core_init.sh 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338
  1. # Copyright (C) 2009-2011 OpenWrt.org
  2. # Copyright (C) 2008 John Crispin <[email protected]>
  3. FW_INITIALIZED=
  4. FW_ZONES=
  5. FW_ZONES4=
  6. FW_ZONES6=
  7. FW_CONNTRACK_ZONES=
  8. FW_NOTRACK_DISABLED=
  9. FW_DEFAULTS_APPLIED=
  10. FW_ADD_CUSTOM_CHAINS=
  11. FW_ACCEPT_REDIRECTS=
  12. FW_ACCEPT_SRC_ROUTE=
  13. FW_DEFAULT_INPUT_POLICY=REJECT
  14. FW_DEFAULT_OUTPUT_POLICY=REJECT
  15. FW_DEFAULT_FORWARD_POLICY=REJECT
  16. FW_DISABLE_IPV4=0
  17. FW_DISABLE_IPV6=0
  18. fw_load_defaults() {
  19. fw_config_get_section "$1" defaults { \
  20. string input $FW_DEFAULT_INPUT_POLICY \
  21. string output $FW_DEFAULT_OUTPUT_POLICY \
  22. string forward $FW_DEFAULT_FORWARD_POLICY \
  23. boolean drop_invalid 0 \
  24. boolean syn_flood 0 \
  25. boolean synflood_protect 0 \
  26. string synflood_rate 25 \
  27. string synflood_burst 50 \
  28. boolean tcp_syncookies 1 \
  29. boolean tcp_ecn 0 \
  30. boolean tcp_westwood 0 \
  31. boolean tcp_window_scaling 1 \
  32. boolean accept_redirects 0 \
  33. boolean accept_source_route 0 \
  34. boolean custom_chains 1 \
  35. boolean disable_ipv6 0 \
  36. } || return
  37. [ -n "$FW_DEFAULTS_APPLIED" ] && {
  38. fw_log error "duplicate defaults section detected, skipping"
  39. return 1
  40. }
  41. FW_DEFAULTS_APPLIED=1
  42. FW_DEFAULT_INPUT_POLICY=$defaults_input
  43. FW_DEFAULT_OUTPUT_POLICY=$defaults_output
  44. FW_DEFAULT_FORWARD_POLICY=$defaults_forward
  45. FW_ADD_CUSTOM_CHAINS=$defaults_custom_chains
  46. FW_ACCEPT_REDIRECTS=$defaults_accept_redirects
  47. FW_ACCEPT_SRC_ROUTE=$defaults_accept_source_route
  48. FW_DISABLE_IPV6=$defaults_disable_ipv6
  49. fw_callback pre defaults
  50. # Seems like there are only one sysctl for both IP versions.
  51. for s in syncookies ecn westwood window_scaling; do
  52. eval "sysctl -e -w net.ipv4.tcp_${s}=\$defaults_tcp_${s}" >/dev/null
  53. done
  54. fw_sysctl_interface all
  55. fw add i f INPUT ACCEPT { -m conntrack --ctstate RELATED,ESTABLISHED }
  56. fw add i f OUTPUT ACCEPT { -m conntrack --ctstate RELATED,ESTABLISHED }
  57. fw add i f FORWARD ACCEPT { -m conntrack --ctstate RELATED,ESTABLISHED }
  58. [ $defaults_drop_invalid == 1 ] && {
  59. fw add i f INPUT DROP { -m conntrack --ctstate INVALID }
  60. fw add i f OUTPUT DROP { -m conntrack --ctstate INVALID }
  61. fw add i f FORWARD DROP { -m conntrack --ctstate INVALID }
  62. FW_NOTRACK_DISABLED=1
  63. }
  64. fw add i f INPUT ACCEPT { -i lo }
  65. fw add i f OUTPUT ACCEPT { -o lo }
  66. # Compatibility to old 'syn_flood' parameter
  67. [ $defaults_syn_flood == 1 ] && \
  68. defaults_synflood_protect=1
  69. [ "${defaults_synflood_rate%/*}" == "$defaults_synflood_rate" ] && \
  70. defaults_synflood_rate="$defaults_synflood_rate/second"
  71. [ $defaults_synflood_protect == 1 ] && {
  72. echo "Loading synflood protection"
  73. fw_callback pre synflood
  74. fw add i f syn_flood
  75. fw add i f syn_flood RETURN { \
  76. -p tcp --syn \
  77. -m limit --limit "${defaults_synflood_rate}" --limit-burst "${defaults_synflood_burst}" \
  78. }
