]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blob - config/forwardfw/convert-outgoingfw
2b39cee8cc575cce9bb038029cc329628500de06
[people/pmueller/ipfire-2.x.git] / config / forwardfw / convert-outgoingfw
1 #!/usr/bin/perl
2
3
4 require '/var/ipfire/general-functions.pl';
5 use Socket;
6
7 my $ipgrouppath = "${General::swroot}/outgoing/groups/ipgroups/";
8 my $macgrouppath = "${General::swroot}/outgoing/groups/macgroups/";
9 my $outgoingrules = "${General::swroot}/outgoing/rules";
10 my $outfwsettings = "${General::swroot}/outgoing/settings";
11 my $host = "Converted ";
12 my $confighosts = "${General::swroot}/fwhosts/customhosts";
13 my $confignets = "${General::swroot}/fwhosts/customnetworks";
14 my $configgroups = "${General::swroot}/fwhosts/customgroups";
15 my $ovpnsettings = "${General::swroot}/ovpn/settings";
16 my $ovpnconfig = "${General::swroot}/ovpn/ovpnconfig";
17 my $ccdconfig = "${General::swroot}/ovpn/ccd.conf";
18 my $fwdfwconfig = "${General::swroot}/forward/config";
19 my $fwdfwsettings = "${General::swroot}/forward/settings";
20 my @ipgroups = qx(ls $ipgrouppath);
21 my @macgroups = qx(ls $macgrouppath);
22 my @hostarray=();
23 my %outsettings=();
24 my %hosts=();
25 my %nets=();
26 my %groups=();
27 my %settingsovpn=();
28 my %configovpn=();
29 my %ccdconf=();
30 my %fwconf=();
31 my %fwdsettings=();
32 &General::readhash($outfwsettings,\%outsettings);
33
34 &process_groups;
35 &process_rules;
36
37 sub process_groups
38 {
39 if(! -d "/var/log/converters"){ mkdir("/var/log/converters");}
40 if( -f "/var/log/converters/groups-convert.log"){unlink ("/var/log/converters/groups-convert.log");}
41 open (LOG, ">/var/log/converters/groups-convert.log") or die $!;
42 #IP Group processing
43 foreach my $group (@ipgroups){
44 chomp $group;
45 open (DATEI, "<$ipgrouppath/$group");
46 my @zeilen = <DATEI>;
47 foreach my $ip (@zeilen){
48 chomp($ip);
49 $ip =~ s/\s//gi;
50 my $val=&check_ip($ip);
51 if($val){
52 push(@hostarray,$val.",ip");
53 }
54 else{
55 print LOG "-> IP \"$ip\" from group $group not converted (invalid IP) \n";
56 }
57 $val='';
58 }
59 &new_hostgrp($group,'ip');
60 @hostarray=();
61 }
62 $group='';
63 @zeilen=();
64 @hostarray=();
65 #MAC Group processing
66 foreach my $group (@macgroups){
67 chomp $group;
68 open (DATEI, "<$macgrouppath/$group");
69 my @zeilen = <DATEI>;
70 foreach my $mac (@zeilen){
71 chomp($mac);
72 $mac =~ s/\s//gi;
73 #MAC checking
74 if(&General::validmac($mac)){
75 $val=$mac;
76 }
77 if($val){
78 push(@hostarray,$val.",mac");
79 }
80 else{
81 print LOG "-> Mac $mac from group $group not converted (invalid MAC)\n";
82 }
83 $val='';
84 }
85 &new_hostgrp($group,'mac');
86 @hostarray=();
87 }
88 close (LOG);
89 }
90 sub check_ip
91 {
92 my $adr=shift;
93 my $a;
94 #ip with subnet in decimal
95 if($adr =~ m/^(\d\d?\d?).(\d\d?\d?).(\d\d?\d?).(\d\d?\d?)\/(\d{1,2})$/){
96 $adr=int($1).".".int($2).".".int($3).".".int($4);
97 my $b = &General::iporsubtodec($5);
98 $a=$adr."/".$b;
99 }
100 if($adr =~ /^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/){
101 $adr=int($1).".".int($2).".".int($3).".".int($4);
102 if(&General::validip($adr)){
103 $a=$adr."/255.255.255.255";
104 }
105 }
106 if(&General::validipandmask($adr)){
