[package] firewall:
[openwrt/svn-archive/archive.git] / package / firewall / files / lib / core_interface.sh
1 # Copyright (C) 2009-2010 OpenWrt.org
2
3 fw_configure_interface() {
4 local iface=$1
5 local action=$2
6 local ifname=$3
7 local aliasnet=$4
8
9 [ "$action" == "add" ] && {
10 local status=$(uci_get_state network "$iface" up 0)
11 [ "$status" == 1 ] || [ -n "$aliasnet" ] || return 0
12 }
13
14 [ -n "$ifname" ] || {
15 ifname=$(uci_get_state network "$iface" ifname)
16 ifname="${ifname%%:*}"
17 [ -z "$ifname" ] && return 0
18 }
19
20 [ "$ifname" == "lo" ] && return 0
21
22 fw_callback pre interface
23
24 fw__do_rules() {
25 local action=$1
26 local zone=$2
27 local chain=zone_${zone}
28 local ifname=$3
29 local subnet=$4
30 local masq_src=$5
31 local masq_dest=$6
32
33 local inet onet
34 local mode=$(fw_get_family_mode x $zone i)
35
36 case "$mode/$subnet" in
37 # Zone supports v6 only or dual, need v6
38 G6/*:*|i/*:*)
39 inet="-s $subnet -d ::/0"
40 onet="-s ::/0 -d $subnet"
41 mode=6
42 ;;
43
44 # Zone supports v4 only or dual, need v4
45 G4/*.*.*.*|i/*.*.*.*)
46 inet="-s $subnet -d 0.0.0.0/0"
47 onet="-s 0.0.0.0/0 -d $subnet"
48 mode=4
49 ;;
50
51 # Need v6 while zone is v4
52 */*:*) fw_log info "zone $zone does not support IPv6 address family, skipping"; return ;;
53
54 # Need v4 while zone is v6
55 */*.*) fw_log info "zone $zone does not support IPv4 address family, skipping"; return ;;
56 esac
57
58 fw $action $mode f ${chain}_ACCEPT ACCEPT $ { -o "$ifname" $onet }
59 fw $action $mode f ${chain}_ACCEPT ACCEPT $ { -i "$ifname" $inet }
60 fw $action $mode f ${chain}_DROP DROP $ { -o "$ifname" $onet }
61 fw $action $mode f ${chain}_DROP DROP $ { -i "$ifname" $inet }
62 fw $action $mode f ${chain}_REJECT reject $ { -o "$ifname" $onet }
63 fw $action $mode f ${chain}_REJECT reject $ { -i "$ifname" $inet }
64
65 # NB: if MASQUERADING for IPv6 becomes available we'll need a family check here
66 local msrc mdst
67 for msrc in ${masq_src:-0.0.0.0/0}; do
68 [ "${msrc#!}" != "$msrc" ] && msrc="! -s ${msrc#!}" || msrc="-s $msrc"
69 for mdst in ${subnet:-${masq_dest:-0.0.0.0/0}}; do
70 [ "${mdst#!}" != "$mdst" ] && mdst="! -d ${mdst#!}" || mdst="-d $mdst"
71 fw $action $mode n ${chain}_nat MASQUERADE $ { -o "$ifname" $msrc $mdst }
72 done
73 done
74
75 fw $action $mode f ${chain}_MSSFIX TCPMSS $ { -o "$ifname" -p tcp --tcp-flags SYN,RST SYN --clamp-mss-to-pmtu $onet }
76
77 fw $action $mode f input ${chain} $ { -i "$ifname" $inet }
78 fw $action $mode f forward ${chain}_forward $ { -i "$ifname" $inet }
79 fw $action $mode n PREROUTING ${chain}_prerouting $ { -i "$ifname" $inet }
80 fw $action $mode r PREROUTING ${chain}_notrack $ { -i "$ifname" $inet }
81 }
82
83 local old_zones old_ifname old_subnets old_masq_src old_masq_dest
84 config_get old_zones core "${iface}_zone"
85 [ -n "$old_zones" ] && {
86 config_get old_ifname core "${iface}_ifname"
87 config_get old_subnets core "${iface}_subnets"
88 config_get old_masq_src core "${iface}_masq_src"
89 config_get old_masq_dest core "${iface}_masq_dest"
