]> git.ipfire.org Git - ipfire-2.x.git/blob - config/outgoingfw/outgoingfw.pl
Merge branch 'next' of ssh://git.ipfire.org/pub/git/ipfire-2.x into next
[ipfire-2.x.git] / config / outgoingfw / outgoingfw.pl
1 #!/usr/bin/perl
2 ###############################################################################
3 # #
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2007-2011 IPFire Team #
6 # #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
11 # #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
16 # #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
19 # #
20 ###############################################################################
21
22
23 use strict;
24 # enable only the following on debugging purpose
25 #use warnings;
26
27 require '/var/ipfire/general-functions.pl';
28 require "${General::swroot}/lang.pl";
29
30 my %outfwsettings = ();
31 my %checked = ();
32 my %selected= () ;
33 my %netsettings = ();
34 my $errormessage = "";
35 my $configentry = "";
36 my @configs = ();
37 my @configline = ();
38 my $p2pentry = "";
39 my @p2ps = ();
40 my @p2pline = ();
41 my $CMD = "";
42 my $P2PSTRING = "";
43
44 my $DEBUG = 0;
45
46 my $configfile = "/var/ipfire/outgoing/rules";
47 my $p2pfile = "/var/ipfire/outgoing/p2protocols";
48
49 ### Values that have to be initialized
50 $outfwsettings{'ACTION'} = '';
51 $outfwsettings{'VALID'} = 'yes';
52 $outfwsettings{'EDIT'} = 'no';
53 $outfwsettings{'NAME'} = '';
54 $outfwsettings{'SNET'} = '';
55 $outfwsettings{'SIP'} = '';
56 $outfwsettings{'SPORT'} = '';
57 $outfwsettings{'SMAC'} = '';
58 $outfwsettings{'DIP'} = '';
59 $outfwsettings{'DPORT'} = '';
60 $outfwsettings{'PROT'} = '';
61 $outfwsettings{'STATE'} = '';
62 $outfwsettings{'DISPLAY_DIP'} = '';
63 $outfwsettings{'DISPLAY_DPORT'} = '';
64 $outfwsettings{'DISPLAY_SMAC'} = '';
65 $outfwsettings{'DISPLAY_SIP'} = '';
66 $outfwsettings{'POLICY'} = 'MODE0';
67
68 my @SOURCE = "";
69 my $SOURCE = "";
70 my $DESTINATION = "";
71 my @PROTO = "";
72 my $PROTO = "";
73 my $DPORT = "";
74 my $DEV = "";
75 my $MAC = "";
76 my $DO = "";
77 my $DAY = "";
78
79 # read files
80 &General::readhash("${General::swroot}/outgoing/settings", \%outfwsettings);
81 &General::readhash("${General::swroot}/ethernet/settings", \%netsettings);
82
83 $netsettings{'RED_DEV'}=`cat /var/ipfire/red/iface`;
84 $netsettings{'RED_IP'}=`cat /var/ipfire/red/local-ipaddress`;
85
86 open( FILE, "< $configfile" ) or die "Unable to read $configfile";
87 @configs = <FILE>;
88 close FILE;
89
90 if ( $outfwsettings{'POLICY'} eq 'MODE1' ) {
91 $outfwsettings{'STATE'} = "ALLOW";
92 $DO = "RETURN";
93 } elsif ( $outfwsettings{'POLICY'} eq 'MODE2' ) {
94 $outfwsettings{'STATE'} = "DENY";
95 $DO = "DROP -m comment --comment 'DROP_OUTGOINGFW '";
96 }
97
98 ### Initialize IPTables
99 system("/sbin/iptables --flush OUTGOINGFW >/dev/null 2>&1");
100 system("/sbin/iptables --delete-chain OUTGOINGFW >/dev/null 2>&1");
101 system("/sbin/iptables -N OUTGOINGFW >/dev/null 2>&1");
