]>
git.ipfire.org Git - people/teissler/ipfire-2.x.git/blob - config/firewall/convert-outgoingfw
2 ###############################################################################
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2013 Alexander Marx <amarx@ipfire.org> #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
20 ###############################################################################
22 # This script converts old groups and firewallrules #
23 # to the new one. This is a 3-step process. #
24 # STEP1: convert groups ->LOG /var/log/converters #
25 # STEP2: convert rules ->LOG /var/log/converters #
26 # STEP3: convert P2P rules #
28 ###############################################################################
30 require '/var/ipfire/general-functions.pl';
31 require "${General::swroot}/lang.pl";
37 my $ipgrouppath = "${General::swroot}/outgoing/groups/ipgroups/";
38 my $macgrouppath = "${General::swroot}/outgoing/groups/macgroups/";
39 my $outgoingrules = "${General::swroot}/outgoing/rules";
40 my $outfwsettings = "${General::swroot}/outgoing/settings";
41 my $host = "Converted ";
42 my $confighosts = "${General::swroot}/fwhosts/customhosts";
43 my $confignets = "${General::swroot}/fwhosts/customnetworks";
44 my $configgroups = "${General::swroot}/fwhosts/customgroups";
45 my $ovpnsettings = "${General::swroot}/ovpn/settings";
46 my $ovpnconfig = "${General::swroot}/ovpn/ovpnconfig";
47 my $ccdconfig = "${General::swroot}/ovpn/ccd.conf";
48 my $fwdfwconfig = "${General::swroot}/firewall/config";
49 my $outfwconfig = "${General::swroot}/firewall/outgoing";
50 my $fwdfwsettings = "${General::swroot}/firewall/settings";
51 my @ipgroups = qx(ls
$ipgrouppath 2>/dev/null
);
52 my @macgroups = qx(ls
$macgrouppath 2>/dev/null
);
65 my %ovpnSettings = ();
66 my @active= ('Aktiv', 'aktiv', 'Active', 'Activo', 'Actif', 'Actief', 'Aktywne', 'Активен', 'Aktif');
67 &General
::readhash
("${General::swroot}/ovpn/settings", \
%ovpnSettings);
68 &General
::readhash
("${General::swroot}/ethernet/settings", \
%ownnet);
70 if (-e
"$outfwsettings") {
71 &General
::readhash
($outfwsettings,\
%outsettings);
75 print "Config file for outgoing-firewall not found. Exiting!\n";
79 if (! -s
"$outfwsettings") {
80 print "Empty DMZ configuration file. Nothing to do. Exiting...\n";
84 #ONLY RUN if /var/ipfire/outgoing exists
85 if ( -d
"/var/ipfire/outgoing"){
92 print "/var/ipfire/outgoing not found. Exiting!\n";
96 system("/usr/local/bin/firewallctrl");
100 if(! -d
"/var/log/converters"){ mkdir("/var/log/converters");}
101 if( -f
"/var/log/converters/groups-convert.log"){rmtree
("var/log/converters");}
102 open (LOG
, ">/var/log/converters/groups-convert.log") or die $!;
104 foreach my $group (@ipgroups){
107 print LOG
"\n$now Processing IP-GROUP: $group...\n";
108 open (DATEI
, "<$ipgrouppath/$group");
109 my @zeilen = <DATEI
>;
110 foreach my $ip (@zeilen){
113 print LOG
"$now Check IP $ip from Group $group ";
114 my $val=&check_ip
($ip);
116 push(@hostarray,$val.",ip");
117 print LOG
"$now -> OK\n";
120 print LOG
"$now -> IP \"$ip\" from group $group not converted (invalid IP) \n";
124 &new_hostgrp
($group,'ip');
130 #MAC Group processing
131 foreach my $group (@macgroups){
133 print LOG
"\nProcessing MAC-GROUP: $group...\n";
134 open (DATEI
