#!/bin/sh # # This is automatically generated file. DO NOT MODIFY ! # # Firewall Builder fwb_ipt v5.0.0.3568 # # Generated Fri Oct 14 22:00:53 2011 MDT by azcrumpty # # files: * DD-WRT.fw /tmp/DD-WRT.fw # # Compiled for iptables (any version) DD-WRT (nvram) # set -x PATH="/sbin:/usr/sbin:/bin:/usr/bin:${PATH}" export PATH LSMOD="/sbin/lsmod" MODPROBE="/sbin/modprobe" IPTABLES="/usr/sbin/iptables" IP6TABLES="/usr/sbin/ip6tables" IPTABLES_RESTORE="/usr/sbin/iptables-restore" IP6TABLES_RESTORE="/usr/sbin/ip6tables-restore" IP="/usr/sbin/ip" IFCONFIG="/sbin/ifconfig" VCONFIG="/sbin/vconfig" BRCTL="/usr/sbin/brctl" IFENSLAVE="/usr/sbin/ifenslave" IPSET="/usr/sbin/ipset" LOGGER="/usr/bin/logger" log() { echo "$1" command -v "$LOGGER" >/dev/null 2>&1 && $LOGGER -p info "$1" } getInterfaceVarName() { echo $1 | sed 's/\./_/' } getaddr_internal() { dev=$1 name=$2 af=$3 L=$($IP $af addr show dev $dev | sed -n '/inet/{s!.*inet6* !!;s!/.*!!p}' | sed 's/peer.*//') test -z "$L" && { eval "$name=''" return } eval "${name}_list=\"$L\"" } getnet_internal() { dev=$1 name=$2 af=$3 L=$($IP route list proto kernel | grep $dev | grep -v default | sed 's! .*$!!') test -z "$L" && { eval "$name=''" return } eval "${name}_list=\"$L\"" } getaddr() { getaddr_internal $1 $2 "-4" } getaddr6() { getaddr_internal $1 $2 "-6" } getnet() { getnet_internal $1 $2 "-4" } getnet6() { getnet_internal $1 $2 "-6" } # function getinterfaces is used to process wildcard interfaces getinterfaces() { NAME=$1 $IP link show | grep ": $NAME" | while read L; do OIFS=$IFS IFS=" :" set $L IFS=$OIFS echo $2 done } diff_intf() { func=$1 list1=$2 list2=$3 cmd=$4 for intf in $list1 do echo $list2 | grep -q $intf || { # $vlan is absent in list 2 $func $intf $cmd } done } find_program() { PGM=$1 command -v $PGM >/dev/null 2>&1 || { echo "$PGM not found" exit 1 } } check_tools() { find_program $IPTABLES find_program $IP } reset_iptables_v4() { $IPTABLES -P OUTPUT DROP $IPTABLES -P INPUT DROP $IPTABLES -P FORWARD DROP cat /proc/net/ip_tables_names | while read table; do $IPTABLES -t $table -L -n | while read c chain rest; do if test "X$c" = "XChain" ; then $IPTABLES -t $table -F $chain fi done $IPTABLES -t $table -X done } reset_iptables_v6() { $IP6TABLES -P OUTPUT DROP $IP6TABLES -P INPUT DROP $IP6TABLES -P FORWARD DROP cat /proc/net/ip6_tables_names | while read table; do $IP6TABLES -t $table -L -n | while read c chain rest; do if test "X$c" = "XChain" ; then $IP6TABLES -t $table -F $chain fi done $IP6TABLES -t $table -X done } P2P_INTERFACE_WARNING="" missing_address() { address=$1 cmd=$2 oldIFS=$IFS IFS="@" set $address addr=$1 interface=$2 IFS=$oldIFS $IP addr show dev $interface | grep -q POINTOPOINT && { test -z "$P2P_INTERFACE_WARNING" && echo "Warning: Can not update address of interface $interface. fwbuilder can not manage addresses of point-to-point interfaces yet" P2P_INTERFACE_WARNING="yes" return } test "$cmd" = "add" && { echo "# Adding ip address: $interface $addr" echo $addr | grep -q ':' && { $FWBDEBUG $IP addr $cmd $addr dev $interface } || { $FWBDEBUG $IP addr $cmd $addr broadcast + dev $interface } } test "$cmd" = "del" && { echo "# Removing ip address: $interface $addr" $FWBDEBUG $IP addr $cmd $addr dev $interface || exit 1 } $FWBDEBUG $IP link set $interface up } list_addresses_by_scope() { interface=$1 scope=$2 ignore_list=$3 $IP addr ls dev $interface | \ awk -v IGNORED="$ignore_list" -v SCOPE="$scope" \ 'BEGIN { split(IGNORED,ignored_arr); for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;} } (/inet |inet6 / && $0 ~ SCOPE && !