107 $a=&General::iporsubtodec($adr);
108 }
109 return $a;
110 }
111 sub new_hostgrp
112 {
113 &General::readhasharray($confighosts,\%hosts);
114 &General::readhasharray($confignets,\%nets);
115 &General::readhasharray($configgroups,\%groups);
116 my $grp=shift;
117 my $run=shift;
118 my $name; #"converted"
119 my $name2;
120 my $name3; #custom host/custom net
121 foreach my $adr (@hostarray){
122 if($run eq 'ip'){
123 my ($ip,$type) = split(",",$adr);
124 my ($ippart,$subnet) = split("/",$ip);
125 my ($byte1,$byte2,$byte3,$byte4) = split(/\./,$subnet);
126 if($byte4 eq '255'){
127 if(!&check_host($ip)){
128 my $key = &General::findhasharraykey(\%hosts);
129 $name="host ";
130 $name2=$name.$ippart;
131 $name3="Custom Host";
132 $hosts{$key}[0] = $name2;
133 $hosts{$key}[1] = $type;
134 $hosts{$key}[2] = $ip;
135 $hosts{$key}[3] = 1;
136 }else{
137 print LOG "Host (IP) $ip already exists\n";
138 }
139 }elsif($byte4 < '255'){
140 if(!&check_net($ippart,$subnet)){
141 my $netkey = &General::findhasharraykey(\%nets);
142 $name="net ";
143 $name2=$name.$ippart;
144 $name3="Custom Network";
145 $nets{$netkey}[0] = $name2;
146 $nets{$netkey}[1] = $ippart;
147 $nets{$netkey}[2] = $subnet;
148 $nets{$netkey}[3] = 1;
149 }else{
150 print LOG "Network $ippart already exists\n";
151 }
152 }
153 if($name2){
154 my $grpkey = &General::findhasharraykey(\%groups);
155 $groups{$grpkey}[0] = $grp;
156 $groups{$grpkey}[1] = '';
157 $groups{$grpkey}[2] = $name2;
158 $groups{$grpkey}[3] = $name3;
159 $groups{$grpkey}[4] = 0;
160 }
161 }elsif($run eq 'mac'){
162 #MACRUN
163 my ($mac,$type) = split(",",$adr);
164 if(!&check_host($mac)){
165 my $key = &General::findhasharraykey(\%hosts);
166 $name="host ";
167 $name2=$name.$mac;
168 $name3="Custom Host";
169 $hosts{$key}[0] = $name2;
170 $hosts{$key}[1] = $type;
171 $hosts{$key}[2] = $mac;
172 $hosts{$key}[3] = 1;
173 }else{
174 print LOG "Host (MAC) $mac already exists\n";
175 }
176 if($name2){
177 my $grpkey = &General::findhasharraykey(\%groups);
178 $groups{$grpkey}[0] = $grp;
179 $groups{$grpkey}[1] = '';
180 $groups{$grpkey}[2] = $name2;
181 $groups{$grpkey}[3] = $name3;
182 $groups{$grpkey}[4] = 0;
183 }
184 }
185 }
186 &General::writehasharray($confighosts,\%hosts);
187 &General::writehasharray($configgroups,\%groups);
188 &General::writehasharray($confignets,\%nets);
189 }
190 sub check_host
191 {
192 my $ip=shift;
193 foreach my $key (sort keys %hosts)
194 {
195 if($hosts{$key}[2] eq $ip)
196 {
197 return 1;
198 }
199 }
200 return 0;
201 }
202 sub check_net
203 {
204 my $ip=shift;
205 my $sub=shift;
206 foreach my $key (sort keys %nets)
207 {
208 if($nets{$key}[1] eq $ip && $nets{$key}[2] eq $sub)
209 {
210 return 1;
211 }
212 }
213 return 0;
214 }
215 sub check_grp
216 {
217 my $grp=shift;
218 my $value=shift;
219 foreach my $key (sort keys %groups)
220 {
221 if($groups{$key}[0] eq $grp && $groups{$key}[2] eq $value)
222 {
223 return 1;
224 }
225 }
226 return 0;
227 }
228 sub process_rules
229 {
230 &General::readhash($fwdfwsettings,\%fwdsettings);
231 if($fwdsettings{'POLICY'} ne $outsettings{'POLICY'}){
232 $fwdsettings{'POLICY'}=$outsettings{'POLICY'};
233 &General::writehash($fwdfwsettings,\%fwdsettings);
