]>
git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blob - config/firewall/convert-outgoingfw
2 ###############################################################################
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2013 Alexander Marx <amarx@ipfire.org> #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
20 ###############################################################################
22 # This script converts old groups and firewallrules #
23 # to the new one. This is a 3-step process. #
24 # STEP1: convert groups ->LOG /var/log/converters #
25 # STEP2: convert rules ->LOG /var/log/converters #
26 # STEP3: convert P2P rules #
28 ###############################################################################
30 require '/var/ipfire/general-functions.pl';
31 require "${General::swroot}/lang.pl";
37 my $ipgrouppath = "${General::swroot}/outgoing/groups/ipgroups/";
38 my $macgrouppath = "${General::swroot}/outgoing/groups/macgroups/";
39 my $outgoingrules = "${General::swroot}/outgoing/rules";
40 my $outfwsettings = "${General::swroot}/outgoing/settings";
41 my $host = "Converted ";
42 my $confighosts = "${General::swroot}/fwhosts/customhosts";
43 my $confignets = "${General::swroot}/fwhosts/customnetworks";
44 my $configgroups = "${General::swroot}/fwhosts/customgroups";
45 my $ovpnsettings = "${General::swroot}/ovpn/settings";
46 my $ovpnconfig = "${General::swroot}/ovpn/ovpnconfig";
47 my $ccdconfig = "${General::swroot}/ovpn/ccd.conf";
48 my $fwdfwconfig = "${General::swroot}/firewall/config";
49 my $outfwconfig = "${General::swroot}/firewall/outgoing";
50 my $fwdfwsettings = "${General::swroot}/firewall/settings";
51 my @ipgroups = qx(ls
$ipgrouppath 2>/dev/null
);
52 my @macgroups = qx(ls
$macgrouppath 2>/dev/null
);
65 my %ovpnSettings = ();
66 my @active= ('Aktiv', 'aktiv', 'Active', 'Activo', 'Actif', 'Actief', 'Aktywne', 'Активен', 'Aktif');
67 &General
::readhash
("${General::swroot}/ovpn/settings", \
%ovpnSettings);
68 &General
::readhash
("${General::swroot}/ethernet/settings", \
%ownnet);
70 if (-e
"$outfwsettings") {
71 &General
::readhash
($outfwsettings,\
%outsettings);
75 print "Config file for outgoing-firewall not found. Exiting!\n";
79 if (! -s
"$outfwsettings") {
80 print "Empty DMZ configuration file. Nothing to do. Exiting...\n";
81 #Fill the firewall settings file
82 open (SETTINGS
, ">/var/ipfire/firewall/settings");
83 print SETTINGS
"POLICY=MODE2\n";
84 print SETTINGS
"POLICY1=MODE2\n";
89 #ONLY RUN if /var/ipfire/outgoing exists
90 if ( -d
"/var/ipfire/outgoing"){
97 print "/var/ipfire/outgoing not found. Exiting!\n";
101 system("/usr/local/bin/firewallctrl");
105 if(! -d
"/var/log/converters"){ mkdir("/var/log/converters");}
106 if( -f
"/var/log/converters/groups-convert.log"){rmtree
("var/log/converters");}
107 open (LOG
, ">/var/log/converters/groups-convert.log") or die $!;
109 foreach my $group (@ipgroups){
112 print LOG
"\n$now Processing IP-GROUP: $group...\n";
113 open (DATEI
, "<$ipgrouppath/$group");
114 my @zeilen = <DATEI
>;
115 foreach my $ip (@zeilen){
118 print LOG
"$now Check IP $ip from Group $group ";
119 my $val=&check_ip
($ip);
121 push(@hostarray,$val.",ip");
122 print LOG
"$now -> OK\n";
125 print LOG
"$now -> IP \"$ip\" from group $group not converted (invalid IP) \n";
129 &new_hostgrp
($group,'ip');
