]>
git.ipfire.org Git - people/teissler/ipfire-2.x.git/blob - config/outgoingfw/outgoingfw.pl
2 ###############################################################################
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2007-2011 IPFire Team #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
20 ###############################################################################
24 # enable only the following on debugging purpose
27 require '/var/ipfire/general-functions.pl';
28 require "${General::swroot}/lang.pl";
30 my %outfwsettings = ();
34 my $errormessage = "";
46 my $configfile = "/var/ipfire/outgoing/rules";
47 my $p2pfile = "/var/ipfire/outgoing/p2protocols";
49 ### Values that have to be initialized
50 $outfwsettings{'ACTION'} = '';
51 $outfwsettings{'VALID'} = 'yes';
52 $outfwsettings{'EDIT'} = 'no';
53 $outfwsettings{'NAME'} = '';
54 $outfwsettings{'SNET'} = '';
55 $outfwsettings{'SIP'} = '';
56 $outfwsettings{'SPORT'} = '';
57 $outfwsettings{'SMAC'} = '';
58 $outfwsettings{'DIP'} = '';
59 $outfwsettings{'DPORT'} = '';
60 $outfwsettings{'PROT'} = '';
61 $outfwsettings{'STATE'} = '';
62 $outfwsettings{'DISPLAY_DIP'} = '';
63 $outfwsettings{'DISPLAY_DPORT'} = '';
64 $outfwsettings{'DISPLAY_SMAC'} = '';
65 $outfwsettings{'DISPLAY_SIP'} = '';
66 $outfwsettings{'POLICY'} = 'MODE0';
80 &General
::readhash
("${General::swroot}/outgoing/settings", \
%outfwsettings);
81 &General
::readhash
("${General::swroot}/ethernet/settings", \
%netsettings);
83 $netsettings{'RED_DEV'}=`cat /var/ipfire/red/iface`;
84 $netsettings{'RED_IP'}=`cat /var/ipfire/red/local-ipaddress`;
86 open( FILE
, "< $configfile" ) or die "Unable to read $configfile";
90 if ( $outfwsettings{'POLICY'} eq 'MODE1' ) {
91 $outfwsettings{'STATE'} = "ALLOW";
93 } elsif ( $outfwsettings{'POLICY'} eq 'MODE2' ) {
94 $outfwsettings{'STATE'} = "DENY";
95 $DO = "DROP -m comment --comment 'DROP_OUTGOINGFW '";
98 ### Initialize IPTables
99 system("/sbin/iptables --flush OUTGOINGFW >/dev/null 2>&1");
100 system("/sbin/iptables --delete-chain OUTGOINGFW >/dev/null 2>&1");
101 system("/sbin/iptables -N OUTGOINGFW >/dev/null 2>&1");
103 system("/sbin/iptables --flush OUTGOINGFWMAC >/dev/null 2>&1");
104 system("/sbin/iptables --delete-chain OUTGOINGFWMAC >/dev/null 2>&1");
105 system("/sbin/iptables -N OUTGOINGFWMAC >/dev/null 2>&1");
107 if ( $outfwsettings{'POLICY'} eq 'MODE0' ) {
108 &firewall_local_reload
();
112 if ( $outfwsettings{'POLICY'} eq 'MODE1' ) {
113 $CMD = "/sbin/iptables -A OUTGOINGFW -m state --state ESTABLISHED,RELATED -j RETURN";
114 if ($DEBUG) { print "$CMD\n"; } else { system("$CMD"); }
115 $CMD = "/sbin/iptables -A OUTGOINGFWMAC -m state --state ESTABLISHED,RELATED -j RETURN";
116 if ($DEBUG) { print "$CMD\n"; } else { system("$CMD"); }
117 $CMD = "/sbin/iptables -A OUTGOINGFW -p icmp -j RETURN";
118 if ($DEBUG) { print "$CMD\n"; } else { system("$CMD"); }
119 $CMD = "/sbin/iptables -A OUTGOINGFWMAC -p icmp -j RETURN";
120 if ($DEBUG) { print "$CMD\n"; } else { system("$CMD"); }
123 foreach $configentry (sort @configs)
131 @configline = split( /\;/, $configentry );
133 if ($outfwsettings{'STATE'} eq $configline[0]) {
134 if ($configline[2] eq 'green') {
135 @SOURCE = ("$netsettings{'GREEN_NETADDRESS'}/$netsettings{'GREEN_NETMASK'}");
136 $DEV = $netsettings{'GREEN_DEV'};
137 } elsif ($configline[2] eq 'red') {
138 @SOURCE = ("$netsettings{'RED_IP'}");
140 } elsif ($configline[2] eq 'blue') {
141 @SOURCE = ("$netsettings{'BLUE_NETADDRESS'}/$netsettings{'BLUE_NETMASK'}");