234 }
235 #open LOG
236 if( -f "/var/log/converters/outgoingfw-convert.log"){unlink ("/var/log/converters/outgoingfw-convert.log");}
237 open (LOG, ">/var/log/converters/outgoingfw-convert.log") or die $!;
238
239 my ($type,$action,$active,$grp1,$source,$grp2,$useport,$port,$prot,$grp3,$target,$remark,$log,$time,$time_mon,$time_tue,$time_wed,$time_thu,$time_fri,$time_sat,$time_sun,$time_from,$time_to);
240 if ($outsettings{'POLICY'} eq 'MODE1'){
241 $type='ALLOW';
242 $action='ACCEPT';
243 }elsif($outsettings{'POLICY'} eq 'MODE2'){
244 $type='DENY';
245 $action='DROP';
246 }else{
247 return;
248 }
249 open (DATEI, "<$outgoingrules");
250 my @lines = <DATEI>;
251 foreach my $rule (@lines)
252 {
253 chomp($rule);
254 print LOG "processing: $rule\n";
255 my @configline = split( /\;/, $rule );
256 my @prot=();
257 if($configline[0] eq $type){
258 #some variables we can use from old config
259 if($configline[1] eq 'on'){ $active='ON';}else{$active='';}
260 if($configline[3] eq 'all'){
261 push(@prot,"tcp");
262 push(@prot,"udp");
263 $useport='ON';
264 $grp3='TGT_PORT';
265
266 }else{
267 push(@prot,$configline[3]);
268 $useport='ON';
269 $grp3='TGT_PORT';
270 }
271 if($configline[4] ne ''){ $remark=$configline[4];}else{$remark='';}
272 if($configline[9] eq 'aktiv'){ $log='ON';}else{$log='';}
273
274 if($configline[10] eq 'on' && $configline[11] eq 'on' && $configline[12] eq 'on' && $configline[13] eq 'on' && $configline[14] eq 'on' && $configline[15] eq 'on' && $configline[16] eq 'on'){
275 if($configline[17] eq '00:00' && $configline[18] eq '00:00'){
276 $time='';
277 }else{
278 $time='ON';
279 }
280 }else{
281 $time='ON';
282 }
283 $time_mon=$configline[10];
284 $time_tue=$configline[11];
285 $time_wed=$configline[12];
286 $time_thu=$configline[13];
287 $time_fri=$configline[14];
288 $time_sat=$configline[15];
289 $time_sun=$configline[16];
290 $time_from=$configline[17];
291 $time_to=$configline[18];
292 ############################################################
293 #sourcepart
294 if ($configline[2] eq 'green') {
295 $grp1='std_net_src';
296 $source='GREEN';
297 }elsif ($configline[2] eq 'orange') {
298 $grp1='std_net_src';
299 $source='ORANGE';
300 }elsif ($configline[2] eq 'red') {
301 print LOG "-> Rule not converted, is an outgoing rule.Please put it manually in /etc/sysconfig/firewall.local \n";
302 next;
303 }elsif ($configline[2] eq 'blue') {
304 $grp1='std_net_src';
305 $source='BLUE';
306 }elsif ($configline[2] eq 'ipsec') {
307 print LOG "-> Rule not converted, ipsec+ interface is obsolet since IPFire 2.7 \n";
308 next;
309 }elsif ($configline[2] eq 'ovpn') {
310 &build_ovpn_grp;
311 }elsif ($configline[2] eq 'ip') {
312 my $z=&check_ip($configline[5]);
313 if($z){
314 $grp1='src_addr';
315 $source=$z;
316 }else{
317 print LOG "-> Rule not converted, missing/invalid source ip \"$configline[5]\"\n";
318 next;
319 }
320 }elsif ($configline[2] eq 'mac') {
321 if(&General::validmac($configline[6])){
322 $grp1='src_addr';
323 $source=$configline[6];
324 }else{
325 print LOG"-> Rule not converted, invalid MAC \"$configline[6]\" \n";
326 next;
327 }
328 }elsif ($configline[2] eq 'all') {
329 $grp1='std_net_src';
330 $source='ALL';
331 }else{