, "<$macgrouppath/$group") or die 'Unable to open config file.';
135 my @zeilen = <DATEI
>;
136 foreach my $mac (@zeilen){
139 print LOG
"$now Checking MAC $mac from group $group ";
141 if(&General
::validmac
($mac)){
145 push(@hostarray,$val.",mac");
146 print LOG
"$now -> OK\n";
149 print LOG
"$now -> Mac $mac from group $group not converted (invalid MAC)\n";
153 &new_hostgrp
($group,'mac');
163 #ip with subnet in decimal
164 if($adr =~ m/^(\d\d?\d?).(\d\d?\d?).(\d\d?\d?).(\d\d?\d?)\/(\d
{1,2})$/){
165 $adr=int($1).".".int($2).".".int($3).".".int($4);
166 my $b = &General
::iporsubtodec
($5);
168 }elsif($adr =~ /^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/){
169 $adr=int($1).".".int($2).".".int($3).".".int($4);
170 if(&General
::validip
($adr)){
171 $a=$adr."/255.255.255.255";
174 if(&General
::validipandmask
($adr)){
175 $a=&General
::iporsubtodec
($adr);
181 &General
::readhasharray
($confighosts,\
%hosts);
182 &General
::readhasharray
($confignets,\
%nets);
183 &General
::readhasharray
($configgroups,\
%groups);
186 my $name; #"converted"
188 my $name3; #custom host/custom net
190 foreach my $adr (@hostarray){
192 my ($ip,$type) = split(",",$adr);
193 my ($ippart,$subnet) = split("/",$ip);
194 my ($byte1,$byte2,$byte3,$byte4) = split(/\./,$subnet);
196 print LOG
"Processing SINGLE HOST $ippart/$subnet from group $grp\n";
197 if(!&check_host
($ip)){
198 my $key = &General
::findhasharraykey
(\
%hosts);
200 $name2=$name.$ippart;
201 $name3="Custom Host";
202 $hosts{$key}[0] = $name2;
203 $hosts{$key}[1] = $type;
204 $hosts{$key}[2] = $ip;
205 $hosts{$key}[3] = '';
206 print LOG
"->Host (IP) $ip added to custom hosts\n"
208 print LOG
"->Host (IP) $ip already exists in custom hosts\n";
210 $name2=$name.$ippart;
212 $name2=$name.$ippart;
213 $name3="Custom Host";
215 }elsif($byte4 < '255'){
216 print LOG
"Processing NETWORK $ippart/$subnet from Group $grp\n";
217 if(!&check_net
($ippart,$subnet)){
218 #Check if this network is one one of IPFire internal networks
219 if (($ownnet{'GREEN_NETADDRESS'} ne '' && $ownnet{'GREEN_NETADDRESS'} ne '0.0.0.0') && &General
::IpInSubnet
($ippart,$ownnet{'GREEN_NETADDRESS'},$ownnet{'GREEN_NETMASK'}))
222 $name3='Standard Network';
223 }elsif (($ownnet{'ORANGE_NETADDRESS'} ne '' && $ownnet{'ORANGE_NETADDRESS'} ne '0.0.0.0') && &General
::IpInSubnet
($ippart,$ownnet{'ORANGE_NETADDRESS'},$ownnet{'ORANGE_NETMASK'}))
226 $name3='Standard Network';
227 }elsif (($ownnet{'BLUE_NETADDRESS'} ne '' && $ownnet{'BLUE_NETADDRESS'} ne '0.0.0.0') && &General
::IpInSubnet
($ippart,$ownnet{'BLUE_NETADDRESS'},$ownnet{'BLUE_NETMASK'}))
230 $name3='Standard Network';
231 }elsif ($ippart eq '0.0.0.0')
234 $name3='Standard Network';
235 }elsif(defined($ovpnSettings{'DOVPN_SUBNET'}) && "$ippart/".&General
::iporsubtodec
($subnet) eq $ovpnSettings{'DOVPN_SUBNET'})
237 $name2='OpenVPN-Dyn';
238 $name3='Standard Network';
240 my $netkey = &General
::findhasharraykey
(\
%nets);
242 $name2=$name.$ippart;
243 $name3="Custom Network";
244 $nets{$netkey}[0] = $name2;
245 $nets{$netkey}[1] = $ippart;
246 $nets{$netkey}[2] = $subnet;
247 $nets{$netkey}[3] = '';
248 print LOG
"->Network $ippart/$subnet added to custom networks\n";
251 print LOG
"Network $ippart already exists in custom networks\n";
253 $name2=$name.$ippart;
