config fw_zones
ZONE_LIST=$CONFIG_SECTION
+CUSTOM_CHAINS=1
DEF_INPUT=DROP
DEF_OUTPUT=DROP
DEF_FORWARD=DROP
config_get output $1 output
config_get forward $1 forward
- [ -z "$input" ] && input=$DEF_INPUT
- [ -z "$output" ] && output=$DEF_OUTPUT
- [ -z "$forward" ] && forward=$DEF_FORWARD
+ DEF_INPUT="${input:-$DEF_INPUT}"
+ DEF_OUTPUT="${output:-$DEF_OUTPUT}"
+ DEF_FORWARD="${forward:-$DEF_FORWARD}"
}
create_zone() {
}
fw_defaults() {
- load_policy $1
- DEF_INPUT=$input
- DEF_OUTPUT=$output
- DEF_FORWARD=$forward
+ [ -n "$DEFAULTS_APPLIED" ] && {
+ echo "Error: multiple defaults sections detected"
+ return;
+ }
+ DEFAULTS_APPLIED=1
+
+ load_policy "$1"
echo 1 > /proc/sys/net/ipv4/tcp_syncookies
for f in /proc/sys/net/ipv4/conf/*/accept_redirects
config_get syn_rate $1 syn_rate
config_get syn_burst $1 syn_burst
[ "$syn_flood" == "1" ] && load_synflood $syn_rate $syn_burst
+
+ echo "Adding custom chains"
+ fw_custom_chains
$IPTABLES -N input
$IPTABLES -N output
$IPTABLES -N reject
$IPTABLES -A reject -p tcp -j REJECT --reject-with tcp-reset
$IPTABLES -A reject -j REJECT --reject-with icmp-port-unreachable
+
+ fw_set_chain_policy INPUT "$DEF_INPUT"
+ fw_set_chain_policy OUTPUT "$DEF_OUTPUT"
+ fw_set_chain_policy FORWARD "$DEF_FORWARD"
}
fw_zone() {
[ -z "$network" ] && network=$name
create_zone "$name" "$network" "$input" "$output" "$forward" "$masq"
+ fw_custom_chains_zone "$name"
}
fw_rule() {
config_get proto $1 proto
config_get target $1 target
config_get ruleset $1 ruleset
-
+
+ ZONE=input
+ TARGET=$target
[ -z "$target" ] && target=DROP
- [ -n "$src" ] && ZONE=zone_$src || ZONE=input
- [ -n "$dest" ] && TARGET=zone_${dest}_$target || TARGET=$target
+ [ -n "$src" -a -z "$dest" ] && ZONE=zone_$src
+ [ -n "$src" -a -n "$dest" ] && ZONE=zone_${src}_forward
+ [ -n "$dest" ] && TARGET=zone_${dest}_$target
add_rule() {
$IPTABLES -I $ZONE 1 \
${proto:+-p $proto} \
}
fw_custom_chains() {
+ [ -n "$CUSTOM_CHAINS" ] || return 0
$IPTABLES -N input_rule
$IPTABLES -N output_rule
$IPTABLES -N forwarding_rule
$IPTABLES -N prerouting_rule -t nat
$IPTABLES -N postrouting_rule -t nat
- $IPTABLES -N input_wan
- $IPTABLES -N forwarding_wan
- $IPTABLES -N prerouting_wan -t nat
$IPTABLES -A INPUT -j input_rule
$IPTABLES -A OUTPUT -j output_rule
$IPTABLES -A FORWARD -j forwarding_rule
$IPTABLES -A PREROUTING -t nat -j prerouting_rule
$IPTABLES -A POSTROUTING -t nat -j postrouting_rule
- $IPTABLES -A zone_wan -j input_wan
- $IPTABLES -A zone_wan_forward -j forwarding_wan
- $IPTABLES -A zone_wan_prerouting -t nat -j prerouting_wan
+}
+
+fw_custom_chains_zone() {
+ local zone="$1"
+
+ [ -n "$CUSTOM_CHAINS" ] || return 0
+ $IPTABLES -N input_${zone}
+ $IPTABLES -N forwarding_${zone}
+ $IPTABLES -N prerouting_${zone} -t nat
+ $IPTABLES -I zone_${zone} 1 -j input_${zone}
+ $IPTABLES -I zone_${zone}_forward 1 -j forwarding_${zone}
+ $IPTABLES -I zone_${zone}_prerouting 1 -t nat -j prerouting_${zone}
}
fw_init() {
+ DEFAULTS_APPLIED=
+
echo "Loading defaults"
config_foreach fw_defaults defaults
echo "Loading zones"
config_foreach fw_forwarding forwarding
echo "Loading redirects"
config_foreach fw_redirect redirect
- echo "Adding custom chains"
- fw_custom_chains
echo "Loading includes"
config_foreach fw_include include
uci_set_state firewall core loaded 1
unset CONFIG_APPEND
config_load network
config_foreach fw_addif interface
- fw_set_chain_policy INPUT $input
- fw_set_chain_policy OUTPUT $output
- fw_set_chain_policy FORWARD $forward
}
fw_stop() {