]>
Commit | Line | Data |
---|---|---|
3a1019f6 MT |
1 | #!/bin/sh |
2 | ||
3 | eval $(/usr/local/bin/readhash /var/ipfire/ppp/settings) | |
4 | eval $(/usr/local/bin/readhash /var/ipfire/ethernet/settings) | |
fe0cd647 | 5 | eval $(/usr/local/bin/readhash /var/ipfire/optionsfw/settings) |
3a1019f6 MT |
6 | IFACE=`/bin/cat /var/ipfire/red/iface 2> /dev/null | /usr/bin/tr -d '\012'` |
7 | ||
8 | if [ -f /var/ipfire/red/device ]; then | |
9 | DEVICE=`/bin/cat /var/ipfire/red/device 2> /dev/null | /usr/bin/tr -d '\012'` | |
10 | fi | |
11 | ||
12 | iptables_init() { | |
13 | # Flush all rules and delete all custom chains | |
14 | /sbin/iptables -F | |
15 | /sbin/iptables -t nat -F | |
16 | /sbin/iptables -t mangle -F | |
17 | /sbin/iptables -X | |
18 | /sbin/iptables -t nat -X | |
19 | /sbin/iptables -t mangle -X | |
20 | ||
21 | # Set up policies | |
22 | /sbin/iptables -P INPUT DROP | |
23 | /sbin/iptables -P FORWARD DROP | |
24 | /sbin/iptables -P OUTPUT ACCEPT | |
25 | ||
26 | # Empty LOG_DROP and LOG_REJECT chains | |
27 | /sbin/iptables -N LOG_DROP | |
28 | /sbin/iptables -A LOG_DROP -m limit --limit 10/minute -j LOG | |
29 | /sbin/iptables -A LOG_DROP -j DROP | |
30 | /sbin/iptables -N LOG_REJECT | |
31 | /sbin/iptables -A LOG_REJECT -m limit --limit 10/minute -j LOG | |
32 | /sbin/iptables -A LOG_REJECT -j REJECT | |
33 | ||
34 | # This chain will log, then DROPs packets with certain bad combinations | |
35 | # of flags might indicate a port-scan attempt (xmas, null, etc) | |
36 | /sbin/iptables -N PSCAN | |
5595bc03 | 37 | if [ "$DROPPORTSCAN" == "on" ]; then |
97fe1741 | 38 | /sbin/iptables -A PSCAN -p tcp -m limit --limit 10/minute -j LOG --log-prefix "DROP_TCP Scan " -m comment --comment "DROP_TCP PScan" |
fe0cd647 | 39 | /sbin/iptables -A PSCAN -p udp -m limit --limit 10/minute -j LOG --log-prefix "DROP_UDP Scan " -m comment --comment "DROP_UDP PScan" |
97fe1741 CS |
40 | /sbin/iptables -A PSCAN -p icmp -m limit --limit 10/minute -j LOG --log-prefix "DROP_ICMP Scan " -m comment --comment "DROP_ICMP PScan" |
41 | /sbin/iptables -A PSCAN -f -m limit --limit 10/minute -j LOG --log-prefix "DROP_FRAG Scan " -m comment --comment "DROP_FRAG PScan" | |
5595bc03 | 42 | fi |
97fe1741 | 43 | /sbin/iptables -A PSCAN -j DROP -m comment --comment "DROP_PScan" |
3a1019f6 MT |
44 | |
45 | # New tcp packets without SYN set - could well be an obscure type of port scan | |
46 | # that's not covered above, may just be a broken windows machine | |
47 | /sbin/iptables -N NEWNOTSYN | |
5595bc03 | 48 | if [ "$DROPNEWNOTSYN" == "on" ]; then |
97fe1741 | 49 | /sbin/iptables -A NEWNOTSYN -m limit --limit 10/minute -j LOG --log-prefix "DROP_NEWNOTSYN " |
5595bc03 | 50 | fi |
97fe1741 | 51 | /sbin/iptables -A NEWNOTSYN -j DROP -m comment --comment "DROP_NEWNOTSYN" |
3a1019f6 MT |
52 | |
53 | # Chain to contain all the rules relating to bad TCP flags | |
54 | /sbin/iptables -N BADTCP | |
55 | ||
d8158ca6 | 56 | #Don't check loopback |
a56df4ee | 57 | /sbin/iptables -A BADTCP -i lo -j RETURN |
d8158ca6 | 58 | |
3a1019f6 MT |
59 | # Disallow packets frequently used by port-scanners |
60 | # nmap xmas | |
61 | /sbin/iptables -A BADTCP -p tcp --tcp-flags ALL FIN,URG,PSH -j PSCAN | |
62 | # Null | |
63 | /sbin/iptables -A BADTCP -p tcp --tcp-flags ALL NONE -j PSCAN | |