135 #MAC Group processing
136 foreach my $group (@macgroups){
138 print LOG
"\nProcessing MAC-GROUP: $group...\n";
139 open (DATEI
, "<$macgrouppath/$group") or die 'Unable to open config file.';
140 my @zeilen = <DATEI
>;
141 foreach my $mac (@zeilen){
144 print LOG
"$now Checking MAC $mac from group $group ";
146 if(&General
::validmac
($mac)){
150 push(@hostarray,$val.",mac");
151 print LOG
"$now -> OK\n";
154 print LOG
"$now -> Mac $mac from group $group not converted (invalid MAC)\n";
158 &new_hostgrp
($group,'mac');
168 #ip with subnet in decimal
169 if($adr =~ m/^(\d\d?\d?).(\d\d?\d?).(\d\d?\d?).(\d\d?\d?)\/(\d
{1,2})$/){
170 $adr=int($1).".".int($2).".".int($3).".".int($4);
171 my $b = &General
::iporsubtodec
($5);
173 }elsif($adr =~ /^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/){
174 $adr=int($1).".".int($2).".".int($3).".".int($4);
175 if(&General
::validip
($adr)){
176 $a=$adr."/255.255.255.255";
179 if(&General
::validipandmask
($adr)){
180 $a=&General
::iporsubtodec
($adr);
186 &General
::readhasharray
($confighosts,\
%hosts);
187 &General
::readhasharray
($confignets,\
%nets);
188 &General
::readhasharray
($configgroups,\
%groups);
191 my $name; #"converted"
193 my $name3; #custom host/custom net
195 foreach my $adr (@hostarray){
197 my ($ip,$type) = split(",",$adr);
198 my ($ippart,$subnet) = split("/",$ip);
199 my ($byte1,$byte2,$byte3,$byte4) = split(/\./,$subnet);
201 print LOG
"Processing SINGLE HOST $ippart/$subnet from group $grp\n";
202 if(!&check_host
($ip)){
203 my $key = &General
::findhasharraykey
(\
%hosts);
205 $name2=$name.$ippart;
206 $name3="Custom Host";
207 $hosts{$key}[0] = $name2;
208 $hosts{$key}[1] = $type;
209 $hosts{$key}[2] = $ip;
210 $hosts{$key}[3] = '';
211 print LOG
"->Host (IP) $ip added to custom hosts\n"
213 print LOG
"->Host (IP) $ip already exists in custom hosts\n";
215 $name2=$name.$ippart;
217 $name2=$name.$ippart;
218 $name3="Custom Host";
220 }elsif($byte4 < '255'){
221 print LOG
"Processing NETWORK $ippart/$subnet from Group $grp\n";
222 if(!&check_net
($ippart,$subnet)){
223 #Check if this network is one one of IPFire internal networks
224 if (($ownnet{'GREEN_NETADDRESS'} ne '' && $ownnet{'GREEN_NETADDRESS'} ne '0.0.0.0') && &General
::IpInSubnet
($ippart,$ownnet{'GREEN_NETADDRESS'},$ownnet{'GREEN_NETMASK'}))
227 $name3='Standard Network';
228 }elsif (($ownnet{'ORANGE_NETADDRESS'} ne '' && $ownnet{'ORANGE_NETADDRESS'} ne '0.0.0.0') && &General
::IpInSubnet
($ippart,$ownnet{'ORANGE_NETADDRESS'},$ownnet{'ORANGE_NETMASK'}))
231 $name3='Standard Network';
232 }elsif (($ownnet{'BLUE_NETADDRESS'} ne '' && $ownnet{'BLUE_NETADDRESS'} ne '0.0.0.0') && &General
::IpInSubnet
($ippart,$ownnet{'BLUE_NETADDRESS'},$ownnet{'BLUE_NETMASK'}))
235 $name3='Standard Network';
236 }elsif ($ippart eq '0.0.0.0')
239 $name3='Standard Network';
240 }elsif(defined($ovpnSettings{'DOVPN_SUBNET'}) && "$ippart/".&General
::iporsubtodec
($subnet) eq $ovpnSettings{'DOVPN_SUBNET'})
242 $name2='OpenVPN-Dyn';
243 $name3='Standard Network';
245 my $netkey = &General
::findhasharraykey
(\
%nets);
247 $name2=$name.$ippart;
248 $name3="Custom Network";
249 $nets{$netkey}[0] = $name2;
250 $nets{$netkey}[1] = $ippart;
251 $nets{$netkey}[2] = $subnet;
252 $nets{$netkey}[3] = '';
253 print LOG
"->Network $ippart/$subnet added to custom networks\n";