255 $name2=$name.$ippart;
256 $name3="Custom Network";
259 if($name2 && !&check_grp
($grp,$name2)){
260 my $grpkey = &General
::findhasharraykey
(\
%groups);
261 $groups{$grpkey}[0] = $grp;
262 $groups{$grpkey}[1] = '';
263 $groups{$grpkey}[2] = $name2;
264 $groups{$grpkey}[3] = $name3;
265 print LOG
"->$name2 added to group $grp\n";
267 }elsif($run eq 'mac'){
269 my ($mac,$type) = split(",",$adr);
270 print LOG
"Processing HOST (MAC) $mac\n";
271 if(!&check_host
($mac)){
272 my $key = &General
::findhasharraykey
(\
%hosts);
277 $name3="Custom Host";
278 $hosts{$key}[0] = $name2;
279 $hosts{$key}[1] = $type;
280 $hosts{$key}[2] = $mac;
281 print LOG
"->Host (MAC) $mac added to custom hosts\n";
285 print LOG
"->Host (MAC) $mac already exists in custom hosts \n";
288 $name3="Custom Host";
290 if($name2 && !&check_grp
($grp,$name2)){
291 my $grpkey = &General
::findhasharraykey
(\
%groups);
292 $groups{$grpkey}[0] = $grp;
293 $groups{$grpkey}[1] = '';
294 $groups{$grpkey}[2] = $name2;
295 $groups{$grpkey}[3] = $name3;
296 print LOG
"->$name2 added to group $grp\n";
301 &General
::writehasharray
($confighosts,\
%hosts);
302 &General
::writehasharray
($configgroups,\
%groups);
303 &General
::writehasharray
($confignets,\
%nets);
309 foreach my $key (sort keys %hosts)
311 if($hosts{$key}[2] eq $ip)
322 foreach my $key (sort keys %nets)
324 if($nets{$key}[1] eq $ip && $nets{$key}[2] eq $sub)
335 foreach my $key (sort keys %groups)
337 if($groups{$key}[0] eq $grp && $groups{$key}[2] eq $value)
346 my ($type,$action,$active,$grp1,$source,$grp2,$useport,$port,$prot,$grp3,$target,$remark,$log,$time,$time_mon,$time_tue,$time_wed,$time_thu,$time_fri,$time_sat,$time_sun,$time_from,$time_to);
348 if( -f
"/var/log/converters/outgoingfw-convert.log"){unlink ("/var/log/converters/outgoingfw-convert.log");}
349 open (LOG
, ">/var/log/converters/outgoingfw-convert.log") or die $!;
351 &General
::readhash
($fwdfwsettings,\
%fwdsettings);
352 if ($outsettings{'POLICY'} eq 'MODE1'){
353 $fwdsettings{'POLICY'}='MODE1';
354 $fwdsettings{'POLICY1'}='MODE2';
358 $fwdsettings{'POLICY'}='MODE2';
359 $fwdsettings{'POLICY1'}='MODE2';
363 &General
::writehash
($fwdfwsettings,\
%fwdsettings);
364 open (DATEI
, "<$outgoingrules");
366 foreach my $rule (@lines)
368 &General
::readhasharray
($fwdfwconfig,\
%fwconfig);
369 &General
::readhasharray
($outfwconfig,\
%fwconfigout);
373 print LOG
"$now processing: $rule\n";
375 @configline = split( /\;/, $rule );
377 if($configline[0] eq $type){
378 #some variables we can use from old config
379 if($configline[1] eq 'on'){ $active='ON';}else{$active='';}
380 if($configline[3] eq 'all' && $configline[8] ne ''){
383 }elsif($configline[3] eq 'all' && $configline[8] eq ''){
386 push(@prot,$configline[3]);
388 if($configline[4] ne ''){
389 $configline[4] =~ s/,/;/g;
390 $remark = $configline[4];
392 #find all "active" tags in all language files and check them against the old config
395 $logging='1' if ($_ eq $configline[9]);
397 if($logging eq '1' ){ $log='ON';}else{$log='';}
398 if($configline[10] eq 'on' && $configline[11] eq 'on' && $configline[12] eq 'on' && $configline[13] eq 'on' && $configline[14] eq 'on' && $configline[15] eq 'on' && $configline[16] eq 'on'){
399 if($configline[17] eq '00:00' && $configline[18] eq '00:00'){
