core_init.sh 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264
  1. # Copyright (C) 2009-2010 OpenWrt.org
  2. # Copyright (C) 2008 John Crispin <[email protected]>
  3. FW_INITIALIZED=
  4. FW_ZONES=
  5. FW_CONNTRACK_ZONES=
  6. FW_NOTRACK_DISABLED=
  7. FW_DEFAULTS_APPLIED=
  8. FW_ADD_CUSTOM_CHAINS=
  9. FW_ACCEPT_REDIRECTS=
  10. FW_ACCEPT_SRC_ROUTE=
  11. FW_DEFAULT_INPUT_POLICY=REJECT
  12. FW_DEFAULT_OUTPUT_POLICY=REJECT
  13. FW_DEFAULT_FORWARD_POLICY=REJECT
  14. FW_DISABLE_IPV4=0
  15. FW_DISABLE_IPV6=0
  16. fw_load_defaults() {
  17. fw_config_get_section "$1" defaults { \
  18. string input $FW_DEFAULT_INPUT_POLICY \
  19. string output $FW_DEFAULT_OUTPUT_POLICY \
  20. string forward $FW_DEFAULT_FORWARD_POLICY \
  21. boolean drop_invalid 0 \
  22. boolean syn_flood 0 \
  23. boolean synflood_protect 0 \
  24. string synflood_rate 25 \
  25. string synflood_burst 50 \
  26. boolean tcp_syncookies 1 \
  27. boolean tcp_ecn 0 \
  28. boolean tcp_westwood 0 \
  29. boolean tcp_window_scaling 1 \
  30. boolean accept_redirects 0 \
  31. boolean accept_source_route 0 \
  32. boolean custom_chains 1 \
  33. boolean disable_ipv6 0 \
  34. } || return
  35. [ -n "$FW_DEFAULTS_APPLIED" ] && {
  36. echo "Error: multiple defaults sections detected"
  37. return 1
  38. }
  39. FW_DEFAULTS_APPLIED=1
  40. FW_DEFAULT_INPUT_POLICY=$defaults_input
  41. FW_DEFAULT_OUTPUT_POLICY=$defaults_output
  42. FW_DEFAULT_FORWARD_POLICY=$defaults_forward
  43. FW_ADD_CUSTOM_CHAINS=$defaults_custom_chains
  44. FW_ACCEPT_REDIRECTS=$defaults_accept_redirects
  45. FW_ACCEPT_SRC_ROUTE=$defaults_accept_source_route
  46. FW_DISABLE_IPV6=$defaults_disable_ipv6
  47. fw_callback pre defaults
  48. # Seems like there are only one sysctl for both IP versions.
  49. for s in syncookies ecn westwood window_scaling; do
  50. eval "sysctl -e -w net.ipv4.tcp_${s}=\$defaults_tcp_${s}" >/dev/null
  51. done
  52. fw_sysctl_interface all
  53. [ $defaults_drop_invalid == 1 ] && {
  54. fw add i f INPUT DROP { -m state --state INVALID }
  55. fw add i f OUTPUT DROP { -m state --state INVALID }
  56. fw add i f FORWARD DROP { -m state --state INVALID }
  57. FW_NOTRACK_DISABLED=1
  58. }
  59. fw add i f INPUT ACCEPT { -m state --state RELATED,ESTABLISHED }
  60. fw add i f OUTPUT ACCEPT { -m state --state RELATED,ESTABLISHED }
  61. fw add i f FORWARD ACCEPT { -m state --state RELATED,ESTABLISHED }
  62. fw add i f INPUT ACCEPT { -i lo }
  63. fw add i f OUTPUT ACCEPT { -o lo }
  64. # Compatibility to old 'syn_flood' parameter
  65. [ $defaults_syn_flood == 1 ] && \
  66. defaults_synflood_protect=1
  67. [ $defaults_synflood_protect == 1 ] && {
  68. echo "Loading synflood protection"
  69. fw_callback pre synflood
  70. fw add i f syn_flood
  71. fw add i f syn_flood RETURN { \
  72. -p tcp --syn \
  73. -m limit --limit "${defaults_synflood_rate}/second" --limit-burst "${defaults_synflood_burst}" \
  74. }
  75. fw add i f syn_flood DROP
  76. fw add i f INPUT syn_flood { -p tcp --syn }
  77. fw_callback post synflood
  78. }
  79. [ $defaults_custom_chains == 1 ] && {
  80. echo "Adding custom chains"
  81. fw add i f input_rule
  82. fw add i f output_rule
  83. fw add i f forwarding_rule
  84. fw add i n prerouting_rule
  85. fw add i n postrouting_rule
  86. fw add i f INPUT input_rule
  87. fw add i f OUTPUT output_rule
  88. fw add i f FORWARD forwarding_rule
  89. fw add i n PREROUTING prerouting_rule
  90. fw add i n POSTROUTING postrouting_rule
  91. }
  92. fw add i f input
  93. fw add i f output
  94. fw add i f forward
  95. fw add i f INPUT input