  79. fw add i f syn_flood DROP
  80. fw add i f INPUT syn_flood { -p tcp --syn }
  81. fw_callback post synflood
  82. }
  83. [ $defaults_custom_chains == 1 ] && {
  84. echo "Adding custom chains"
  85. fw add i f input_rule
  86. fw add i f output_rule
  87. fw add i f forwarding_rule
  88. fw add i n prerouting_rule
  89. fw add i n postrouting_rule
  90. fw add i f INPUT input_rule
  91. fw add i f OUTPUT output_rule
  92. fw add i f FORWARD forwarding_rule
  93. fw add i n PREROUTING prerouting_rule
  94. fw add i n POSTROUTING postrouting_rule
  95. }
  96. fw add i f input
  97. fw add i f output
  98. fw add i f forward
  99. fw add i f INPUT input
  100. fw add i f OUTPUT output
  101. fw add i f FORWARD forward
  102. fw add i f reject
  103. fw add i f reject REJECT { --reject-with tcp-reset -p tcp }
  104. fw add i f reject REJECT { --reject-with port-unreach }
  105. fw_set_filter_policy
  106. fw_callback post defaults
  107. }
  108. fw_config_get_zone() {
  109. [ "${zone_NAME}" != "$1" ] || return
  110. fw_config_get_section "$1" zone { \
  111. string name "$1" \
  112. string network "" \
  113. string input "$FW_DEFAULT_INPUT_POLICY" \
  114. string output "$FW_DEFAULT_OUTPUT_POLICY" \
  115. string forward "$FW_DEFAULT_FORWARD_POLICY" \
  116. boolean masq 0 \
  117. string masq_src "" \
  118. string masq_dest "" \
  119. boolean conntrack 0 \
  120. boolean mtu_fix 0 \
  121. boolean custom_chains "$FW_ADD_CUSTOM_CHAINS" \
  122. boolean log 0 \
  123. string log_limit 10 \
  124. string family "" \
  125. } || return
  126. [ -n "$zone_name" ] || zone_name=$zone_NAME
  127. [ -n "$zone_network" ] || zone_network=$zone_name
  128. }
  129. fw_load_zone() {
  130. fw_config_get_zone "$1"
  131. list_contains FW_ZONES $zone_name && {
  132. fw_log error "zone ${zone_name}: duplicated zone, skipping"
  133. return 0
  134. }
  135. append FW_ZONES $zone_name
  136. fw_callback pre zone
  137. [ $zone_conntrack = 1 -o $zone_masq = 1 ] && \
  138. append FW_CONNTRACK_ZONES "$zone_name"
  139. local mode
  140. case "$zone_family" in
  141. *4)
  142. mode=4
  143. append FW_ZONES4 $zone_name
  144. uci_set_state firewall core ${zone_name}_ipv4 1
  145. ;;
  146. *6)
  147. mode=6
  148. append FW_ZONES6 $zone_name
  149. uci_set_state firewall core ${zone_name}_ipv6 1
  150. ;;
  151. *)
  152. mode=i
  153. append FW_ZONES4 $zone_name
  154. append FW_ZONES6 $zone_name
  155. uci_set_state firewall core ${zone_name}_ipv4 1
  156. uci_set_state firewall core ${zone_name}_ipv6 1
  157. ;;
  158. esac
  159. local chain=zone_${zone_name}
  160. fw add $mode f ${chain}_ACCEPT
  161. fw add $mode f ${chain}_DROP
  162. fw add $mode f ${chain}_REJECT
  163. # TODO: Rename to ${chain}_input
  164. fw add $mode f ${chain}
  165. fw add $mode f ${chain} ${chain}_${zone_input} $
  166. fw add $mode f ${chain}_forward
  167. fw add $mode f ${chain}_forward ${chain}_${zone_forward} $
  168. # TODO: add ${chain}_output
  169. fw add $mode f output ${chain}_${zone_output} $
  170. # TODO: Rename to ${chain}_MASQUERADE
  171. fw add $mode n ${chain}_nat
  172. fw add $mode n ${chain}_prerouting