64 | # FIN | |
65 | /sbin/iptables -A BADTCP -p tcp --tcp-flags ALL FIN -j PSCAN | |
66 | # SYN/RST (also catches xmas variants that set SYN+RST+...) | |
67 | /sbin/iptables -A BADTCP -p tcp --tcp-flags SYN,RST SYN,RST -j PSCAN | |
68 | # SYN/FIN (QueSO or nmap OS probe) | |
69 | /sbin/iptables -A BADTCP -p tcp --tcp-flags SYN,FIN SYN,FIN -j PSCAN | |
70 | # NEW TCP without SYN | |
71 | /sbin/iptables -A BADTCP -p tcp ! --syn -m state --state NEW -j NEWNOTSYN | |
72 | ||
73 | /sbin/iptables -A INPUT -j BADTCP | |
74 | /sbin/iptables -A FORWARD -j BADTCP | |
75 | ||
76 | } | |
77 | ||
78 | iptables_red() { | |
79 | /sbin/iptables -F REDINPUT | |
80 | /sbin/iptables -F REDFORWARD | |
81 | /sbin/iptables -t nat -F REDNAT | |
82 | ||
83 | # PPPoE / PPTP Device | |
84 | if [ "$IFACE" != "" ]; then | |
85 | # PPPoE / PPTP | |
86 | if [ "$DEVICE" != "" ]; then | |
87 | /sbin/iptables -A REDINPUT -i $DEVICE -j ACCEPT | |
88 | fi | |
89 | if [ "$RED_TYPE" == "PPTP" -o "$RED_TYPE" == "PPPOE" ]; then | |
90 | if [ "$RED_DEV" != "" ]; then | |
91 | /sbin/iptables -A REDINPUT -i $RED_DEV -j ACCEPT | |
92 | fi | |
93 | fi | |
94 | fi | |
95 | ||
96 | # PPTP over DHCP | |
97 | if [ "$DEVICE" != "" -a "$TYPE" == "PPTP" -a "$METHOD" == "DHCP" ]; then | |
98 | /sbin/iptables -A REDINPUT -p tcp --source-port 67 --destination-port 68 -i $DEVICE -j ACCEPT | |
99 | /sbin/iptables -A REDINPUT -p udp --source-port 67 --destination-port 68 -i $DEVICE -j ACCEPT | |
100 | fi | |
101 | ||
102 | # Orange pinholes | |
103 | if [ "$ORANGE_DEV" != "" ]; then | |
104 | # This rule enables a host on ORANGE network to connect to the outside | |
105 | # (only if we have a red connection) | |
106 | if [ "$IFACE" != "" ]; then | |
139a9b4f | 107 | /sbin/iptables -A REDFORWARD -i $ORANGE_DEV -o $IFACE -j ACCEPT |
3a1019f6 MT |
108 | fi |
109 | fi | |
110 | ||
111 | if [ "$IFACE" != "" -a -f /var/ipfire/red/active ]; then | |
112 | # DHCP | |
113 | if [ "$RED_DEV" != "" -a "$RED_TYPE" == "DHCP" ]; then | |
114 | /sbin/iptables -A REDINPUT -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
115 | /sbin/iptables -A REDINPUT -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
116 | fi | |
117 | if [ "$METHOD" == "DHCP" -a "$PROTOCOL" == "RFC1483" ]; then | |
118 | /sbin/iptables -A REDINPUT -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
119 | /sbin/iptables -A REDINPUT -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
120 | fi | |
121 | ||
db073a10 AF |
122 | # Outgoing masquerading (don't masqerade IPSEC (mark 50)) |
123 | /sbin/iptables -t nat -A REDNAT -m mark --mark 50 -o $IFACE -j RETURN | |
3a1019f6 MT |
124 | /sbin/iptables -t nat -A REDNAT -o $IFACE -j MASQUERADE |
125 | ||
126 | fi | |
127 | } | |
128 | ||
129 | # See how we were called. | |
130 | case "$1" in | |
131 | start) | |
132 | iptables_init | |
133 | ||
134 | # Limit Packets- helps reduce dos/syn attacks | |
135 | # original do nothing line | |
136 | #/sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -m limit --limit 10/sec | |
137 | # the correct one, but the negative '!' do nothing... | |
9efdd899 | 138 | #/sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN ! -m limit --limit 10/sec -j DROP |
3a1019f6 MT |
139 | |