332 #&General::readhasharray($configgroups,\%groups);
333 foreach my $key (sort keys %groups){
334 if($groups{$key}[0] eq $configline[2]){
335 $grp1='cust_grp_src';
336 $source=$configline[2];
337 }
338 }
339 if ($grp1 eq '' || $source eq ''){
340 print LOG "-> Rule not converted, no valid source recognised\n";
341 }
342 }
343 ############################################################
344 #destinationpart
345 if($configline[7] ne ''){
346 my $address=&check_ip($configline[7]);
347 if($address){
348 $grp2='tgt_addr';
349 $target=$address;
350 }elsif(!$address){
351 my $getwebsiteip=&get_ip_from_domain($configline[7]);
352 if ($getwebsiteip){
353 $grp2='tgt_addr';
354 $target=$getwebsiteip;
355 }else{
356 print LOG "-> Rule not converted, invalid domain \"$configline[7]\"\n";
357 next;
358 }
359 }
360 }else{
361 $grp2='std_net_tgt';
362 $target='ALL';
363 }
364 if($configline[8] ne ''){
365 if (!($configline[8] =~ /^(\d+)\:(\d+)$/)) {
366 if(&General::validport($configline[8])){
367 $useport='ON';
368 $port=$configline[8];
369 $grp3='TGT_PORT';
370 }else{
371 print LOG "-> Rule not converted, invalid destination Port \"$configline[8]\"\n";
372 next;
373 }
374 }else{
375 my ($a1,$a2) = split(/\:/,$configline[8]);
376 if (&General::validport($a1) && &General::validport($a2) && $a1 < $a2){
377 $useport='ON';
378 $port=$configline[8];
379 $grp3='TGT_PORT';
380 }else{
381 print LOG "-> Rule not converted, invalid destination Port \"$configline[8]\"\n";
382 next;
383 }
384 }
385 }
386 }else{
387 print LOG "-> Rule not converted because not for Firewall mode $outsettings{'POLICY'} (we are only converting for actual mode)\n";
388 }
389 &General::readhasharray($fwdfwconfig,\%fwconfig);
390 my $check;
391 foreach my $protocol (@prot){
392 $protocol=uc($protocol);
393 print LOG "-> Converted: $action,FORWARDFW,$active,$grp1,$source,$grp2,$target,,,,,$useport,$protocol,,$grp3,$port,$remark,$log,$time,$time_mon,$time_tue,$time_wed,$time_thu,$time_fri,$time_sat,$time_sun,$time_from,$time_to\n";
394 #Put rules into system....
395 ###########################
396
397 #check for double rules
398 foreach my $key (sort keys %fwconfig){
399 if("$action,FORWARDFW,$active,$grp1,$source,$grp2,$target,,,,,$useport,$protocol,,$grp3,$port,$remark,$log,$time,$time_mon,$time_tue,$time_wed,$time_thu,$time_fri,$time_sat,$time_sun,$time_from,$time_to"
400 eq "$fwconfig{$key}[0],$fwconfig{$key}[1],$fwconfig{$key}[2],$fwconfig{$key}[3],$fwconfig{$key}[4],$fwconfig{$key}[5],$fwconfig{$key}[6],,,,,$fwconfig{$key}[11],$fwconfig{$key}[12],,$fwconfig{$key}[14],$fwconfig{$key}[15],$fwconfig{$key}[16],$fwconfig{$key}[17],$fwconfig{$key}[18],$fwconfig{$key}[19],$fwconfig{$key}[20],$fwconfig{$key}[21],$fwconfig{$key}[22],$fwconfig{$key}[23],$fwconfig{$key}[24],$fwconfig{$key}[25],$fwconfig{$key}[26],$fwconfig{$key}[27]"){
401 $check='on';
402 next;
403 }
404 }
405 if($check ne 'on'){
406 #increase groupcounter
407 my $check1;
408 if($grp1 eq 'cust_grp_src'){
409 foreach my $key (sort keys %groups){
410 if($groups{$key}[0] eq $source){
411 $groups{$key}[4]++;
412 $check1='on';
413 }
414 }
415 if($check1 eq 'on'){
416 &General::writehasharray($configgroups,\%groups);
417 }
418 }