102
103 system("/sbin/iptables --flush OUTGOINGFWMAC >/dev/null 2>&1");
104 system("/sbin/iptables --delete-chain OUTGOINGFWMAC >/dev/null 2>&1");
105 system("/sbin/iptables -N OUTGOINGFWMAC >/dev/null 2>&1");
106
107 if ( $outfwsettings{'POLICY'} eq 'MODE0' ) {
108 &firewall_local_reload();
109 exit 0
110 }
111
112 if ( $outfwsettings{'POLICY'} eq 'MODE1' ) {
113 $CMD = "/sbin/iptables -A OUTGOINGFW -m state --state ESTABLISHED,RELATED -j RETURN";
114 if ($DEBUG) { print "$CMD\n"; } else { system("$CMD"); }
115 $CMD = "/sbin/iptables -A OUTGOINGFWMAC -m state --state ESTABLISHED,RELATED -j RETURN";
116 if ($DEBUG) { print "$CMD\n"; } else { system("$CMD"); }
117 $CMD = "/sbin/iptables -A OUTGOINGFW -p icmp -j RETURN";
118 if ($DEBUG) { print "$CMD\n"; } else { system("$CMD"); }
119 $CMD = "/sbin/iptables -A OUTGOINGFWMAC -p icmp -j RETURN";
120 if ($DEBUG) { print "$CMD\n"; } else { system("$CMD"); }
121 }
122
123 foreach $configentry (sort @configs)
124 {
125 @SOURCE = "";
126 $DESTINATION = "";
127 $PROTO = "";
128 $DPORT = "";
129 $DEV = "";
130 $MAC = "";
131 @configline = split( /\;/, $configentry );
132
133 if ($outfwsettings{'STATE'} eq $configline[0]) {
134 if ($configline[2] eq 'green') {
135 @SOURCE = ("$netsettings{'GREEN_NETADDRESS'}/$netsettings{'GREEN_NETMASK'}");
136 $DEV = $netsettings{'GREEN_DEV'};
137 } elsif ($configline[2] eq 'red') {
138 @SOURCE = ("$netsettings{'RED_IP'}");
139 $DEV = "";
140 } elsif ($configline[2] eq 'blue') {
141 @SOURCE = ("$netsettings{'BLUE_NETADDRESS'}/$netsettings{'BLUE_NETMASK'}");
142 $DEV = $netsettings{'BLUE_DEV'};
143 } elsif ($configline[2] eq 'orange') {
144 @SOURCE = ("$netsettings{'ORANGE_NETADDRESS'}/$netsettings{'ORANGE_NETMASK'}");
145 $DEV = $netsettings{'ORANGE_DEV'};
146 } elsif ($configline[2] eq 'ipsec') {
147 @SOURCE = "";
148 $DEV = "ipsec+";
149 } elsif ($configline[2] eq 'ovpn') {
150 @SOURCE = "";
151 $DEV = "tun+";
152 } elsif ($configline[2] eq 'ip') {
153 @SOURCE = ("$configline[5]");
154 $DEV = "";
155 } elsif ($configline[2] eq 'mac') {
156 @SOURCE = ("$configline[6]");
157 $DEV = "";
158 } elsif ($configline[2] eq 'all') {
159 @SOURCE = ("0/0");
160 $DEV = "";
161 } else {
162 if ( -e "/var/ipfire/outgoing/groups/ipgroups/$configline[2]" ) {
163 @SOURCE = `cat /var/ipfire/outgoing/groups/ipgroups/$configline[2]`;
164 } elsif ( -e "/var/ipfire/outgoing/groups/macgroups/$configline[2]" ) {
165 @SOURCE = `cat /var/ipfire/outgoing/groups/macgroups/$configline[2]`;
166 $configline[2] = "mac";
167 }
168 $DEV = "";
169 }
170
171 if ($configline[7]) { $DESTINATION = "$configline[7]"; } else { $DESTINATION = "0/0"; }
172
173 if ($configline[3] eq 'tcp') {
174 @PROTO = ("tcp");
175 } elsif ($configline[3] eq 'udp') {
176 @PROTO = ("udp");
177 } elsif ($configline[3] eq 'esp') {
178 @PROTO = ("esp");
179 } elsif ($configline[3] eq 'gre') {
180 @PROTO = ("gre");
181 } else {
182 @PROTO = ("tcp","udp");
183 }
184
185 my $macrule = 0;
