X-Git-Url: http://git.squeep.com/?p=firewall-squeep;a=blobdiff_plain;f=firewall.sh;h=c55762f75a0db702c9efe4a1ef5ebe935c21d606;hp=34184eefcdaa2091b669dcca60a0c6e2cfda0697;hb=HEAD;hpb=0f864e054ebdb2c6606721dc49db867fe93cb61e diff --git a/firewall.sh b/firewall.sh index 34184ee..c55762f 100755 --- a/firewall.sh +++ b/firewall.sh @@ -2,9 +2,7 @@ set -e -IPTABLES=$(which iptables) -IP6TABLES=$(which ip6tables) -IPSET=$(which ipset) +. ./common.sh debug=0 @@ -17,7 +15,7 @@ fi if [ $# -lt 1 ] then - echo "Usage: $(basename "$0") external_interface" 1>&2 + echo "Usage: $(basename "$0") external_interface [external_addr]" 1>&2 exit 64 fi @@ -28,6 +26,13 @@ then exit 1 fi +is_router=0 +if [ $# -gt 1 ] +then + is_router=1 + EXT_ADDR="$2" +fi + $IPTABLES -F $IPTABLES -F INPUT $IPTABLES -X @@ -45,20 +50,17 @@ $IP6TABLES -P OUTPUT ACCEPT # accept local traffic $IPTABLES -A INPUT -i lo -j ACCEPT - $IP6TABLES -A INPUT -i lo -j ACCEPT # accept ICMP $IPTABLES -A INPUT -p icmp -j ACCEPT - $IP6TABLES -A INPUT -p ipv6-icmp -j ACCEPT # drop source-route rh0 headery things -$IP6TABLES -A INPUT -m rt --rt-type 0 -j DROP +$IP6TABLES -A INPUT -m rt --rt-type 0 -j DROP || echo "MISSING RT MATCH" 1>&2 # accept things we set up $IPTABLES -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT - $IP6TABLES -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT # accept ipv6 link-local traffic @@ -73,21 +75,25 @@ do $IPTABLES -A INPUT -p tcp --tcp-flags ${flags} -j DROP done -$IPSET -exist create allowed_udp bitmap:port range 0-65535 -$IPSET -exist create allowed_tcp bitmap:port range 0-65535 -for p in 22 25 53 80 143 443 587 993 1194 5000 5222 5269 22556 64738 -do - $IPSET -exist add allowed_tcp ${p} -done -for p in 53 123 1194 64738 -do - $IPSET -exist add allowed_udp ${p} -done +# accept ESP for IPSec +$IPTABLES -A INPUT -p esp -j ACCEPT +$IP6TABLES -A INPUT -p esp -j ACCEPT + +# accept all IPSec traffic +$IPTABLES -A INPUT -m policy --dir in --pol ipsec -j ACCEPT +$IP6TABLES -A INPUT -m policy --dir in --pol ipsec -j ACCEPT + +if [ $is_router -gt 0 ] +then + $IPTABLES -t nat -A POSTROUTING -o ${EXT_IF} -j SNAT --to ${EXT_ADDR} +fi + +./services.sh ${EXT_IF} + +create_drop_chain xenophobe -$IPTABLES -A INPUT -i "${EXT_IF}" -p tcp -m set --match-set allowed_tcp dst -j ACCEPT -$IPTABLES -A INPUT -i "${EXT_IF}" -p udp -m set --match-set allowed_udp dst -j ACCEPT -$IP6TABLES -A INPUT -i "${EXT_IF}" -p tcp -m set --match-set allowed_tcp dst -j ACCEPT -$IP6TABLES -A INPUT -i "${EXT_IF}" -p udp -m set --match-set allowed_udp dst -j ACCEPT +# insert asia blocker +./sinokorea.sh # insert persistent-pest-blocker ./xenophobe.sh