From: Alexander Marx Date: Tue, 19 Mar 2013 11:56:38 +0000 (+0100) Subject: Forward Firewall: clean up some files X-Git-Tag: v2.15-beta1~290^2~11^2~109 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=93b75f31ad920a2aa96206c2053b70affa135a42;p=people%2Fms%2Fipfire-2.x.git Forward Firewall: clean up some files Fix iptables loop wirelessctrl Fix firewall chain order Fix policies (added comment for statistic) --- diff --git a/config/forwardfw/firewall-policy b/config/forwardfw/firewall-policy index 3b7fa18ada..2d4b9ec86c 100755 --- a/config/forwardfw/firewall-policy +++ b/config/forwardfw/firewall-policy @@ -13,7 +13,7 @@ if [ "$POLICY" == "MODE1" ]; then if [ "$DROPFORWARD" == "on" ]; then /sbin/iptables -A POLICYFWD -m limit --limit 10/minute -j LOG --log-prefix "REJECT_FORWARD" fi - /sbin/iptables -A POLICYFWD -j REJECT --reject-with icmp-host-unreachable -m comment --comment "REJECT_FORWARD" + /sbin/iptables -A POLICYFWD -j REJECT --reject-with icmp-host-unreachable -m comment --comment "DROP_FORWARD" fi if [ "$FWPOLICY" == "DROP" ]; then if [ "$DROPFORWARD" == "on" ]; then @@ -21,14 +21,17 @@ if [ "$POLICY" == "MODE1" ]; then fi /sbin/iptables -A POLICYFWD -j DROP -m comment --comment "DROP_FORWARD" fi +else + /sbin/iptables -A POLICYFWD -j DROP -m comment --comment "DROP_FORWARD" fi + #OUTGOINGFW if [ "$POLICY1" == "MODE1" ]; then if [ "$FWPOLICY1" == "REJECT" ]; then if [ "$DROPOUTGOING" == "on" ]; then /sbin/iptables -A POLICYOUT -m limit --limit 10/minute -j LOG --log-prefix "REJECT_OUTPUT" fi - /sbin/iptables -A POLICYOUT -j REJECT --reject-with icmp-host-unreachable -m comment --comment "REJECT_OUTPUT" + /sbin/iptables -A POLICYOUT -j REJECT --reject-with icmp-host-unreachable -m comment --comment "DROP_OUTPUT" fi if [ "$FWPOLICY1" == "DROP" ]; then if [ "$DROPOUTGOING" == "on" ]; then @@ -36,17 +39,19 @@ if [ "$POLICY1" == "MODE1" ]; then fi /sbin/iptables -A POLICYOUT -j DROP -m comment --comment "DROP_OUTPUT" fi +else + /sbin/iptables -A POLICYOUT -j DROP -m comment --comment "DROP_OUTPUT" fi #INPUT if [ "$FWPOLICY2" == "REJECT" ]; then if [ "$DROPINPUT" == "on" ]; then /sbin/iptables -A POLICYIN -m limit --limit 10/minute -j LOG --log-prefix "REJECT_INPUT" fi - /sbin/iptables -A POLICYIN -j REJECT --reject-with icmp-host-unreachable -m comment --comment "REJECT_FORWARD" + /sbin/iptables -A POLICYIN -j REJECT --reject-with icmp-host-unreachable -m comment --comment "DROP_INPUT" fi if [ "$FWPOLICY2" == "DROP" ]; then if [ "$DROPINPUT" == "on" ]; then - /sbin/iptables -A POLICYIN -m limit --limit 10/minute -j LOG --log-prefix "DROP_FORWARD" + /sbin/iptables -A POLICYIN -m limit --limit 10/minute -j LOG --log-prefix "DROP_INPUT" fi - /sbin/iptables -A POLICYIN -j DROP -m comment --comment "DROP_FORWARD" + /sbin/iptables -A POLICYIN -j DROP -m comment --comment "DROP_INPUT" fi diff --git a/html/cgi-bin/forwardfw.cgi b/html/cgi-bin/forwardfw.cgi index 84e01704d8..a37fb29d1e 100755 --- a/html/cgi-bin/forwardfw.cgi +++ b/html/cgi-bin/forwardfw.cgi @@ -1738,17 +1738,12 @@ END $Lang::tr{'fwdfw use nat'} $Lang::tr{'fwdfw dnat'} END - if (! -z "${General::swroot}/ethernet/aliases"){ - print"IPFire: "; + print"IPFire: "; diff --git a/src/initscripts/init.d/firewall b/src/initscripts/init.d/firewall index 39e1dfd7b1..18dea0ab85 100644 --- a/src/initscripts/init.d/firewall +++ b/src/initscripts/init.d/firewall @@ -192,10 +192,6 @@ case "$1" in /sbin/iptables -t nat -A POSTROUTING -j OVPNNAT /sbin/iptables -t nat -A POSTROUTING -j IPSECNAT - # Forward Firewall - /sbin/iptables -N FORWARDFW - /sbin/iptables -A FORWARD -j FORWARDFW - # Input Firewall /sbin/iptables -N INPUTFW /sbin/iptables -A INPUT -m state --state NEW -j INPUTFW @@ -225,6 +221,10 @@ case "$1" in /sbin/iptables -N WIRELESSFORWARD /sbin/iptables -A FORWARD -m state --state NEW -j WIRELESSFORWARD + # Forward Firewall + /sbin/iptables -N FORWARDFW + /sbin/iptables -A FORWARD -j FORWARDFW + # PORTFWACCESS chain, used for portforwarding /sbin/iptables -N PORTFWACCESS /sbin/iptables -A FORWARD -m state --state NEW -j PORTFWACCESS @@ -284,12 +284,7 @@ case "$1" in if [ "$DROPINPUT" == "on" ]; then /sbin/iptables -A INPUT -m limit --limit 10/minute -j LOG --log-prefix "DROP_INPUT " fi - /sbin/iptables -A INPUT -j DROP -m comment --comment "DROP_INPUT" - #if [ "$DROPFORWARD" == "on" ]; then - # /sbin/iptables -A FORWARD -m limit --limit 10/minute -j LOG --log-prefix "DROP_FORWARD " - #fi - #/sbin/iptables -A FORWARD -j DROP -m comment --comment "DROP_FORWARD" - + #POLICY CHAIN /sbin/iptables -N POLICYIN /sbin/iptables -A INPUT -j POLICYIN diff --git a/src/misc-progs/wirelessctrl.c b/src/misc-progs/wirelessctrl.c index 2a6ed0cae1..450aa368fe 100644 --- a/src/misc-progs/wirelessctrl.c +++ b/src/misc-progs/wirelessctrl.c @@ -154,9 +154,7 @@ int main(void) (VALID_IP_AND_MASK(ipaddress))) { snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSINPUT -m mac --mac-source %s -s %s -i %s -j ACCEPT", macaddress, ipaddress, blue_dev); safe_system(command); - snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSFORWARD -m mac --mac-source %s -s %s -i %s ! -o %s -j RETURN", macaddress, ipaddress, blue_dev, green_dev); - safe_system(command); - snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSFORWARD -m mac --mac-source %s -s %s -i %s -j FORWARDFW", macaddress, ipaddress, blue_dev); + snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSFORWARD -m mac --mac-source %s -s %s -i %s -j RETURN", macaddress, ipaddress, blue_dev); safe_system(command); } else { @@ -164,18 +162,14 @@ int main(void) if (strlen(macaddress) == 17) { snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSINPUT -m mac --mac-source %s -i %s -j ACCEPT", macaddress, blue_dev); safe_system(command); - snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSFORWARD -m mac --mac-source %s -i %s ! -o %s -j RETURN", macaddress, blue_dev, green_dev); - safe_system(command); - snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSFORWARD -m mac --mac-source %s -i %s -j FORWARDFW", macaddress, blue_dev); + snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSFORWARD -m mac --mac-source %s -i %s -j RETURN", macaddress, blue_dev); safe_system(command); } if (VALID_IP_AND_MASK(ipaddress)) { snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSINPUT -s %s -i %s -j ACCEPT", ipaddress, blue_dev); safe_system(command); - snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSFORWARD -s %s -i %s ! -o %s -j RETURN", ipaddress, blue_dev, green_dev); - safe_system(command); - snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSFORWARD -s %s -i %s -j FORWARDFW", ipaddress, blue_dev); + snprintf(command, STRING_SIZE-1, "/sbin/iptables -A WIRELESSFORWARD -s %s -i %s -j RETURN", ipaddress, blue_dev); safe_system(command); } }