407 $time_mon=$configline[10];
408 $time_tue=$configline[11];
409 $time_wed=$configline[12];
410 $time_thu=$configline[13];
411 $time_fri=$configline[14];
412 $time_sat=$configline[15];
413 $time_sun=$configline[16];
414 $time_from=$configline[17];
415 $time_to=$configline[18];
416 ############################################################
418 if ($configline[2] eq 'green') {
421 }elsif ($configline[2] eq 'orange') {
424 }elsif ($configline[2] eq 'red') {
427 &General
::readhash
($fwdfwsettings,\
%fwdsettings);
428 $fwdsettings{'POLICY1'}=$outsettings{'POLICY'};
429 $fwdsettings{'POLICY'}=$outsettings{'POLICY'};
430 &General
::writehash
($fwdfwsettings,\
%fwdsettings);
431 }elsif ($configline[2] eq 'blue') {
434 }elsif ($configline[2] eq 'ipsec') {
435 print LOG
"$now -> Rule not converted, ipsec+ interface is obsolet since IPFire 2.7 \n";
437 }elsif ($configline[2] eq 'ovpn') {
438 print LOG
"$now ->Creating networks/groups for OpenVPN...\n";
440 $grp1='cust_grp_src';
442 }elsif ($configline[2] eq 'ip') {
443 my $z=&check_ip
($configline[5]);
445 my ($ipa,$subn) = split("/",$z);
446 $subn=&General
::iporsubtocidr
($subn);
448 $source="$ipa/$subn";
450 print LOG
"$now -> Rule not converted, missing/invalid source ip \"$configline[5]\"\n";
453 }elsif ($configline[2] eq 'mac') {
454 if(&General
::validmac
($configline[6])){
456 $source=$configline[6];
458 print LOG
"$now -> Rule not converted, invalid MAC \"$configline[6]\" \n";
461 }elsif ($configline[2] eq 'all') {
465 foreach my $key (sort keys %groups){
466 if($groups{$key}[0] eq $configline[2]){
467 $grp1='cust_grp_src';
468 $source=$configline[2];
471 if ($grp1 eq '' || $source eq ''){
472 print LOG
"$now -> Rule not converted, no valid source recognised\n";
475 ############################################################
477 if($configline[7] ne '' && $configline[7] ne '0.0.0.0'){
478 my $address=&check_ip
($configline[7]);
480 my ($dip,$dsub) = split("/",$address);
481 $dsub=&General
::iporsubtocidr
($dsub);
483 $target="$dip/$dsub";
485 my $getwebsiteip=&get_ip_from_domain
($configline[7]);
488 $target=$getwebsiteip;
489 $remark.=" $configline[7]";
491 print LOG
"$now -> Rule not converted, invalid domain \"$configline[7]\"\n";
499 if($configline[8] ne '' && $configline[3] ne 'gre' && $configline[3] ne 'esp'){
501 my @parts=split(",",$configline[8]);
504 if (!($_ =~ /^(\d+)\:(\d+)$/)) {
505 if(&General
::validport
($_)){
510 print LOG
"$now -> Rule not converted, invalid destination Port \"$configline[8]\"\n";
514 my ($a1,$a2) = split(/\:/,$_);
515 if (&General
::validport
($a1) && &General
::validport
($a2) && $a1 < $a2){
517 push (@values,"$a1:$a2");
520 print LOG
"$now -> Rule not converted, invalid destination Port \"$configline[8]\"\n";
525 $port=join("|",@values);
530 print LOG
"-> Rule not converted because not for Firewall mode $outsettings{'POLICY'} (we are only converting for actual mode)\n";
534 foreach my $protocol (@prot){
536 if ($source eq 'IPFire'){
541 $protocol=uc($protocol);
542 print LOG
"$now -> Converted: $action,$chain,$active,$grp1,$source,$grp2,$target,,$protocol,,,$useport,,,$grp3,$port,$remark,$log,$time,$time_mon,$time_tue,$time_wed,$time_thu,$time_fri,$time_sat,$time_sun,$time_from,$time_to\n";
543 #Put rules into system....
