1 # Copyright (C) 2009-2010 OpenWrt.org
2 # Copyright (C) 2008 John Crispin <blogic@openwrt.org>
15 FW_DEFAULT_INPUT_POLICY
=REJECT
16 FW_DEFAULT_OUTPUT_POLICY
=REJECT
17 FW_DEFAULT_FORWARD_POLICY
=REJECT
24 fw_config_get_section
"$1" defaults
{ \
25 string input
$FW_DEFAULT_INPUT_POLICY \
26 string output
$FW_DEFAULT_OUTPUT_POLICY \
27 string forward
$FW_DEFAULT_FORWARD_POLICY \
28 boolean drop_invalid
0 \
30 boolean synflood_protect
0 \
31 string synflood_rate
25 \
32 string synflood_burst
50 \
33 boolean tcp_syncookies
1 \
35 boolean tcp_westwood
0 \
36 boolean tcp_window_scaling
1 \
37 boolean accept_redirects
0 \
38 boolean accept_source_route
0 \
39 boolean custom_chains
1 \
40 boolean disable_ipv6
0 \
42 [ -n "$FW_DEFAULTS_APPLIED" ] && {
43 echo "Error: multiple defaults sections detected"
48 FW_DEFAULT_INPUT_POLICY
=$defaults_input
49 FW_DEFAULT_OUTPUT_POLICY
=$defaults_output
50 FW_DEFAULT_FORWARD_POLICY
=$defaults_forward
52 FW_ADD_CUSTOM_CHAINS
=$defaults_custom_chains
54 FW_ACCEPT_REDIRECTS
=$defaults_accept_redirects
55 FW_ACCEPT_SRC_ROUTE
=$defaults_accept_source_route
57 FW_DISABLE_IPV6
=$defaults_disable_ipv6
59 fw_callback pre defaults
61 # Seems like there are only one sysctl for both IP versions.
62 for s
in syncookies ecn westwood window_scaling
; do
63 eval "sysctl -e -w net.ipv4.tcp_${s}=\$defaults_tcp_${s}" >/dev
/null
65 fw_sysctl_interface all
67 [ $defaults_drop_invalid == 1 ] && {
68 fw add i f INPUT DROP
{ -m state
--state INVALID
}
69 fw add i f OUTPUT DROP
{ -m state
--state INVALID
}
70 fw add i f FORWARD DROP
{ -m state
--state INVALID
}
74 fw add i f INPUT ACCEPT
{ -m state
--state RELATED
,ESTABLISHED
}
75 fw add i f OUTPUT ACCEPT
{ -m state
--state RELATED
,ESTABLISHED
}
76 fw add i f FORWARD ACCEPT
{ -m state
--state RELATED
,ESTABLISHED
}
78 fw add i f INPUT ACCEPT
{ -i lo
}
79 fw add i f OUTPUT ACCEPT
{ -o lo
}
81 # Compatibility to old 'syn_flood' parameter
82 [ $defaults_syn_flood == 1 ] && \
83 defaults_synflood_protect
=1
85 [ $defaults_synflood_protect == 1 ] && {
86 echo "Loading synflood protection"
87 fw_callback pre synflood
89 fw add i f syn_flood RETURN
{ \
91 -m limit
--limit "${defaults_synflood_rate}/second" --limit-burst "${defaults_synflood_burst}" \
93 fw add i f syn_flood DROP
94 fw add i f INPUT syn_flood
{ -p tcp
--syn }
95 fw_callback post synflood
98 [ $defaults_custom_chains == 1 ] && {
99 echo "Adding custom chains"
100 fw add i f input_rule
101 fw add i f output_rule
102 fw add i f forwarding_rule
103 fw add i n prerouting_rule
104 fw add i n postrouting_rule
106 fw add i f INPUT input_rule
107 fw add i f OUTPUT output_rule
108 fw add i f FORWARD forwarding_rule
109 fw add i n PREROUTING prerouting_rule
110 fw add i n POSTROUTING postrouting_rule