($2 in ignored_dict)) {print $2;}' | \ while read addr; do echo "${addr}@$interface" done | sort } update_addresses_of_interface() { ignore_list=$2 set $1 interface=$1 shift FWB_ADDRS=$( for addr in $*; do echo "${addr}@$interface" done | sort ) CURRENT_ADDRS_ALL_SCOPES="" CURRENT_ADDRS_GLOBAL_SCOPE="" $IP link show dev $interface >/dev/null 2>&1 && { CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface 'scope .*' "$ignore_list") CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scope global' "$ignore_list") } || { echo "# Interface $interface does not exist" # Stop the script if we are not in test mode test -z "$FWBDEBUG" && exit 1 } diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del } clear_addresses_except_known_interfaces() { $IP link show | sed 's/://g' | awk -v IGNORED="$*" \ 'BEGIN { split(IGNORED,ignored_arr); for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;} } (/state/ && !($2 in ignored_dict)) {print $2;}' | \ while read intf; do echo "# Removing addresses not configured in fwbuilder from interface $intf" $FWBDEBUG $IP addr flush dev $intf scope global $FWBDEBUG $IP link set $intf down done } check_file() { test -r "$2" || { echo "Can not find file $2 referenced by address table object $1" exit 1 } } check_run_time_address_table_files() { : } load_modules() { : } verify_interfaces() { : echo "Verifying interfaces: vlan2 br0 lo tun0 br1" for i in vlan2 br0 lo tun0 br1 ; do $IP link show "$i" > /dev/null 2>&1 || { log "Interface $i does not exist" exit 1 } done } prolog_commands() { : } epilog_commands() { : } run_epilog_and_exit() { epilog_commands exit $1 } configure_interfaces() { : # Configure interfaces update_addresses_of_interface "br0 192.168.1.1/24" "" update_addresses_of_interface "lo 127.0.0.1/8" "" update_addresses_of_interface "br1 192.168.2.1/24" "" getaddr vlan2 i_vlan2 getaddr6 vlan2 i_vlan2_v6 getnet vlan2 i_vlan2_network getnet6 vlan2 i_vlan2_v6_network getaddr tun0 i_tun0 getaddr6 tun0 i_tun0_v6 getnet tun0 i_tun0_network getnet6 tun0 i_tun0_v6_network } script_body() { # ================ IPv4 # ================ Table 'filter', automatic rules # accept established sessions $IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT $IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT $IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT # ================ Table 'nat', rule set NAT echo "Rule 0 (NAT)" # $IPTABLES -t nat -A POSTROUTING -o vlan2 -s 192.168.1.0/24 -j MASQUERADE $IPTABLES -t nat -A POSTROUTING -o vlan2 -s 192.168.2.0/24 -j MASQUERADE $IPTABLES -t nat -A POSTROUTING -o vlan2 -s 192.168.6.0/24 -j MASQUERADE $IPTABLES -t nat -A POSTROUTING -o vlan2 -s 192.168.66.0/24 -j MASQUERADE echo "Rule 2 (NAT)" # $IPTABLES -t nat -A PREROUTING -p tcp -m tcp -s 101.201.1.0/24 --dport 515 -j DNAT --to-destination 192.168.1.3 $IPTABLES -t nat -A POSTROUTING -o br0 -p tcp -m tcp -s 101.201.1.0/24 -d 192.168.1.3 --dport 515 -j SNAT --to-source 192.168.1.1 # ================ Table 'filter', rule set Policy echo "Rule 0 (vlan2)" # $IPTABLES -N In_RULE_0 for i_tun0 in $i_tun0_list do test -n "$i_tun0" && $IPTABLES -A INPUT -i vlan2 -s $i_tun0 -m state --state NEW -j In_RULE_0 done for i_vlan2 in $i_vlan2_list do test -n "$i_vlan2" && $IPTABLES -A INPUT -i vlan2 -s $i_vlan2 -m state --state NEW -j In_RULE_0 done $IPTABLES -A INPUT -i vlan2 -s 192.168.1.1 -m state --state NEW -j In_RULE_0 $IPTABLES -A INPUT -i vlan2 -s 192.168.2.1 -m state --state NEW -j In_RULE_0 $IPTABLES -A INPUT -i vlan2 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_0 $IPTABLES -A INPUT -i vlan2 -s 192.168.2.0/24 -m state --state NEW -j In_RULE_0 $IPTABLES -A INPUT -i vlan2 -s 192.168.6.0/24 -m state --state NEW -j In_RULE_0 $IPTABLES -A INPUT -i vlan2 -s 192.168.66.0/24 -m state --state NEW -j In_RULE_0 for i_tun0 in $i_tun0_list do test -n "$i_tun0" && $IPTABLES -A FORWARD -i vlan2 -s $i_tun0 -m state --state NEW -j In_RULE_0 done for i_vlan2 in $i_vlan2_list do test -n "$i_vlan2" && $IPTABLES -A FORWARD -i vlan2 -s $i_vlan2 -m state --state NEW -j In_RULE_0 done $IPTABLES -A FORWARD -i vlan2 -s 192.168.1.1 -m state --state NEW -j In_RULE_0 $IPTABLES -A FORWARD -i vlan2 -s 192.168.2.1 -m state --state NEW -j In_RULE_0 $IPTABLES -A FORWARD -i vlan2 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_0 $IPTABLES -A FORWARD -i vlan2 -s 192.168.2.0/24 -m state --state NEW -j In_RULE_0 $IPTABLES -A FORWARD -i vlan2 -s 192.168.6.0/24 -m state --state NEW -j In_RULE_0 $IPTABLES -A FORWARD -i vlan2 -s 192.168.66.0/24 -m state --state NEW -j In_RULE_0 $IPTABLES -A In_RULE_0 -j LOG --log-level info --log-prefix "RULE 0 -- DENY " $IPTABLES -A In_RULE_0 -j DROP echo "Rule 1 (lo)" # $IPTABLES -A INPUT -i lo -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o lo -m state --state NEW -j ACCEPT echo "Rule 2 (br1,br0)" # $IPTABLES -A INPUT -i br0 -p udp -m udp -m multiport -d 255.255.255.255 --dports 68,67 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -i br1 -p udp -m udp -m multiport -d 255.255.255.255 --dports 68,67 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o br0 -p udp -m udp -m multiport -d 255.255.255.255 --dports 68,67 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -o br1 -p udp -m udp -m multiport -d 255.255.255.255 --dports 68,67 -m state --state NEW -j ACCEPT echo "Rule 3 (global)" # $IPTABLES -N Cid5131X7068.0 $IPTABLES -A INPUT -s 192.168.2.0/24 -m state --state NEW -j Cid5131X7068.0 $IPTABLES -A Cid5131X7068.0 -p icmp -m icmp --icmp-type 8/0 -j ACCEPT $IPTABLES -A Cid5131X7068.0 -p tcp -m tcp --sport 20 --dport 1024:65535 -j ACCEPT $IPTABLES -A Cid5131X7068.0 -p tcp -m tcp -m multiport --dports 53,21,20 -j ACCEPT $IPTABLES -A Cid5131X7068.0 -p udp -m udp -m multiport --dports 68,67,53 -j ACCEPT echo "Rule 4 (global)" # $IPTABLES -N Cid4223X7068.0 $IPTABLES -A INPUT -s 192.168.1.0/24 -m state --state NEW -j Cid4223X7068.0 $IPTABLES -A INPUT -s 192.168.6.0/24 -m state --state NEW -j Cid4223X7068.0 $IPTABLES -A INPUT -s 192.168.66.0/24 -m state --state NEW -j Cid4223X7068.0 $IPTABLES -A Cid4223X7068.0 -p icmp -m icmp --icmp-type 8/0 -j ACCEPT $IPTABLES -A Cid4223X7068.0 -p tcp -m tcp --sport 20 --dport 1024:65535 -j ACCEPT $IPTABLES -A Cid4223X7068.0 -p tcp -m tcp -m multiport --dports 445,53,21,20,80,443,2869,22,5000,5431 -j ACCEPT $IPTABLES -A Cid4223X7068.0 -p udp -m udp -m multiport --dports 1900,68,67,53 -j ACCEPT echo "Rule 5 (global)" # $IPTABLES -N Cid4255X7068.0 $IPTABLES -A OUTPUT -d 192.168.1.0/24 -j Cid4255X7068.0 $IPTABLES -A Cid4255X7068.0 -p icmp -m icmp --icmp-type 0/0 -j ACCEPT $IPTABLES -A Cid4255X7068.0 -p icmp -m icmp --icmp-type 11/0 -j ACCEPT echo "Rule 6 (global)" # for i_tun0 in $i_tun0_list do test -n "$i_tun0" && $IPTABLES -A INPUT -s $i_tun0 -m state --state NEW -j ACCEPT done for i_vlan2 in $i_vlan2_list do test -n "$i_vlan2" && $IPTABLES -A INPUT -s $i_vlan2 -m state --state NEW -j ACCEPT done $IPTABLES -A INPUT -s 192.168.1.1 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -s 192.168.2.1 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -m state --state NEW -j ACCEPT echo "Rule 7 (global)" # $IPTABLES -A OUTPUT -p icmp -m icmp -d 192.168.1.0/24 --icmp-type 3 -m state --state NEW -j ACCEPT $IPTABLES -A INPUT -p icmp -m icmp -d 192.168.1.0/24 --icmp-type 3 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -p icmp -m icmp -d 192.168.1.0/24 --icmp-type 3 -m state --state NEW -j ACCEPT echo "Rule 8 (vlan2)" # $IPTABLES -A INPUT -i vlan2 -p udp -m udp --dport 1194 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i vlan2 -p udp -m udp --dport 1194 -m state --state NEW -j ACCEPT echo "Rule 10 (vlan2)" # $IPTABLES -A INPUT -i vlan2 -p tcp -m tcp --dport 1723 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -i vlan2 -p tcp -m tcp --dport 1723 -m state --state NEW -j ACCEPT echo "Rule 11 (vlan2)" # $IPTABLES -N In_RULE_11 $IPTABLES -A INPUT -i vlan2 -p tcp -m tcp -s 101.201.1.0/24 --dport 515 -m state --state NEW -j In_RULE_11 $IPTABLES -A FORWARD -i vlan2 -p tcp -m tcp -s 101.201.1.0/24 --dport 515 -m state --state NEW -j In_RULE_11 $IPTABLES -A In_RULE_11 -j LOG --log-level info --log-prefix "RULE 11 -- ACCEPT " $IPTABLES -A In_RULE_11 -j ACCEPT echo "Rule 12 (global)" # $IPTABLES -N RULE_12 for i_tun0 in $i_tun0_list do test -n "$i_tun0" && $IPTABLES -A OUTPUT -d $i_tun0 -m state --state NEW -j RULE_12 done for i_vlan2 in $i_vlan2_list do test -n "$i_vlan2" && $IPTABLES -A OUTPUT -d $i_vlan2 -m state --state NEW -j RULE_12 done $IPTABLES -A OUTPUT -d 192.168.1.1 -m state --state NEW -j RULE_12 $IPTABLES -A OUTPUT -d 192.168.2.1 -m state --state NEW -j RULE_12 $IPTABLES -A INPUT -m state --state NEW -j RULE_12 $IPTABLES -A RULE_12 -j LOG --log-level info --log-prefix "RULE 12 -- DENY " $IPTABLES -A RULE_12 -j DROP echo "Rule 13 (vlan2)" # $IPTABLES -A OUTPUT -o vlan2 -s 192.168.2.0/24 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -o vlan2 -s 192.168.2.0/24 -m state --state NEW -j ACCEPT echo "Rule 14 (global)" # $IPTABLES -A INPUT -s 192.168.66.0/24 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -s 192.168.66.0/24 -m state --state NEW -j ACCEPT echo "Rule 15 (global)" # $IPTABLES -A INPUT -s 192.168.6.0/24 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -s 192.168.6.0/24 -m state --state NEW -j ACCEPT echo "Rule 16 (global)" # $IPTABLES -A INPUT -s 192.168.1.0/24 -m state --state NEW -j ACCEPT $IPTABLES -A OUTPUT -s 192.168.1.0/24 -m state --state NEW -j ACCEPT $IPTABLES -A FORWARD -s 192.168.1.0/24 -m state --state NEW -j ACCEPT echo "Rule 17 (global)" # $IPTABLES -N RULE_17 $IPTABLES -A OUTPUT -m state --state NEW -j RULE_17 $IPTABLES -A INPUT -m state --state NEW -j RULE_17 $IPTABLES -A FORWARD -m state --state NEW -j RULE_17 $IPTABLES -A RULE_17 -j LOG --log-level info --log-prefix "RULE 17 -- DENY " $IPTABLES -A RULE_17 -j DROP } ip_forward() { : echo 1 > /proc/sys/net/ipv4/ip_forward } reset_all() { : reset_iptables_v4 } log "Activating firewall script generated Fri Oct 14 22:00:53 2011 by azcrumpty" check_tools prolog_commands check_run_time_address_table_files load_modules configure_interfaces verify_interfaces reset_all script_body ip_forward epilog_commands