544 ###########################
545 #check for double rules
546 foreach my $key (sort keys %fwconfig){
547 if("$action,$chain,$active,$grp1,$source,$grp2,$target,$protocol,$useport,$grp3,$port,$remark,$log,$time,$time_mon,$time_tue,$time_wed,$time_thu,$time_fri,$time_sat,$time_sun,$time_from,$time_to"
548 eq "$fwconfig{$key}[0],$fwconfig{$key}[1],$fwconfig{$key}[2],$fwconfig{$key}[3],$fwconfig{$key}[4],$fwconfig{$key}[5],$fwconfig{$key}[6],$fwconfig{$key}[8],$fwconfig{$key}[11],$fwconfig{$key}[14],$fwconfig{$key}[15],$fwconfig{$key}[16],$fwconfig{$key}[17],$fwconfig{$key}[18],$fwconfig{$key}[19],$fwconfig{$key}[20],$fwconfig{$key}[21],$fwconfig{$key}[22],$fwconfig{$key}[23],$fwconfig{$key}[24],$fwconfig{$key}[25],$fwconfig{$key}[26],$fwconfig{$key}[27]"){
554 if ($chain eq 'FORWARDFW'){
555 my $key = &General
::findhasharraykey
(\
%fwconfig);
556 $fwconfig{$key}[0] = $action;
557 $fwconfig{$key}[1] = $chain;
558 $fwconfig{$key}[2] = $active;
559 $fwconfig{$key}[3] = $grp1;
560 $fwconfig{$key}[4] = $source;
561 $fwconfig{$key}[5] = $grp2;
562 $fwconfig{$key}[6] = $target;
563 $fwconfig{$key}[8] = $protocol;
564 $fwconfig{$key}[11] = $useport;
565 $fwconfig{$key}[14] = $grp3;
566 $fwconfig{$key}[15] = $port;
567 $fwconfig{$key}[16] = $remark;
568 $fwconfig{$key}[17] = $log;
569 $fwconfig{$key}[18] = $time;
570 $fwconfig{$key}[19] = $time_mon;
571 $fwconfig{$key}[20] = $time_tue;
572 $fwconfig{$key}[21] = $time_wed;
573 $fwconfig{$key}[22] = $time_thu;
574 $fwconfig{$key}[23] = $time_fri;
575 $fwconfig{$key}[24] = $time_sat;
576 $fwconfig{$key}[25] = $time_sun;
577 $fwconfig{$key}[26] = $time_from;
578 $fwconfig{$key}[27] = $time_to;
579 $fwconfig{$key}[28] = '';
580 $fwconfig{$key}[29] = 'ALL';
581 $fwconfig{$key}[30] = '';
582 $fwconfig{$key}[31] = 'dnat';
583 &General
::writehasharray
($fwdfwconfig,\
%fwconfig);
585 my $key = &General
::findhasharraykey
(\
%fwconfigout);
586 $fwconfigout{$key}[0] = $action;
587 $fwconfigout{$key}[1] = $chain;
588 $fwconfigout{$key}[2] = $active;
589 $fwconfigout{$key}[3] = $grp1;
590 $fwconfigout{$key}[4] = $source;
591 $fwconfigout{$key}[5] = $grp2;
592 $fwconfigout{$key}[6] = $target;
593 $fwconfigout{$key}[8] = $protocol;
594 $fwconfigout{$key}[11] = $useport;
595 $fwconfigout{$key}[14] = $grp3;
596 $fwconfigout{$key}[15] = $port;
597 $fwconfigout{$key}[16] = $remark;
598 $fwconfigout{$key}[17] = $log;
599 $fwconfigout{$key}[18] = $time;
600 $fwconfigout{$key}[19] = $time_mon;
601 $fwconfigout{$key}[20] = $time_tue;
602 $fwconfigout{$key}[21] = $time_wed;
603 $fwconfigout{$key}[22] = $time_thu;
604 $fwconfigout{$key}[23] = $time_fri;
605 $fwconfigout{$key}[24] = $time_sat;
606 $fwconfigout{$key}[25] = $time_sun;