140 | # Fix for braindead ISP's | |
141 | /sbin/iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu | |
142 | ||
143 | # CUSTOM chains, can be used by the users themselves | |
144 | /sbin/iptables -N CUSTOMINPUT | |
145 | /sbin/iptables -A INPUT -j CUSTOMINPUT | |
057249ba CS |
146 | /sbin/iptables -N GUARDIAN |
147 | /sbin/iptables -A INPUT -j GUARDIAN | |
148 | /sbin/iptables -A FORWARD -j GUARDIAN | |
3a1019f6 MT |
149 | /sbin/iptables -N CUSTOMFORWARD |
150 | /sbin/iptables -A FORWARD -j CUSTOMFORWARD | |
151 | /sbin/iptables -N CUSTOMOUTPUT | |
152 | /sbin/iptables -A OUTPUT -j CUSTOMOUTPUT | |
4cb74dce | 153 | /sbin/iptables -N OUTGOINGFW |
d9716b06 | 154 | /sbin/iptables -N OUTGOINGFWMAC |
4cb74dce | 155 | /sbin/iptables -A OUTPUT -j OUTGOINGFW |
3a1019f6 MT |
156 | /sbin/iptables -t nat -N CUSTOMPREROUTING |
157 | /sbin/iptables -t nat -A PREROUTING -j CUSTOMPREROUTING | |
158 | /sbin/iptables -t nat -N CUSTOMPOSTROUTING | |
159 | /sbin/iptables -t nat -A POSTROUTING -j CUSTOMPOSTROUTING | |
160 | ||
daa1ceba AF |
161 | # IPTV chains for IGMPPROXY |
162 | /sbin/iptables -N IPTVINPUT | |
163 | /sbin/iptables -A INPUT -j IPTVINPUT | |
164 | /sbin/iptables -N IPTVFORWARD | |
165 | /sbin/iptables -A FORWARD -j IPTVFORWARD | |
166 | ||
3a1019f6 MT |
167 | # filtering from GUI |
168 | /sbin/iptables -N GUIINPUT | |
169 | /sbin/iptables -A INPUT -j GUIINPUT | |
905fbf3e | 170 | /sbin/iptables -A GUIINPUT -p icmp --icmp-type 8 -j ACCEPT |
3a1019f6 MT |
171 | |
172 | # Accept everything connected | |
173 | /sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT | |
174 | /sbin/iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT | |
5fd30232 MT |
175 | |
176 | # trafic from ipsecX/TUN/TAP interfaces, before "-i GREEN_DEV" accept everything | |
6652626c AF |
177 | /sbin/iptables -N IPSECINPUT |
178 | /sbin/iptables -N IPSECFORWARD | |
179 | /sbin/iptables -N IPSECOUTPUT | |
5fd30232 | 180 | /sbin/iptables -N OPENSSLVIRTUAL |
6652626c | 181 | /sbin/iptables -A INPUT -j IPSECINPUT |
5595bc03 | 182 | /sbin/iptables -A INPUT -j OPENSSLVIRTUAL -m comment --comment "OPENSSLVIRTUAL INPUT" |
6652626c | 183 | /sbin/iptables -A FORWARD -j IPSECFORWARD |
5595bc03 | 184 | /sbin/iptables -A FORWARD -j OPENSSLVIRTUAL -m comment --comment "OPENSSLVIRTUAL FORWARD" |
6652626c | 185 | /sbin/iptables -A OUTPUT -j IPSECOUTPUT |
fcbf5eef | 186 | /sbin/iptables -t nat -N OVPNNAT |
c4cd0f7b | 187 | /sbin/iptables -t nat -N IPSECNAT |
b2e333d4 | 188 | /sbin/iptables -t nat -A POSTROUTING -j OVPNNAT |
c4cd0f7b | 189 | /sbin/iptables -t nat -A POSTROUTING -j IPSECNAT |
b68e5c14 | 190 | |
c60301c0 MT |
191 | # TOR |
192 | /sbin/iptables -N TOR_INPUT | |
193 | /sbin/iptables -A INPUT -j TOR_INPUT | |
194 | ||
4cb74dce | 195 | # Outgoing Firewall |
d9716b06 | 196 | /sbin/iptables -A FORWARD -j OUTGOINGFWMAC |
3a1019f6 | 197 | |
231499fc AM |
198 | # Forward Firewall |
199 | /sbin/iptables -N FORWARDFW | |
200 | /sbin/iptables -A FORWARD -j FORWARDFW | |
201 | ||
202 | # Input Firewall | |
203 | /sbin/iptables -N INPUTFW | |
204 | /sbin/iptables -A INPUT -m state --state NEW -j INPUTFW | |
205 | ||
3a1019f6 | 206 | # localhost and ethernet. |
d8158ca6 | 207 | /sbin/iptables -A INPUT -i lo -m state --state NEW -j ACCEPT |
3a1019f6 MT |