256 print LOG
"Network $ippart already exists in custom networks\n";
258 $name2=$name.$ippart;
260 $name2=$name.$ippart;
261 $name3="Custom Network";
264 if($name2 && !&check_grp
($grp,$name2)){
265 my $grpkey = &General
::findhasharraykey
(\
%groups);
266 $groups{$grpkey}[0] = $grp;
267 $groups{$grpkey}[1] = '';
268 $groups{$grpkey}[2] = $name2;
269 $groups{$grpkey}[3] = $name3;
270 print LOG
"->$name2 added to group $grp\n";
272 }elsif($run eq 'mac'){
274 my ($mac,$type) = split(",",$adr);
275 print LOG
"Processing HOST (MAC) $mac\n";
276 if(!&check_host
($mac)){
277 my $key = &General
::findhasharraykey
(\
%hosts);
282 $name3="Custom Host";
283 $hosts{$key}[0] = $name2;
284 $hosts{$key}[1] = $type;
285 $hosts{$key}[2] = $mac;
286 print LOG
"->Host (MAC) $mac added to custom hosts\n";
290 print LOG
"->Host (MAC) $mac already exists in custom hosts \n";
293 $name3="Custom Host";
295 if($name2 && !&check_grp
($grp,$name2)){
296 my $grpkey = &General
::findhasharraykey
(\
%groups);
297 $groups{$grpkey}[0] = $grp;
298 $groups{$grpkey}[1] = '';
299 $groups{$grpkey}[2] = $name2;
300 $groups{$grpkey}[3] = $name3;
301 print LOG
"->$name2 added to group $grp\n";
306 &General
::writehasharray
($confighosts,\
%hosts);
307 &General
::writehasharray
($configgroups,\
%groups);
308 &General
::writehasharray
($confignets,\
%nets);
314 foreach my $key (sort keys %hosts)
316 if($hosts{$key}[2] eq $ip)
327 foreach my $key (sort keys %nets)
329 if($nets{$key}[1] eq $ip && $nets{$key}[2] eq $sub)
340 foreach my $key (sort keys %groups)
342 if($groups{$key}[0] eq $grp && $groups{$key}[2] eq $value)
351 my ($type,$action,$active,$grp1,$source,$grp2,$useport,$port,$prot,$grp3,$target,$remark,$log,$time,$time_mon,$time_tue,$time_wed,$time_thu,$time_fri,$time_sat,$time_sun,$time_from,$time_to);
353 if( -f
"/var/log/converters/outgoingfw-convert.log"){unlink ("/var/log/converters/outgoingfw-convert.log");}
354 open (LOG
, ">/var/log/converters/outgoingfw-convert.log") or die $!;
356 &General
::readhash
($fwdfwsettings,\
%fwdsettings);
357 if ($outsettings{'POLICY'} eq 'MODE1'){
358 $fwdsettings{'POLICY'}='MODE1';
359 $fwdsettings{'POLICY1'}='MODE2';
363 $fwdsettings{'POLICY'}='MODE2';
364 $fwdsettings{'POLICY1'}='MODE2';
368 &General
::writehash
($fwdfwsettings,\
%fwdsettings);
369 open (DATEI
, "<$outgoingrules");
371 foreach my $rule (@lines)
373 &General
::readhasharray
($fwdfwconfig,\
%fwconfig);
374 &General
::readhasharray
($outfwconfig,\
%fwconfigout);
378 print LOG
"$now processing: $rule\n";
380 @configline = split( /\;/, $rule );
382 if($configline[0] eq $type){
383 #some variables we can use from old config
384 if($configline[1] eq 'on'){ $active='ON';}else{$active='';}
385 if($configline[3] eq 'all' && $configline[8] ne ''){
388 }elsif($configline[3] eq 'all' && $configline[8] eq ''){
391 push(@prot,$configline[3]);
393 if($configline[4] ne ''){
394 $configline[4] =~ s/,/;/g;
395 $remark = $configline[4];
397 #find all "active" tags in all language files and check them against the old config
400 $logging='1' if ($_ eq $configline[9]);
402 if($logging eq '1' ){ $log='ON';}else{$log='';}
403 if($configline[10] eq 'on' && $configline[11] eq 'on' && $configline[12] eq 'on' && $configline[13] eq 'on' && $configline[14] eq 'on' && $configline[15] eq 'on' && $configline[16] eq 'on'){