607 $fwconfigout{$key}[26] = $time_from;
608 $fwconfigout{$key}[27] = $time_to;
609 $fwconfigout{$key}[28] = '';
610 $fwconfigout{$key}[29] = 'ALL';
611 $fwconfigout{$key}[30] = '';
612 $fwconfigout{$key}[31] = 'dnat';
613 &General
::writehasharray
($outfwconfig,\
%fwconfigout);
622 sub get_ip_from_domain
627 my ($name,$aliases,$addrtype,$length,@addrs) = gethostbyname($web);
629 $resolvedip=inet_ntoa
($addrs[0]);
637 &General
::readhasharray
($confighosts,\
%hosts);
638 &General
::readhasharray
($confignets,\
%nets);
639 &General
::readhasharray
($configgroups,\
%groups);
640 &General
::readhasharray
($ovpnconfig,\
%configovpn);
641 &General
::readhasharray
($ccdconfig,\
%ccdconf);
642 &General
::readhash
($ovpnsettings,\
%settingsovpn);
645 if($settingsovpn{'DOVPN_SUBNET'}){
646 my ($net,$subnet)=split("/",$settingsovpn{'DOVPN_SUBNET'});
647 push (@ovpnnets,"$net,$subnet,dynamic");
648 print LOG
"$now ->found dynamic OpenVPN net\n";
650 foreach my $key (sort keys %ccdconf){
651 my ($net,$subnet)=split("/",$ccdconf{$key}[1]);
652 $subnet=&General
::iporsubtodec
($subnet);
653 push (@ovpnnets,"$net,$subnet,$ccdconf{$key}[0]");
654 print LOG
"$now ->found OpenVPN static net $net/$subnet\n";
656 foreach my $key (sort keys %configovpn){
657 if ($configovpn{$key}[3] eq 'net'){
658 my ($net,$subnet)=split("/",$configovpn{$key}[27]);
659 push (@ovpnnets,"$net,$subnet,$configovpn{$key}[2]");
660 print LOG
"$now ->found OpenVPN $net/$subnet $configovpn{$key}[2]\n";
663 #add ovpn nets to customnetworks/groups
664 foreach my $line (@ovpnnets){
666 my ($net,$subnet,$name) = split(",",$line);
667 if (!&check_net
($net,$subnet)){
668 my $netkey = &General
::findhasharraykey
(\
%nets);
669 $name2=$name."(ovpn)".$net;
670 $name3="Custom Network";
671 $nets{$netkey}[0] = $name2;
672 $nets{$netkey}[1] = $net;
673 $nets{$netkey}[2] = $subnet;
674 $nets{$netkey}[3] = '';
675 print LOG
"$now ->added $name2 $net/$subnet to customnetworks\n";
677 print LOG
"-> Custom Network with same IP already exist \"$net/$subnet\" (you can ignore this, if this run was manual from shell)\n";
680 my $grpkey = &General
::findhasharraykey
(\
%groups);
681 $groups{$grpkey}[0] = "ovpn";
682 $groups{$grpkey}[1] = '';
683 $groups{$grpkey}[2] = $name2;
684 $groups{$grpkey}[3] = "Custom Network";
685 print LOG
"$now ->added $name2 to customgroup ovpn\n";
690 &General
::writehasharray
($confighosts,\
%hosts);
691 &General
::writehasharray
($configgroups,\
%groups);
692 &General
::writehasharray
($confignets,\
%nets);
693 print LOG
"$now ->finished OVPN\n";
697 copy
("/var/ipfire/outgoing/p2protocols","/var/ipfire/firewall/p2protocols");
698 chown 99, 99, '/var/ipfire/firewall/p2protocols';