208 | /sbin/iptables -A INPUT -s 127.0.0.0/8 -m state --state NEW -j DROP # Loopback not on lo |
209 | /sbin/iptables -A INPUT -d 127.0.0.0/8 -m state --state NEW -j DROP | |
cae0079c | 210 | /sbin/iptables -A FORWARD -i lo -m state --state NEW -j ACCEPT |
3a1019f6 MT |
211 | /sbin/iptables -A FORWARD -s 127.0.0.0/8 -m state --state NEW -j DROP |
212 | /sbin/iptables -A FORWARD -d 127.0.0.0/8 -m state --state NEW -j DROP | |
dd79c399 | 213 | /sbin/iptables -A INPUT -i $GREEN_DEV -m state --state NEW -j ACCEPT ! -p icmp |
fd10a52c | 214 | #/sbin/iptables -A FORWARD -i $GREEN_DEV -m state --state NEW -j ACCEPT |
3a1019f6 MT |
215 | |
216 | # If a host on orange tries to initiate a connection to IPFire's red IP and | |
217 | # the connection gets DNATed back through a port forward to a server on orange | |
218 | # we end up with orange -> orange traffic passing through IPFire | |
219 | [ "$ORANGE_DEV" != "" ] && /sbin/iptables -A FORWARD -i $ORANGE_DEV -o $ORANGE_DEV -m state --state NEW -j ACCEPT | |
220 | ||
3a1019f6 MT |
221 | # allow DHCP on BLUE to be turned on/off |
222 | /sbin/iptables -N DHCPBLUEINPUT | |
223 | /sbin/iptables -A INPUT -j DHCPBLUEINPUT | |
224 | ||
5fd30232 MT |
225 | # OPenSSL |
226 | /sbin/iptables -N OPENSSLPHYSICAL | |
227 | /sbin/iptables -A INPUT -j OPENSSLPHYSICAL | |
3a1019f6 | 228 | |
3a1019f6 MT |
229 | # RED chain, used for the red interface |
230 | /sbin/iptables -N REDINPUT | |
231 | /sbin/iptables -A INPUT -j REDINPUT | |
232 | /sbin/iptables -N REDFORWARD | |
233 | /sbin/iptables -A FORWARD -j REDFORWARD | |
234 | /sbin/iptables -t nat -N REDNAT | |
235 | /sbin/iptables -t nat -A POSTROUTING -j REDNAT | |
236 | ||
237 | iptables_red | |
238 | ||
3a1019f6 MT |
239 | # PORTFWACCESS chain, used for portforwarding |
240 | /sbin/iptables -N PORTFWACCESS | |
241 | /sbin/iptables -A FORWARD -m state --state NEW -j PORTFWACCESS | |
242 | ||
243 | # Custom prerouting chains (for transparent proxy and port forwarding) | |
244 | /sbin/iptables -t nat -N SQUID | |
245 | /sbin/iptables -t nat -A PREROUTING -j SQUID | |
246 | /sbin/iptables -t nat -N PORTFW | |
247 | /sbin/iptables -t nat -A PREROUTING -j PORTFW | |
248 | ||
7e7495b3 MT |
249 | # upnp chain for our upnp daemon |
250 | /sbin/iptables -t nat -N UPNPFW | |
251 | /sbin/iptables -t nat -A PREROUTING -j UPNPFW | |
54194ba4 | 252 | /sbin/iptables -N UPNPFW |
42cb3860 | 253 | /sbin/iptables -A FORWARD -m state --state NEW -j UPNPFW |
3a1019f6 MT |
254 | |
255 | # Custom mangle chain (for port fowarding) | |
256 | /sbin/iptables -t mangle -N PORTFWMANGLE | |
257 | /sbin/iptables -t mangle -A PREROUTING -j PORTFWMANGLE | |
258 | ||
259 | # Postrouting rules (for port forwarding) | |
260 | /sbin/iptables -t nat -A POSTROUTING -m mark --mark 1 -j SNAT \ | |
261 | --to-source $GREEN_ADDRESS | |
262 | if [ "$BLUE_DEV" != "" ]; then | |
263 | /sbin/iptables -t nat -A POSTROUTING -m mark --mark 2 -j SNAT --to-source $BLUE_ADDRESS | |
264 | fi | |
265 | if [ "$ORANGE_DEV" != "" ]; then | |
266 | /sbin/iptables -t nat -A POSTROUTING -m mark --mark 3 -j SNAT --to-source $ORANGE_ADDRESS | |
267 | fi | |
268 | ||
3a1019f6 MT |
269 | # run local firewall configuration, if present |
270 | if [ -x /etc/sysconfig/firewall.local ]; then | |