404 if($configline[17] eq '00:00' && $configline[18] eq '00:00'){
412 $time_mon=$configline[10];
413 $time_tue=$configline[11];
414 $time_wed=$configline[12];
415 $time_thu=$configline[13];
416 $time_fri=$configline[14];
417 $time_sat=$configline[15];
418 $time_sun=$configline[16];
419 $time_from=$configline[17];
420 $time_to=$configline[18];
421 ############################################################
423 if ($configline[2] eq 'green') {
426 }elsif ($configline[2] eq 'orange') {
429 }elsif ($configline[2] eq 'red') {
432 &General
::readhash
($fwdfwsettings,\
%fwdsettings);
433 $fwdsettings{'POLICY1'}=$outsettings{'POLICY'};
434 $fwdsettings{'POLICY'}=$outsettings{'POLICY'};
435 &General
::writehash
($fwdfwsettings,\
%fwdsettings);
436 }elsif ($configline[2] eq 'blue') {
439 }elsif ($configline[2] eq 'ipsec') {
440 print LOG
"$now -> Rule not converted, ipsec+ interface is obsolet since IPFire 2.7 \n";
442 }elsif ($configline[2] eq 'ovpn') {
443 print LOG
"$now ->Creating networks/groups for OpenVPN...\n";
445 $grp1='cust_grp_src';
447 }elsif ($configline[2] eq 'ip') {
448 my $z=&check_ip
($configline[5]);
450 my ($ipa,$subn) = split("/",$z);
451 $subn=&General
::iporsubtocidr
($subn);
453 $source="$ipa/$subn";
455 print LOG
"$now -> Rule not converted, missing/invalid source ip \"$configline[5]\"\n";
458 }elsif ($configline[2] eq 'mac') {
459 if(&General
::validmac
($configline[6])){
461 $source=$configline[6];
463 print LOG
"$now -> Rule not converted, invalid MAC \"$configline[6]\" \n";
466 }elsif ($configline[2] eq 'all') {
470 foreach my $key (sort keys %groups){
471 if($groups{$key}[0] eq $configline[2]){
472 $grp1='cust_grp_src';
473 $source=$configline[2];
476 if ($grp1 eq '' || $source eq ''){
477 print LOG
"$now -> Rule not converted, no valid source recognised\n";
480 ############################################################
482 if($configline[7] ne '' && $configline[7] ne '0.0.0.0'){
483 my $address=&check_ip
($configline[7]);
485 my ($dip,$dsub) = split("/",$address);
486 $dsub=&General
::iporsubtocidr
($dsub);
488 $target="$dip/$dsub";
490 my $getwebsiteip=&get_ip_from_domain
($configline[7]);
493 $target=$getwebsiteip;
494 $remark.=" $configline[7]";
496 print LOG
"$now -> Rule not converted, invalid domain \"$configline[7]\"\n";
504 if($configline[8] ne '' && $configline[3] ne 'gre' && $configline[3] ne 'esp'){
506 my @parts=split(",",$configline[8]);
509 if (!($_ =~ /^(\d+)\:(\d+)$/)) {
510 if(&General
::validport
($_)){
515 print LOG
"$now -> Rule not converted, invalid destination Port \"$configline[8]\"\n";
519 my ($a1,$a2) = split(/\:/,$_);
520 if (&General
::validport
($a1) && &General
::validport
($a2) && $a1 < $a2){
522 push (@values,"$a1:$a2");
525 print LOG
"$now -> Rule not converted, invalid destination Port \"$configline[8]\"\n";
530 $port=join("|",@values);
535 print LOG
"-> Rule not converted because not for Firewall mode $outsettings{'POLICY'} (we are only converting for actual mode)\n";
539 foreach my $protocol (@prot){
541 if ($source eq 'RED1'){
546 $protocol=uc($protocol);
547 print LOG
"$now -> Converted: $action,$chain,$active,$grp1,$source,$grp2,$target,,$protocol,,,$useport,,,$grp3,$port,$remark,$log,$time,$time_mon,$time_tue,$time_wed,$time_thu,$time_fri,$time_sat,$time_sun,$time_from,$time_to\n";
548 #Put rules into system....
