iptables -N POLICYOUT | |
314 | iptables -A OUTPUT -j POLICYOUT | |
b324de14 | 315 | |
bb383423 | 316 | # Initialize firewall policies. |
5d7faa45 | 317 | /usr/sbin/firewall-policy |
690b0bd7 | 318 | |
bb383423 | 319 | # Install firewall rules for the red interface. |
4b12aa41 TE |
320 | iptables_red_up |
321 | ||
322 | # If red has not been brought up yet, we will | |
323 | # add the blocking rules for MASQUERADE | |
324 | if [ ! -e "/var/ipfire/red/active" ]; then | |
325 | iptables_red_down | |
326 | fi | |
ff4770c7 | 327 | } |
3a1019f6 | 328 | |
4b12aa41 | 329 | iptables_red_up() { |
c581b670 MT |
330 | iptables -F REDINPUT |
331 | iptables -F REDFORWARD | |
332 | iptables -t nat -F REDNAT | |
3a1019f6 | 333 | |
ff4770c7 AM |
334 | # PPPoE / PPTP Device |
335 | if [ "$IFACE" != "" ]; then | |
336 | # PPPoE / PPTP | |
337 | if [ "$DEVICE" != "" ]; then | |
c581b670 | 338 | iptables -A REDINPUT -i $DEVICE -j ACCEPT |
ff4770c7 AM |
339 | fi |
340 | if [ "$RED_TYPE" == "PPTP" -o "$RED_TYPE" == "PPPOE" ]; then | |
341 | if [ "$RED_DEV" != "" ]; then | |
c581b670 | 342 | iptables -A REDINPUT -i $RED_DEV -j ACCEPT |
ff4770c7 AM |
343 | fi |
344 | fi | |
3a1019f6 | 345 | fi |
ff4770c7 AM |
346 | |
347 | # PPTP over DHCP | |
348 | if [ "$DEVICE" != "" -a "$TYPE" == "PPTP" -a "$METHOD" == "DHCP" ]; then | |
c581b670 MT |
349 | iptables -A REDINPUT -p tcp --source-port 67 --destination-port 68 -i $DEVICE -j ACCEPT |
350 | iptables -A REDINPUT -p udp --source-port 67 --destination-port 68 -i $DEVICE -j ACCEPT | |
3a1019f6 MT |
351 | fi |
352 | ||
ff4770c7 AM |
353 | # Orange pinholes |
354 | if [ "$ORANGE_DEV" != "" ]; then | |
355 | # This rule enables a host on ORANGE network to connect to the outside | |
356 | # (only if we have a red connection) | |
357 | if [ "$IFACE" != "" ]; then | |
c581b670 | 358 | iptables -A REDFORWARD -i $ORANGE_DEV -o $IFACE -j ACCEPT |
ff4770c7 | 359 | fi |
3a1019f6 | 360 | fi |
c400fe4c | 361 | |
ff4770c7 AM |
362 | if [ "$IFACE" != "" -a -f /var/ipfire/red/active ]; then |
363 | # DHCP | |
364 | if [ "$RED_DEV" != "" -a "$RED_TYPE" == "DHCP" ]; then | |
c581b670 MT |
365 | iptables -A REDINPUT -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT |
366 | iptables -A REDINPUT -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
ff4770c7 AM |
367 | fi |
368 | if [ "$METHOD" == "DHCP" -a "$PROTOCOL" == "RFC1483" ]; then | |
c581b670 MT |
369 | iptables -A REDINPUT -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT |
370 | iptables -A REDINPUT -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
ff4770c7 AM |
371 | fi |
372 | ||
373 | # Outgoing masquerading (don't masqerade IPSEC (mark 50)) | |
c581b670 | 374 | iptables -t nat -A REDNAT -m mark --mark 50 -o $IFACE -j RETURN |
c926c637 | 375 | |
83ef9c40 MT |
376 | if [ "$IFACE" = "$GREEN_DEV" ]; then |
377 | MASQUERADE_GREEN="off" | |
c926c637 | 378 | fi |
c400fe4c | 379 | |
983d471f | 380 | local NO_MASQ_NETWORKS |
83ef9c40 MT |
381 | |
382 | if [ "${MASQUERADE_GREEN}" = "off" ]; then | |
983d471f | 383 | NO_MASQ_NETWORKS="${NO_MASQ_NETWORKS} ${GREEN_NETADDRESS}/${GREEN_NETMASK}" |
83ef9c40 MT |
384 | fi |
385 | ||
386 | if [ "${MASQUERADE_BLUE}" = "off" ]; then | |
983d471f | 387 | NO_MASQ_NETWORKS="${NO_MASQ_NETWORKS} ${BLUE_NETADDRESS}/${BLUE_NETMASK}" |
83ef9c40 MT |
388 | fi |
389 | ||
390 | if [ "${MASQUERADE_ORANGE}" = "off" ]; then | |
983d471f | 391 | NO_MASQ_NETWORKS="${NO_MASQ_NETWORKS} ${ORANGE_NETADDRESS}/${ORANGE_NETMASK}" |
83ef9c40 MT |
392 | fi |
393 | ||
983d471f MT |
394 | local network |
395 | for network in ${NO_MASQ_NETWORKS}; do | |
396 | iptables -t nat -A REDNAT -s "${network}" -o "${IFACE}" -j RETURN | |
83ef9c40 MT |
397 | done |
398 | ||
399 | # Masquerade everything else | |
400 | iptables -t nat -A REDNAT -o $IFACE -j MASQUERADE | |
6be0579b | 401 | fi |
66f6b279 MT |
402 | |
403 | # Reload all rules. | |
55a5bcae | 404 | /usr/local/bin/firewallctrl |
ff4770c7 AM |
405 | } |
406 | ||
4b12aa41 TE |
407 | iptables_red_down() { |
408 | # Prohibit packets to reach the masquerading rule | |
409 | # while the wan interface is down - this is required to | |
410 | # circumvent udp related NAT issues | |
411 | # http://forum.ipfire.org/index.php?topic=11127.0 | |
e7204c2d MT |
412 | if [ -n "${IFACE}" ]; then |
413 | iptables -F REDFORWARD | |
414 | iptables -A REDFORWARD -o "${IFACE}" -j DROP | |
415 | fi | |
4b12aa41 TE |
416 | |
417 | # Reload all rules. | |
418 | /usr/local/bin/firewallctrl | |
419 | } | |
420 | ||
ff4770c7 AM |
421 | # See how we were called. |
422 | case "$1" in | |
423 | start) | |
7d7740a4 | 424 | boot_mesg "Setting up firewall" |
ff4770c7 | 425 | iptables_init |
7d7740a4 | 426 | evaluate_retval |
6be0579b | 427 | ;; |
4b12aa41 | 428 | reload|up) |
7d7740a4 | 429 | boot_mesg "Reloading firewall" |
4b12aa41 | 430 | iptables_red_up |
7d7740a4 | 431 | evaluate_retval |
3a1019f6 | 432 | ;; |
4b12aa41 TE |
433 | down) |
434 | boot_mesg "Disabling firewall access to RED" | |
435 | iptables_red_down | |
436 | evaluate_retval | |
437 | ;; | |
3a1019f6 | 438 | restart) |
3a1019f6 MT |
439 | $0 start |
440 | ;; | |
441 | *) | |
ff4770c7 | 442 | echo "Usage: $0 {start|reload|restart}" |
3a1019f6 MT |
443 | exit 1 |
444 | ;; | |
445 | esac | |
446 | ||
447 | exit 0 |