  96. fw add i f OUTPUT output
  97. fw add i f FORWARD forward
  98. fw add i f reject
  99. fw add i f reject REJECT { --reject-with tcp-reset -p tcp }
  100. fw add i f reject REJECT { --reject-with port-unreach }
  101. fw_set_filter_policy
  102. fw_callback post defaults
  103. }
  104. fw_config_get_zone() {
  105. [ "${zone_NAME}" != "$1" ] || return
  106. fw_config_get_section "$1" zone { \
  107. string name "$1" \
  108. string network "" \
  109. string input "$FW_DEFAULT_INPUT_POLICY" \
  110. string output "$FW_DEFAULT_OUTPUT_POLICY" \
  111. string forward "$FW_DEFAULT_FORWARD_POLICY" \
  112. boolean masq 0 \
  113. boolean conntrack 0 \
  114. boolean mtu_fix 0 \
  115. boolean custom_chains "$FW_ADD_CUSTOM_CHAINS" \
  116. } || return
  117. [ -n "$zone_name" ] || zone_name=$zone_NAME
  118. [ -n "$zone_network" ] || zone_network=$zone_name
  119. }
  120. fw_load_zone() {
  121. fw_config_get_zone "$1"
  122. list_contains FW_ZONES $zone_name && {
  123. fw_die "zone ${zone_name}: duplicated zone"
  124. }
  125. append FW_ZONES $zone_name
  126. fw_callback pre zone
  127. [ $zone_conntrack = 1 -o $zone_masq = 1 ] && \
  128. append FW_CONNTRACK_ZONES "$zone_NAME"
  129. local chain=zone_${zone_name}
  130. fw add i f ${chain}_ACCEPT
  131. fw add i f ${chain}_DROP
  132. fw add i f ${chain}_REJECT
  133. fw add i f ${chain}_MSSFIX
  134. # TODO: Rename to ${chain}_input
  135. fw add i f ${chain}
  136. fw add i f ${chain} ${chain}_${zone_input} $
  137. fw add i f ${chain}_forward
  138. fw add i f ${chain}_forward ${chain}_${zone_forward} $
  139. # TODO: add ${chain}_output
  140. fw add i f output ${chain}_${zone_output} $
  141. # TODO: Rename to ${chain}_MASQUERADE
  142. fw add i n ${chain}_nat
  143. fw add i n ${chain}_prerouting
  144. fw add i r ${chain}_notrack
  145. [ $zone_masq == 1 ] && \
  146. fw add i n POSTROUTING ${chain}_nat $
  147. [ $zone_mtu_fix == 1 ] && \
  148. fw add i f FORWARD ${chain}_MSSFIX ^
  149. [ $zone_custom_chains == 1 ] && {
  150. [ $FW_ADD_CUSTOM_CHAINS == 1 ] || \
  151. fw_die "zone ${zone_name}: custom_chains globally disabled"
  152. fw add i f input_${zone_name}
  153. fw add i f ${chain} input_${zone_name} ^
  154. fw add i f forwarding_${zone_name}
  155. fw add i f ${chain}_forward forwarding_${zone_name} ^
  156. fw add i n prerouting_${zone_name}
  157. fw add i n ${chain}_prerouting prerouting_${zone_name} ^
  158. }
  159. fw_callback post zone
  160. }
  161. fw_load_notrack_zone() {
  162. list_contains FW_CONNTRACK_ZONES "$1" && return
  163. fw_config_get_zone "$1"
  164. fw_callback pre notrack
  165. fw add i f zone_${zone_name}_notrack NOTRACK $
  166. fw_callback post notrack
  167. }
  168. fw_load_include() {
  169. local name="$1"
  170. local path; config_get path ${name} path
  171. [ -e $path ] && . $path
  172. }
  173. fw_clear() {
  174. local policy=$1
  175. fw_set_filter_policy $policy
  176. local tab
  177. for tab in f n r; do
  178. fw del i $tab
  179. done
  180. }
  181. fw_set_filter_policy() {
  182. local policy=$1
  183. local chn tgt
  184. for chn in INPUT OUTPUT FORWARD; do
  185. eval "tgt=\${policy:-\${FW_DEFAULT_${chn}_POLICY}}"
  186. [ $tgt == "REJECT" ] && tgt=reject
  187. [ $tgt == "ACCEPT" -o $tgt == "DROP" ] || {
  188. fw add i f $chn $tgt $
  189. tgt=DROP
  190. }
  191. fw policy i f $chn $tgt
  192. done
  193. }
  194. fw_callback() {
  195. local pp=$1
  196. local hk=$2
  197. local libs lib
  198. eval "libs=\$FW_CB_${pp}_${hk}"
  199. [ -n "$libs" ] || return
  200. for lib in $libs; do
  201. ${lib}_${pp}_${hk}_cb
  202. done
  203. }