549 ###########################
550 #check for double rules
551 foreach my $key (sort keys %fwconfig){
552 if("$action,$chain,$active,$grp1,$source,$grp2,$target,$protocol,$useport,$grp3,$port,$remark,$log,$time,$time_mon,$time_tue,$time_wed,$time_thu,$time_fri,$time_sat,$time_sun,$time_from,$time_to"
553 eq "$fwconfig{$key}[0],$fwconfig{$key}[1],$fwconfig{$key}[2],$fwconfig{$key}[3],$fwconfig{$key}[4],$fwconfig{$key}[5],$fwconfig{$key}[6],$fwconfig{$key}[8],$fwconfig{$key}[11],$fwconfig{$key}[14],$fwconfig{$key}[15],$fwconfig{$key}[16],$fwconfig{$key}[17],$fwconfig{$key}[18],$fwconfig{$key}[19],$fwconfig{$key}[20],$fwconfig{$key}[21],$fwconfig{$key}[22],$fwconfig{$key}[23],$fwconfig{$key}[24],$fwconfig{$key}[25],$fwconfig{$key}[26],$fwconfig{$key}[27]"){
559 if ($chain eq 'FORWARDFW'){
560 my $key = &General
::findhasharraykey
(\
%fwconfig);
561 $fwconfig{$key}[0] = $action;
562 $fwconfig{$key}[1] = $chain;
563 $fwconfig{$key}[2] = $active;
564 $fwconfig{$key}[3] = $grp1;
565 $fwconfig{$key}[4] = $source;
566 $fwconfig{$key}[5] = $grp2;
567 $fwconfig{$key}[6] = $target;
568 $fwconfig{$key}[8] = $protocol;
569 $fwconfig{$key}[11] = $useport;
570 $fwconfig{$key}[14] = $grp3;
571 $fwconfig{$key}[15] = $port;
572 $fwconfig{$key}[16] = $remark;
573 $fwconfig{$key}[17] = $log;
574 $fwconfig{$key}[18] = $time;
575 $fwconfig{$key}[19] = $time_mon;
576 $fwconfig{$key}[20] = $time_tue;
577 $fwconfig{$key}[21] = $time_wed;
578 $fwconfig{$key}[22] = $time_thu;
579 $fwconfig{$key}[23] = $time_fri;
580 $fwconfig{$key}[24] = $time_sat;
581 $fwconfig{$key}[25] = $time_sun;
582 $fwconfig{$key}[26] = $time_from;
583 $fwconfig{$key}[27] = $time_to;
584 $fwconfig{$key}[28] = '';
585 $fwconfig{$key}[29] = 'ALL';
586 $fwconfig{$key}[30] = '';
587 $fwconfig{$key}[31] = 'dnat';
588 &General
::writehasharray
($fwdfwconfig,\
%fwconfig);
590 my $key = &General
::findhasharraykey
(\
%fwconfigout);
591 $fwconfigout{$key}[0] = $action;
592 $fwconfigout{$key}[1] = $chain;
593 $fwconfigout{$key}[2] = $active;
594 $fwconfigout{$key}[3] = $grp1;
595 $fwconfigout{$key}[4] = $source;
596 $fwconfigout{$key}[5] = $grp2;
597 $fwconfigout{$key}[6] = $target;
598 $fwconfigout{$key}[8] = $protocol;
599 $fwconfigout{$key}[11] = $useport;
600 $fwconfigout{$key}[14] = $grp3;
601 $fwconfigout{$key}[15] = $port;
602 $fwconfigout{$key}[16] = $remark;
603 $fwconfigout{$key}[17] = $log;
604 $fwconfigout{$key}[18] = $time;
605 $fwconfigout{$key}[19] = $time_mon;
606 $fwconfigout{$key}[20] = $time_tue;
607 $fwconfigout{$key}[21] = $time_wed;
608 $fwconfigout{$key}[22] = $time_thu;
609 $fwconfigout{$key}[23] = $time_fri;
610 $fwconfigout{$key}[24] = $time_sat;
611 $fwconfigout{$key}[25] = $time_sun;
