1 # Copyright (C) 2009-2010 OpenWrt.org
7 local val
=" $(uci_get_state firewall core $var) "
8 val
="${val// $item / }"
11 uci_revert_state firewall core
$var
12 uci_set_state firewall core
$var "${val:+$val }$item"
19 local val
=" $(uci_get_state firewall core $var) "
20 val
="${val// $item / }"
23 uci_revert_state firewall core
$var
24 uci_set_state firewall core
$var "$val"
27 fw_configure_interface
() {
33 [ "$action" == "add" ] && {
34 local status
=$
(uci_get_state network
"$iface" up
0)
35 [ "$status" == 1 ] ||
[ -n "$aliasnet" ] ||
return 0
39 ifname
=$
(uci_get_state network
"$iface" ifname
)
40 ifname
="${ifname%%:*}"
41 [ -z "$ifname" ] && return 0
44 [ "$ifname" == "lo" ] && return 0
46 fw_callback pre interface
51 local chain
=zone_
${zone}
56 fw_get_family_mode mode x
$zone i
58 case "$mode/$subnet" in
59 # Zone supports v6 only or dual, need v6
61 inet
="-s $subnet -d ::/0"
62 onet
="-s ::/0 -d $subnet"
66 # Zone supports v4 only or dual, need v4
68 inet
="-s $subnet -d 0.0.0.0/0"
69 onet
="-s 0.0.0.0/0 -d $subnet"
73 # Need v6 while zone is v4
74 */*:*) fw_log info
"zone $zone does not support IPv6 address family, skipping"; return ;;
76 # Need v4 while zone is v6
77 */*.
*) fw_log info
"zone $zone does not support IPv4 address family, skipping"; return ;;
80 *) mode
="${mode#G}" ;;
83 lock
/var
/run
/firewall-interface.lock
85 fw
$action $mode f
${chain}_ACCEPT ACCEPT $
{ -o "$ifname" $onet }
86 fw
$action $mode f
${chain}_ACCEPT ACCEPT $
{ -i "$ifname" $inet }
87 fw
$action $mode f
${chain}_DROP DROP $
{ -o "$ifname" $onet }
88 fw
$action $mode f
${chain}_DROP DROP $
{ -i "$ifname" $inet }
89 fw
$action $mode f
${chain}_REJECT reject $
{ -o "$ifname" $onet }
90 fw
$action $mode f
${chain}_REJECT reject $
{ -i "$ifname" $inet }
92 fw
$action $mode f
${chain}_MSSFIX TCPMSS $
{ -o "$ifname" -p tcp
--tcp-flags SYN
,RST SYN
--clamp-mss-to-pmtu $onet }
94 fw
$action $mode f input
${chain} $
{ -i "$ifname" $inet }
95 fw
$action $mode f forward
${chain}_forward $
{ -i "$ifname" $inet }
96 fw
$action $mode n PREROUTING
${chain}_prerouting $
{ -i "$ifname" $inet }
97 fw
$action $mode r PREROUTING
${chain}_notrack $
{ -i "$ifname" $inet }
98 fw
$action $mode n POSTROUTING
${chain}_nat $
{ -o "$ifname" $onet }
100 lock
-u /var
/run
/firewall-interface.lock
103 local old_zones old_ifname old_subnets
104 config_get old_zones core
"${iface}_zone"
105 [ -n "$old_zones" ] && {
106 config_get old_ifname core
"${iface}_ifname"
107 config_get old_subnets core
"${iface}_subnets"
110 for z
in $old_zones; do
112 for n
in ${old_subnets:-""}; do
113 fw_log info
"removing $iface ($old_ifname${n:+ alias $n}) from zone $z"
114 fw__do_rules del
$z $old_ifname $n
117 [ -n "$old_subnets" ] ||
{
118 fw__uci_state_del
"${z}_networks" "$iface"
119 env
-i ACTION
=remove ZONE
="$z" INTERFACE
="$iface" DEVICE
="$ifname" /sbin
/hotplug-call firewall
124 config_get old_aliases core
"${iface}_aliases"
127 for a
in $old_aliases; do
128 fw_configure_interface
"$a" del
"$old_ifname"
131 uci_revert_state firewall core
"${iface}_zone"
132 uci_revert_state firewall core
"${iface}_ifname"
133 uci_revert_state firewall core
"${iface}_subnets"
134 uci_revert_state firewall core
"${iface}_aliases"
137 [ "$action" == del
] && return
139 [ -z "$aliasnet" ] && {
141 config_get aliases
"$iface" aliases
144 for a
in $aliases; do
145 local ipaddr netmask ip6addr
146 config_get ipaddr
"$a" ipaddr
147 config_get netmask
"$a" netmask
148 config_get ip6addr
"$a" ip6addr
150 [ -n "$ipaddr" ] && fw_configure_interface
"$a" add
"" "$ipaddr${netmask:+/$netmask}"
151 [ -n "$ip6addr" ] && fw_configure_interface
"$a" add
"" "$ip6addr"
154 fw_sysctl_interface
$ifname
155 fw_callback post interface
157 uci_set_state firewall core
"${iface}_aliases" "$aliases"
160 config_get subnets core
"${iface}_subnets"
161 append subnets
"$aliasnet"
163 config_set core
"${iface}_subnets" "$subnets"
164 uci_set_state firewall core
"${iface}_subnets" "$subnets"
169 fw_config_get_zone
"$1"
170 list_contains zone_network
"$iface" ||
return
172 fw_log info
"adding $iface ($ifname${aliasnet:+ alias $aliasnet}) to zone $zone_name"
173 fw__do_rules add
${zone_name} "$ifname" "$aliasnet"
174 append new_zones
$zone_name
176 [ -n "$aliasnet" ] ||
{
177 fw__uci_state_add
"${zone_name}_networks" "${zone_network}"
178 env
-i ACTION
=add ZONE
="$zone_name" INTERFACE
="$iface" DEVICE
="$ifname" /sbin
/hotplug-call firewall
181 config_foreach load_zone zone
183 uci_set_state firewall core
"${iface}_zone" "$new_zones"
184 uci_set_state firewall core
"${iface}_ifname" "$ifname"
187 fw_sysctl_interface
() {
190 sysctl
-w net.ipv4.conf.
${ifname}.accept_redirects
=$FW_ACCEPT_REDIRECTS
191 sysctl
-w net.ipv6.conf.
${ifname}.accept_redirects
=$FW_ACCEPT_REDIRECTS
192 sysctl
-w net.ipv4.conf.
${ifname}.accept_source_route
=$FW_ACCEPT_SRC_ROUTE
193 sysctl
-w net.ipv6.conf.
${ifname}.accept_source_route
=$FW_ACCEPT_SRC_ROUTE
194 } >/dev
/null
2>/dev
/null