271 | /etc/sysconfig/firewall.local start | |
272 | fi | |
273 | ||
274 | # last rule in input and forward chain is for logging. | |
5595bc03 CS |
275 | |
276 | if [ "$DROPINPUT" == "on" ]; then | |
97fe1741 | 277 | /sbin/iptables -A INPUT -m limit --limit 10/minute -j LOG --log-prefix "DROP_INPUT " |
5595bc03 | 278 | fi |
97fe1741 | 279 | /sbin/iptables -A INPUT -j DROP -m comment --comment "DROP_INPUT" |
62fc8511 AM |
280 | #if [ "$DROPFORWARD" == "on" ]; then |
281 | # /sbin/iptables -A FORWARD -m limit --limit 10/minute -j LOG --log-prefix "DROP_FORWARD " | |
282 | #fi | |
283 | #/sbin/iptables -A FORWARD -j DROP -m comment --comment "DROP_FORWARD" | |
284 | ||
285 | #POLICY CHAIN | |
286 | /sbin/iptables -N POLICY | |
287 | /sbin/iptables -A FORWARD -j POLICY | |
6be0579b | 288 | |
62fc8511 | 289 | /usr/sbin/firewall-forward-policy |
fd10a52c | 290 | ;; |
13211b21 CS |
291 | startovpn) |
292 | # run openvpn | |
293 | /usr/local/bin/openvpnctrl --create-chains-and-rules | |
294 | ;; | |
3a1019f6 MT |
295 | stop) |
296 | iptables_init | |
297 | # Accept everyting connected | |
298 | /sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT | |
299 | ||
300 | # localhost and ethernet. | |
301 | /sbin/iptables -A INPUT -i lo -j ACCEPT | |
302 | /sbin/iptables -A INPUT -i $GREEN_DEV -m state --state NEW -j ACCEPT | |
303 | ||
304 | if [ "$RED_DEV" != "" -a "$RED_TYPE" == "DHCP" ]; then | |
305 | /sbin/iptables -A INPUT -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
306 | /sbin/iptables -A INPUT -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
307 | fi | |
308 | if [ "$PROTOCOL" == "RFC1483" -a "$METHOD" == "DHCP" ]; then | |
309 | /sbin/iptables -A INPUT -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
310 | /sbin/iptables -A INPUT -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT | |
311 | fi | |
312 | ||
3a1019f6 MT |
313 | # run local firewall configuration, if present |
314 | if [ -x /etc/sysconfig/firewall.local ]; then | |
315 | /etc/sysconfig/firewall.local stop | |
316 | fi | |
317 | ||
5595bc03 | 318 | if [ "$DROPINPUT" == "on" ]; then |
97fe1741 | 319 | /sbin/iptables -A INPUT -m limit --limit 10/minute -j LOG --log-prefix "DROP_INPUT " |
5595bc03 | 320 | fi |
97fe1741 | 321 | /sbin/iptables -A INPUT -j DROP -m comment --comment "DROP_INPUT" |
6be0579b | 322 | if [ "$DROPFORWARD" == "on" ]; then |
62fc8511 | 323 | /sbin/iptables -A FORWARD -m limit --limit 10/minute -j LOG --log-prefix "DROP_FORWARD " |
6be0579b | 324 | fi |
62fc8511 | 325 | /sbin/iptables -A FORWARD -j DROP -m comment --comment "DROP_FORWARD" |
6be0579b | 326 | ;; |
13211b21 CS |
327 | stopovpn) |
328 | # stop openvpn | |
329 | /usr/local/bin/openvpnctrl --delete-chains-and-rules | |
330 | ;; | |
3a1019f6 MT |
331 | reload) |
332 | iptables_red | |
333 | ||
334 | # run local firewall configuration, if present | |
335 | if [ -x /etc/sysconfig/firewall.local ]; then | |
336 | /etc/sysconfig/firewall.local reload | |
337 | fi | |
338 | ;; | |
339 | restart) | |
340 | $0 stop | |
c25b6ae6 | 341 | $0 stopovpn |
3a1019f6 | 342 | $0 start |
c25b6ae6 | 343 | $0 startovpn |
3a1019f6 MT |
344 | ;; |
345 | *) | |
346 | echo "Usage: $0 {start|stop|reload|restart}" | |
347 | exit 1 | |
348 | ;; | |
349 | esac | |
350 | ||
351 | exit 0 |