90
91 local z
92 for z in $old_zones; do
93 local n
94 for n in ${old_subnets:-""}; do
95 fw_log info "removing $iface ($old_ifname${n:+ alias $n}) from zone $z"
96 fw__do_rules del $z $old_ifname $n "$old_masq_src" "$old_masq_dest"
97 done
98
99 [ -n "$old_subnets" ] || ACTION=remove ZONE="$z" INTERFACE="$iface" DEVICE="$ifname" /sbin/hotplug-call firewall
100 done
101
102 local old_aliases
103 config_get old_aliases core "${iface}_aliases"
104
105 local a
106 for a in $old_aliases; do
107 fw_configure_interface "$a" del "$old_ifname"
108 done
109
110 uci_revert_state firewall core "${iface}_zone"
111 uci_revert_state firewall core "${iface}_ifname"
112 uci_revert_state firewall core "${iface}_subnets"
113 uci_revert_state firewall core "${iface}_aliases"
114 uci_revert_state firewall core "${iface}_masq_src"
115 uci_revert_state firewall core "${iface}_masq_dest"
116 }
117
118 [ "$action" == del ] && return
119
120 [ -z "$aliasnet" ] && {
121 local aliases
122 config_get aliases "$iface" aliases
123
124 local a
125 for a in $aliases; do
126 local ipaddr netmask ip6addr
127 config_get ipaddr "$a" ipaddr
128 config_get netmask "$a" netmask
129 config_get ip6addr "$a" ip6addr
130
131 [ -n "$ipaddr" ] && fw_configure_interface "$a" add "" "$ipaddr${netmask:+/$netmask}"
132 [ -n "$ip6addr" ] && fw_configure_interface "$a" add "" "$ip6addr"
133 done
134
135 fw_sysctl_interface $ifname
136 fw_callback post interface
137
138 uci_set_state firewall core "${iface}_aliases" "$aliases"
139 } || {
140 local subnets=
141 config_get subnets core "${iface}_subnets"
142 append subnets "$aliasnet"
143
144 config_set core "${iface}_subnets" "$subnets"
145 uci_set_state firewall core "${iface}_subnets" "$subnets"
146 }
147
148 local new_zones=
149 local new_masq_src=
150 local new_masq_dest=
151 load_zone() {
152 fw_config_get_zone "$1"
153 list_contains zone_network "$iface" || return
154
155 fw_log info "adding $iface ($ifname${aliasnet:+ alias $aliasnet}) to zone $zone_name"
156 fw__do_rules add ${zone_name} "$ifname" "$aliasnet" "$zone_masq_src" "$zone_masq_dest"
157 append new_zones $zone_name
158 append new_masq_src "$zone_masq_src"
159 append new_masq_dest "$zone_masq_dest"
160
161 [ -n "$aliasnet" ] || ACTION=add ZONE="$zone_name" INTERFACE="$iface" DEVICE="$ifname" /sbin/hotplug-call firewall
162 }
163 config_foreach load_zone zone
164
165 uci_set_state firewall core "${iface}_zone" "$new_zones"
166 uci_set_state firewall core "${iface}_ifname" "$ifname"
167 uci_set_state firewall core "${iface}_masq_src" "$new_masq_src"
168 uci_set_state firewall core "${iface}_masq_dest" "$new_masq_dest"
169 }
170
171 fw_sysctl_interface() {
172 local ifname=$1
173 {
174 sysctl -w net.ipv4.conf.${ifname}.accept_redirects=$FW_ACCEPT_REDIRECTS
175 sysctl -w net.ipv6.conf.${ifname}.accept_redirects=$FW_ACCEPT_REDIRECTS
176 sysctl -w net.ipv4.conf.${ifname}.accept_source_route=$FW_ACCEPT_SRC_ROUTE
177 sysctl -w net.ipv6.conf.${ifname}.accept_source_route=$FW_ACCEPT_SRC_ROUTE
178 } >/dev/null 2>/dev/null
179 }
180