1 Testing that zone masquerading is properly mapped to chains.
5 include("./root/usr/share/firewall4/main.uc", {
6 getenv: function(varname) {
16 -- File uci/helpers.json --
20 -- File fs/open~_sys_class_net_zone1_flags.txt --
24 -- File fs/open~_sys_class_net_zone2_flags.txt --
28 -- File fs/open~_sys_class_net_zone3_flags.txt --
32 -- File uci/firewall.json --
36 ".description": "Setting masq to true should emit an IPv4 masquerading rule and inhibit default helper assignment",
45 ".description": "Setting masq6 to true should emit an IPv6 masquerading rule and inhibit default helper assignment",
54 ".description": "Setting both masq and masq6 should emit IPv4 and IPv6 masquerading and inhibit default helper assignment",
76 define test1_devices = { "zone1" }
77 define test1_subnets = { }
79 define test2_devices = { "zone2" }
80 define test2_subnets = { }
82 define test3_devices = { "zone3" }
83 define test3_subnets = { }
90 include "/etc/nftables.d/*.nft"
98 type filter hook input priority filter; policy drop;
100 iif "lo" accept comment "!fw4: Accept traffic from loopback"
102 ct state vmap { established : accept, related : accept } comment "!fw4: Handle inbound flows"
103 iifname "zone1" jump input_test1 comment "!fw4: Handle test1 IPv4/IPv6 input traffic"
104 iifname "zone2" jump input_test2 comment "!fw4: Handle test2 IPv4/IPv6 input traffic"
105 iifname "zone3" jump input_test3 comment "!fw4: Handle test3 IPv4/IPv6 input traffic"
109 type filter hook forward priority filter; policy drop;
111 ct state vmap { established : accept, related : accept } comment "!fw4: Handle forwarded flows"
112 iifname "zone1" jump forward_test1 comment "!fw4: Handle test1 IPv4/IPv6 forward traffic"
113 iifname "zone2" jump forward_test2 comment "!fw4: Handle test2 IPv4/IPv6 forward traffic"
114 iifname "zone3" jump forward_test3 comment "!fw4: Handle test3 IPv4/IPv6 forward traffic"
118 type filter hook output priority filter; policy drop;
120 oif "lo" accept comment "!fw4: Accept traffic towards loopback"
122 ct state vmap { established : accept, related : accept } comment "!fw4: Handle outbound flows"
123 oifname "zone1" jump output_test1 comment "!fw4: Handle test1 IPv4/IPv6 output traffic"
124 oifname "zone2" jump output_test2 comment "!fw4: Handle test2 IPv4/IPv6 output traffic"
125 oifname "zone3" jump output_test3 comment "!fw4: Handle test3 IPv4/IPv6 output traffic"
129 type filter hook prerouting priority filter; policy accept;
132 chain handle_reject {
133 meta l4proto tcp reject with tcp reset comment "!fw4: Reject TCP traffic"
134 reject with icmpx type port-unreachable comment "!fw4: Reject any other traffic"
138 jump accept_from_test1
145 chain forward_test1 {
149 chain accept_from_test1 {
150 iifname "zone1" counter accept comment "!fw4: accept test1 IPv4/IPv6 traffic"
153 chain accept_to_test1 {
154 meta nfproto ipv4 oifname "zone1" ct state invalid counter drop comment "!fw4: Prevent NAT leakage"
155 oifname "zone1" counter accept comment "!fw4: accept test1 IPv4/IPv6 traffic"
166 chain forward_test2 {
170 chain drop_from_test2 {
171 iifname "zone2" counter drop comment "!fw4: drop test2 IPv4/IPv6 traffic"
174 chain drop_to_test2 {
175 oifname "zone2" counter drop comment "!fw4: drop test2 IPv4/IPv6 traffic"
179 jump reject_from_test3
186 chain forward_test3 {
190 chain reject_from_test3 {
191 iifname "zone3" counter jump handle_reject comment "!fw4: reject test3 IPv4/IPv6 traffic"
194 chain reject_to_test3 {
195 oifname "zone3" counter jump handle_reject comment "!fw4: reject test3 IPv4/IPv6 traffic"
204 type nat hook prerouting priority dstnat; policy accept;
208 type nat hook postrouting priority srcnat; policy accept;
209 oifname "zone1" jump srcnat_test1 comment "!fw4: Handle test1 IPv4/IPv6 srcnat traffic"
210 oifname "zone2" jump srcnat_test2 comment "!fw4: Handle test2 IPv4/IPv6 srcnat traffic"
211 oifname "zone3" jump srcnat_test3 comment "!fw4: Handle test3 IPv4/IPv6 srcnat traffic"
215 meta nfproto ipv4 masquerade comment "!fw4: Masquerade IPv4 test1 traffic"
219 meta nfproto ipv6 masquerade comment "!fw4: Masquerade IPv6 test2 traffic"
223 meta nfproto ipv4 masquerade comment "!fw4: Masquerade IPv4 test3 traffic"
224 meta nfproto ipv6 masquerade comment "!fw4: Masquerade IPv6 test3 traffic"
229 # Raw rules (notrack)
232 chain raw_prerouting {
233 type filter hook prerouting priority raw; policy accept;
237 type filter hook output priority raw; policy accept;
245 chain mangle_prerouting {
246 type filter hook prerouting priority mangle; policy accept;
249 chain mangle_postrouting {
250 type filter hook postrouting priority mangle; policy accept;
254 type filter hook input priority mangle; policy accept;
257 chain mangle_output {
258 type route hook output priority mangle; policy accept;
261 chain mangle_forward {
262 type filter hook forward priority mangle; policy accept;