612 $fwconfigout{$key}[26] = $time_from;
613 $fwconfigout{$key}[27] = $time_to;
614 $fwconfigout{$key}[28] = '';
615 $fwconfigout{$key}[29] = 'ALL';
616 $fwconfigout{$key}[30] = '';
617 $fwconfigout{$key}[31] = 'dnat';
618 &General
::writehasharray
($outfwconfig,\
%fwconfigout);
627 sub get_ip_from_domain
632 my ($name,$aliases,$addrtype,$length,@addrs) = gethostbyname($web);
634 $resolvedip=inet_ntoa
($addrs[0]);
642 &General
::readhasharray
($confighosts,\
%hosts);
643 &General
::readhasharray
($confignets,\
%nets);
644 &General
::readhasharray
($configgroups,\
%groups);
645 &General
::readhasharray
($ovpnconfig,\
%configovpn);
646 &General
::readhasharray
($ccdconfig,\
%ccdconf);
647 &General
::readhash
($ovpnsettings,\
%settingsovpn);
650 if($settingsovpn{'DOVPN_SUBNET'}){
651 my ($net,$subnet)=split("/",$settingsovpn{'DOVPN_SUBNET'});
652 push (@ovpnnets,"$net,$subnet,dynamic");
653 print LOG
"$now ->found dynamic OpenVPN net\n";
655 foreach my $key (sort keys %ccdconf){
656 my ($net,$subnet)=split("/",$ccdconf{$key}[1]);
657 $subnet=&General
::iporsubtodec
($subnet);
658 push (@ovpnnets,"$net,$subnet,$ccdconf{$key}[0]");
659 print LOG
"$now ->found OpenVPN static net $net/$subnet\n";
661 foreach my $key (sort keys %configovpn){
662 if ($configovpn{$key}[3] eq 'net'){
663 my ($net,$subnet)=split("/",$configovpn{$key}[27]);
664 push (@ovpnnets,"$net,$subnet,$configovpn{$key}[2]");
665 print LOG
"$now ->found OpenVPN $net/$subnet $configovpn{$key}[2]\n";
668 #add ovpn nets to customnetworks/groups
669 foreach my $line (@ovpnnets){
671 my ($net,$subnet,$name) = split(",",$line);
672 if (!&check_net
($net,$subnet)){
673 my $netkey = &General
::findhasharraykey
(\
%nets);
674 $name2=$name."(ovpn)".$net;
675 $name3="Custom Network";
676 $nets{$netkey}[0] = $name2;
677 $nets{$netkey}[1] = $net;
678 $nets{$netkey}[2] = $subnet;
679 $nets{$netkey}[3] = '';
680 print LOG
"$now ->added $name2 $net/$subnet to customnetworks\n";
682 print LOG
"-> Custom Network with same IP already exist \"$net/$subnet\" (you can ignore this, if this run was manual from shell)\n";
685 my $grpkey = &General
::findhasharraykey
(\
%groups);
686 $groups{$grpkey}[0] = "ovpn";
687 $groups{$grpkey}[1] = '';
688 $groups{$grpkey}[2] = $name2;
689 $groups{$grpkey}[3] = "Custom Network";
690 print LOG
"$now ->added $name2 to customgroup ovpn\n";
695 &General
::writehasharray
($confighosts,\
%hosts);
696 &General
::writehasharray
($configgroups,\
%groups);
697 &General
::writehasharray
($confignets,\
%nets);
698 print LOG
"$now ->finished OVPN\n";
702 copy
("/var/ipfire/outgoing/p2protocols","/var/ipfire/firewall/p2protocols");
703 chown 99, 99, '/var/ipfire/firewall/p2protocols';