142 $DEV = $netsettings{'BLUE_DEV'};
143 } elsif ($configline[2] eq 'orange') {
144 @SOURCE = ("$netsettings{'ORANGE_NETADDRESS'}/$netsettings{'ORANGE_NETMASK'}");
145 $DEV = $netsettings{'ORANGE_DEV'};
146 } elsif ($configline[2] eq 'ipsec') {
149 } elsif ($configline[2] eq 'ovpn') {
152 } elsif ($configline[2] eq 'ip') {
153 @SOURCE = ("$configline[5]");
155 } elsif ($configline[2] eq 'mac') {
156 @SOURCE = ("$configline[6]");
158 } elsif ($configline[2] eq 'all') {
162 if ( -e
"/var/ipfire/outgoing/groups/ipgroups/$configline[2]" ) {
163 @SOURCE = `cat /var/ipfire/outgoing/groups/ipgroups/$configline[2]`;
164 } elsif ( -e
"/var/ipfire/outgoing/groups/macgroups/$configline[2]" ) {
165 @SOURCE = `cat /var/ipfire/outgoing/groups/macgroups/$configline[2]`;
166 $configline[2] = "mac";
171 if ($configline[7]) { $DESTINATION = "$configline[7]"; } else { $DESTINATION = "0/0"; }
173 if ($configline[3] eq 'tcp') {
175 } elsif ($configline[3] eq 'udp') {
177 } elsif ($configline[3] eq 'esp') {
179 } elsif ($configline[3] eq 'gre') {
182 @PROTO = ("tcp","udp");
186 foreach $PROTO (@PROTO){
187 foreach $SOURCE (@SOURCE) {
190 if ( $SOURCE eq "" || $configline[1] eq "" ){next;}
192 if ( ( $configline[6] ne "" || $configline[2] eq 'mac' ) && $configline[2] ne 'all'){
193 $SOURCE =~ s/[^a-zA-Z0-9]/:/gi;
194 $CMD = "-m mac --mac-source $SOURCE -d $DESTINATION -p $PROTO";
197 $CMD = "-s $SOURCE -d $DESTINATION -p $PROTO";
200 if ($configline[8] && ( $configline[3] ne 'esp' || $configline[3] ne 'gre') ) {
201 $DPORT = "$configline[8]";
202 $CMD = "$CMD -m multiport --destination-port $DPORT";
206 $CMD = "$CMD -i $DEV";
209 if ($configline[17] && $configline[18]) {
211 if ($configline[10]){$DAY = "Mon,"}
212 if ($configline[11]){$DAY .= "Tue,"}
213 if ($configline[12]){$DAY .= "Wed,"}
214 if ($configline[13]){$DAY .= "Thu,"}
215 if ($configline[14]){$DAY .= "Fri,"}
216 if ($configline[15]){$DAY .= "Sat,"}
217 if ($configline[16]){$DAY .= "Sun"}
218 $CMD = "$CMD -m time --timestart $configline[17] --timestop $configline[18] --weekdays $DAY";
221 $CMD = "$CMD -o $netsettings{'RED_DEV'}";
223 if ( $configline[9] eq $Lang::tr
{'aktiv'} && $outfwsettings{'POLICY'} eq 'MODE1' ) {
224 applyrule
("$CMD -m limit --limit 10/minute -j LOG --log-prefix 'LOG_OUTGOINGFW '", $macrule);
225 } elsif ( $configline[9] eq $Lang::tr
{'aktiv'} && $outfwsettings{'POLICY'} eq 'MODE2' ) {
226 applyrule
("$CMD -m limit --limit 10/minute -j LOG --log-prefix 'DROP_OUTGOINGFW '", $macrule);
229 applyrule
("$CMD -j $DO", $macrule);
235 ### Do the P2P-Stuff here
236 open( FILE
, "< $p2pfile" ) or die "Unable to read $p2pfile";
242 foreach $p2pentry (sort @p2ps) {
243 @p2pline = split( /\;/, $p2pentry );
244 if ( $outfwsettings{'POLICY'} eq 'MODE2' ) {
246 if ("$p2pline[2]" eq "off") {
247 $P2PSTRING = "$P2PSTRING --$p2pline[1]";
251 if ("$p2pline[2]" eq "on") {
252 $P2PSTRING = "$P2PSTRING --$p2pline[1]";
257 applyrule
("$CMD $P2PSTRING -j $DO", 0);
260 if ( $outfwsettings{'POLICY'} eq 'MODE1' ) {
261 if ( $outfwsettings{'MODE1LOG'} eq 'on' ) {
262 applyrule
("-o $netsettings{'RED_DEV'} -m limit --limit 10/minute -j LOG --log-prefix 'DROP_OUTGOINGFW '", 0);
265 applyrule
("-o $netsettings{'RED_DEV'} -j DROP -m comment --comment 'DROP_OUTGOINGFW '", 0);
268 &firewall_local_reload
();
274 system("/sbin/iptables -A OUTGOINGFWMAC $cmd");
276 system("/sbin/iptables -A OUTGOINGFW $cmd");
280 sub firewall_local_reload
() {
281 my $script = "/etc/sysconfig/firewall.local";
284 system("$script reload >/dev/null 2>&1");