186 foreach $PROTO (@PROTO){
187 foreach $SOURCE (@SOURCE) {
188 $SOURCE =~ s/\s//gi;
189
190 if ( $SOURCE eq "" || $configline[1] eq "" ){next;}
191
192 if ( ( $configline[6] ne "" || $configline[2] eq 'mac' ) && $configline[2] ne 'all'){
193 $SOURCE =~ s/[^a-zA-Z0-9]/:/gi;
194 $CMD = "-m mac --mac-source $SOURCE -d $DESTINATION -p $PROTO";
195 $macrule = 1;
196 } else {
197 $CMD = "-s $SOURCE -d $DESTINATION -p $PROTO";
198 }
199
200 if ($configline[8] && ( $configline[3] ne 'esp' || $configline[3] ne 'gre') ) {
201 $DPORT = "$configline[8]";
202 $CMD = "$CMD -m multiport --destination-port $DPORT";
203 }
204
205 if ($DEV) {
206 $CMD = "$CMD -i $DEV";
207 }
208
209 if ($configline[17] && $configline[18]) {
210 $DAY = "";
211 if ($configline[10]){$DAY = "Mon,"}
212 if ($configline[11]){$DAY .= "Tue,"}
213 if ($configline[12]){$DAY .= "Wed,"}
214 if ($configline[13]){$DAY .= "Thu,"}
215 if ($configline[14]){$DAY .= "Fri,"}
216 if ($configline[15]){$DAY .= "Sat,"}
217 if ($configline[16]){$DAY .= "Sun"}
218 $CMD = "$CMD -m time --timestart $configline[17] --timestop $configline[18] --weekdays $DAY";
219 }
220
221 $CMD = "$CMD -o $netsettings{'RED_DEV'}";
222
223 if ( $configline[9] eq $Lang::tr{'aktiv'} && $outfwsettings{'POLICY'} eq 'MODE1' ) {
224 applyrule("$CMD -m limit --limit 10/minute -j LOG --log-prefix 'LOG_OUTGOINGFW '", $macrule);
225 } elsif ( $configline[9] eq $Lang::tr{'aktiv'} && $outfwsettings{'POLICY'} eq 'MODE2' ) {
226 applyrule("$CMD -m limit --limit 10/minute -j LOG --log-prefix 'DROP_OUTGOINGFW '", $macrule);
227 }
228
229 applyrule("$CMD -j $DO", $macrule);
230 }
231 }
232 }
233 }
234
235 ### Do the P2P-Stuff here
236 open( FILE, "< $p2pfile" ) or die "Unable to read $p2pfile";
237 @p2ps = <FILE>;
238 close FILE;
239
240 $CMD = "-m ipp2p";
241
242 foreach $p2pentry (sort @p2ps) {
243 @p2pline = split( /\;/, $p2pentry );
244 if ( $outfwsettings{'POLICY'} eq 'MODE2' ) {
245 $DO = "DROP";
246 if ("$p2pline[2]" eq "off") {
247 $P2PSTRING = "$P2PSTRING --$p2pline[1]";
248 }
249 } else {
250 $DO = "RETURN";
251 if ("$p2pline[2]" eq "on") {
252 $P2PSTRING = "$P2PSTRING --$p2pline[1]";
253 }
254 }
255 }
256 if ($P2PSTRING) {
257 applyrule("$CMD $P2PSTRING -j $DO", 0);
258 }
259
260 if ( $outfwsettings{'POLICY'} eq 'MODE1' ) {
261 if ( $outfwsettings{'MODE1LOG'} eq 'on' ) {
262 applyrule("-o $netsettings{'RED_DEV'} -m limit --limit 10/minute -j LOG --log-prefix 'DROP_OUTGOINGFW '", 0);
263 }
264
265 applyrule("-o $netsettings{'RED_DEV'} -j DROP -m comment --comment 'DROP_OUTGOINGFW '", 0);
266 }
267
268 &firewall_local_reload();
269
270 sub applyrule($$) {
271 my $cmd = shift;
272 my $macrule = shift;
273
274 system("/sbin/iptables -A OUTGOINGFWMAC $cmd");
275 if ($macrule == 0) {
276 system("/sbin/iptables -A OUTGOINGFW $cmd");
277 }
278 }
279
280 sub firewall_local_reload() {
281 my $script = "/etc/sysconfig/firewall.local";
282
283 if ( -x $script ) {
284 system("$script reload >/dev/null 2>&1");
285 }
286 }