117 fw add i f INPUT input
118 fw add i f OUTPUT output
119 fw add i f FORWARD forward
122 fw add i f reject REJECT
{ --reject-with tcp-reset
-p tcp
}
123 fw add i f reject REJECT
{ --reject-with port-unreach
}
127 fw_callback post defaults
131 fw_config_get_zone
() {
132 [ "${zone_NAME}" != "$1" ] ||
return
133 fw_config_get_section
"$1" zone
{ \
136 string input
"$FW_DEFAULT_INPUT_POLICY" \
137 string output
"$FW_DEFAULT_OUTPUT_POLICY" \
138 string forward
"$FW_DEFAULT_FORWARD_POLICY" \
140 boolean conntrack
0 \
142 boolean custom_chains
"$FW_ADD_CUSTOM_CHAINS" \
144 [ -n "$zone_name" ] || zone_name
=$zone_NAME
145 [ -n "$zone_network" ] || zone_network
=$zone_name
149 fw_config_get_zone
"$1"
151 list_contains FW_ZONES
$zone_name && {
152 fw_die
"zone ${zone_name}: duplicated zone"
154 append FW_ZONES
$zone_name
158 [ $zone_conntrack = 1 -o $zone_masq = 1 ] && \
159 append FW_CONNTRACK_ZONES
"$zone_NAME"
161 local chain
=zone_
${zone_name}
163 fw add i f
${chain}_ACCEPT
164 fw add i f
${chain}_DROP
165 fw add i f
${chain}_REJECT
166 fw add i f
${chain}_MSSFIX
168 # TODO: Rename to ${chain}_input
170 fw add i f
${chain} ${chain}_${zone_input} $
172 fw add i f
${chain}_forward
173 fw add i f
${chain}_forward ${chain}_${zone_forward} $
175 # TODO: add ${chain}_output
176 fw add i f output
${chain}_
${zone_output} $
178 # TODO: Rename to ${chain}_MASQUERADE
179 fw add i n
${chain}_nat
180 fw add i n
${chain}_prerouting
182 fw add i r
${chain}_notrack
183 [ $zone_masq == 1 ] && \
184 fw add i n POSTROUTING
${chain}_nat $
186 [ $zone_mtu_fix == 1 ] && \
187 fw add i f FORWARD
${chain}_MSSFIX ^
189 [ $zone_custom_chains == 1 ] && {
190 [ $FW_ADD_CUSTOM_CHAINS == 1 ] || \
191 fw_die
"zone ${zone_name}: custom_chains globally disabled"
193 fw add i f input_
${zone_name}
194 fw add i f
${chain} input_
${zone_name} ^
196 fw add i f forwarding_
${zone_name}
197 fw add i f
${chain}_forward forwarding_
${zone_name} ^
199 fw add i n prerouting_
${zone_name}
200 fw add i n
${chain}_prerouting prerouting_
${zone_name} ^
203 fw_callback post zone
206 fw_load_notrack_zone
() {
207 list_contains FW_CONNTRACK_ZONES
"$1" && return
209 fw_config_get_zone
"$1"
211 fw_callback pre notrack
213 fw add i f zone_
${zone_name}_notrack NOTRACK $
215 fw_callback post notrack
222 local path
; config_get path
${name} path
223 [ -e $path ] && .
$path
230 fw_set_filter_policy
$policy
238 fw_set_filter_policy
() {
242 for chn
in INPUT OUTPUT FORWARD
; do
243 eval "tgt=\${policy:-\${FW_DEFAULT_${chn}_POLICY}}"
244 [ $tgt == "REJECT" ] && tgt
=reject
245 [ $tgt == "ACCEPT" -o $tgt == "DROP" ] ||
{
246 fw add i f
$chn $tgt $
249 fw policy i f
$chn $tgt
259 eval "libs=\$FW_CB_${pp}_${hk}"
260 [ -n "$libs" ] ||
return
262 ${lib}_${pp}_${hk}_cb