  173. fw add $mode r ${chain}_notrack
  174. [ $zone_mtu_fix == 1 ] && {
  175. fw add $mode m ${chain}_MSSFIX
  176. fw add $mode m FORWARD ${chain}_MSSFIX ^
  177. uci_set_state firewall core ${zone_name}_tcpmss 1
  178. }
  179. [ $zone_custom_chains == 1 ] && {
  180. [ $FW_ADD_CUSTOM_CHAINS == 1 ] || \
  181. fw_die "zone ${zone_name}: custom_chains globally disabled"
  182. fw add $mode f input_${zone_name}
  183. fw add $mode f ${chain} input_${zone_name} ^
  184. fw add $mode f forwarding_${zone_name}
  185. fw add $mode f ${chain}_forward forwarding_${zone_name} ^
  186. fw add $mode n prerouting_${zone_name}
  187. fw add $mode n ${chain}_prerouting prerouting_${zone_name} ^
  188. }
  189. [ "$zone_log" == 1 ] && {
  190. [ "${zone_log_limit%/*}" == "$zone_log_limit" ] && \
  191. zone_log_limit="$zone_log_limit/minute"
  192. local t
  193. for t in REJECT DROP; do
  194. fw add $mode f ${chain}_${t} LOG ^ \
  195. { -m limit --limit $zone_log_limit --log-prefix "$t($zone_name): " }
  196. done
  197. [ $zone_mtu_fix == 1 ] && \
  198. fw add $mode m ${chain}_MSSFIX LOG ^ \
  199. { -m limit --limit $zone_log_limit --log-prefix "MSSFIX($zone_name): " }
  200. }
  201. # NB: if MASQUERADING for IPv6 becomes available we'll need a family check here
  202. if [ "$zone_masq" == 1 ]; then
  203. local msrc mdst
  204. for msrc in ${zone_masq_src:-0.0.0.0/0}; do
  205. case "$msrc" in
  206. *.*) fw_get_negation msrc '-s' "$msrc" ;;
  207. *) fw_get_subnet4 msrc '-s' "$msrc" || break ;;
  208. esac
  209. for mdst in ${zone_masq_dest:-0.0.0.0/0}; do
  210. case "$mdst" in
  211. *.*) fw_get_negation mdst '-d' "$mdst" ;;
  212. *) fw_get_subnet4 mdst '-d' "$mdst" || break ;;
  213. esac
  214. fw add $mode n ${chain}_nat MASQUERADE $ { $msrc $mdst }
  215. done
  216. done
  217. fi
  218. fw_callback post zone
  219. }
  220. fw_load_notrack_zone() {
  221. fw_config_get_zone "$1"
  222. list_contains FW_CONNTRACK_ZONES "${zone_name}" && return
  223. fw_callback pre notrack
  224. fw add i r zone_${zone_name}_notrack NOTRACK $
  225. fw_callback post notrack
  226. }
  227. fw_load_include() {
  228. local name="$1"
  229. local path
  230. config_get path ${name} path
  231. [ -e $path ] && (
  232. config() {
  233. fw_log error "You cannot use UCI in firewall includes!" >&2
  234. exit 1
  235. }
  236. . $path
  237. )
  238. }
  239. fw_clear() {
  240. local policy=$1
  241. fw_set_filter_policy $policy
  242. local tab
  243. for tab in f n r; do
  244. fw del i $tab
  245. done
  246. }
  247. fw_set_filter_policy() {
  248. local policy=$1
  249. local chn tgt
  250. for chn in INPUT OUTPUT FORWARD; do
  251. eval "tgt=\${policy:-\${FW_DEFAULT_${chn}_POLICY}}"
  252. [ $tgt == "REJECT" ] && tgt=reject
  253. [ $tgt == "ACCEPT" -o $tgt == "DROP" ] || {
  254. fw add i f $chn $tgt $
  255. tgt=DROP
  256. }
  257. fw policy i f $chn $tgt
  258. done
  259. }
  260. fw_callback() {
  261. local pp=$1
  262. local hk=$2
  263. local libs lib
  264. eval "libs=\$FW_CB_${pp}_${hk}"
  265. [ -n "$libs" ] || return
  266. for lib in $libs; do
  267. ${lib}_${pp}_${hk}_cb
  268. done
  269. }