419 my $key = &General::findhasharraykey(\%fwconfig);
420 $fwconfig{$key}[0] = $action;
421 $fwconfig{$key}[1] = "FORWARDFW";
422 $fwconfig{$key}[2] = $active;
423 $fwconfig{$key}[3] = $grp1;
424 $fwconfig{$key}[4] = $source;
425 $fwconfig{$key}[5] = $grp2;
426 $fwconfig{$key}[6] = $target;
427 $fwconfig{$key}[11] = $useport;
428 $fwconfig{$key}[12] = $protocol;
429 $fwconfig{$key}[14] = $grp3;
430 $fwconfig{$key}[15] = $port;
431 $fwconfig{$key}[16] = $remark;
432 $fwconfig{$key}[17] = $log;
433 $fwconfig{$key}[18] = $time;
434 $fwconfig{$key}[19] = $time_mon;
435 $fwconfig{$key}[20] = $time_tue;
436 $fwconfig{$key}[21] = $time_wed;
437 $fwconfig{$key}[22] = $time_thu;
438 $fwconfig{$key}[23] = $time_fri;
439 $fwconfig{$key}[24] = $time_sat;
440 $fwconfig{$key}[25] = $time_sun;
441 $fwconfig{$key}[26] = $time_from;
442 $fwconfig{$key}[27] = $time_to;
443 }
444 }
445 &General::writehasharray($fwdfwconfig,\%fwconfig);
446 system("/usr/local/bin/forwardfwctrl");
447 @prot=();
448 }
449 close(LOG);
450 @lines=();
451 }
452 sub get_ip_from_domain
453 {
454 $web=shift;
455 my $resolvedip;
456 my $checked;
457 my ($name,$aliases,$addrtype,$length,@addrs) = gethostbyname($web);
458 if(@addrs){
459 $resolvedip=inet_ntoa($addrs[0]);
460 return $resolvedip;
461 }
462 return;
463 }
464 sub build_ovpn_grp
465 {
466 &General::readhasharray($confighosts,\%hosts);
467 &General::readhasharray($confignets,\%nets);
468 &General::readhasharray($configgroups,\%groups);
469 &General::readhasharray($ovpnconfig,\%configovpn);
470 &General::readhasharray($ccdconfig,\%ccdconf);
471 &General::readhash($ovpnsettings,\%settingsovpn);
472 #get ovpn nets
473 my @ovpnnets=();
474 if($settingsovpn{'DOVPN_SUBNET'}){
475 my ($net,$subnet)=split("/",$settingsovpn{'DOVPN_SUBNET'});
476 push (@ovpnnets,"$net,$subnet,dynamic");
477 }
478 foreach my $key (sort keys %ccdconf){
479 my ($net,$subnet)=split("/",$ccdconf{$key}[1]);
480 $subnet=&General::iporsubtodec($subnet);
481 push (@ovpnnets,"$net,$subnet,$ccdconf{$key}[0]");
482 }
483 foreach my $key (sort keys %configovpn){
484 if ($configovpn{$key}[3] eq 'net'){
485 my ($net,$subnet)=split("/",$configovpn{$key}[27]);
486 push (@ovpnnets,"$net,$subnet,$configovpn{$key}[2]");
487 }
488 }
489 #add ovpn nets to customnetworks/groups
490 foreach my $line (@ovpnnets){
491 my ($net,$subnet,$name) = split(",",$line);
492 if (!&check_net($net,$subnet)){
493 my $netkey = &General::findhasharraykey(\%nets);
494 $name2=$name."(ovpn)".$net;
495 $name3="Custom Network";
496 $nets{$netkey}[0] = $name2;
497 $nets{$netkey}[1] = $net;
498 $nets{$netkey}[2] = $subnet;
499 $nets{$netkey}[3] = 1;
500 }else{
501 print LOG "-> Custom Network with same IP already exist \"$net/$subnet\" (you can ignore this, if this run was manual from shell)\n";
502 }
503 if($name2){
504 my $grpkey = &General::findhasharraykey(\%groups);
505 $groups{$grpkey}[0] = "ovpn";
506 $groups{$grpkey}[1] = '';
507 $groups{$grpkey}[2] = $name2;
508 $groups{$grpkey}[3] = "Custom Network";
509 $groups{$grpkey}[4] = 0;
510 }
511 $name2='';
512 }
513 @ovpnnets=();
514 &General::writehasharray($confighosts,\%hosts);
515 &General::writehasharray($configgroups,\%groups);
516 &General::writehasharray($confignets,\%nets);
517 }