blob: 040078b533198bb97ece07a0a70d8782a704f3b1 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
|
#!/bin/bash
# **** License ****
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# General Public License for more details.
#
# This code was originally developed by Vyatta, Inc.
# Portions created by Vyatta are Copyright (C) 2007 Vyatta, Inc.
# All Rights Reserved.
#
# Author: Tom Grennan <tgrennan@vyatta.com>
# Description: firewall init
# this is an indirect init sub-script executed by ofr.init
#
# **** End License ****
prefix=@prefix@
exec_prefix=@exec_prefix@
bindir=@bindir@
sbindir=@sbindir@
export PATH=/usr/bin:/usr/sbin:/bin:/sbin:$bindir:$sbindir
. /lib/lsb/init-functions
ACTION=$1
declare -a modules=(
nf_conntrack
nf_conntrack_ftp
nf_conntrack_tftp
nf_nat
nf_nat_ftp
nf_nat_tftp
nf_nat_proto_gre
nf_nat_sip
nf_nat_h323
nf_nat_pptp)
## setup firewall & nat conntrack modules
start () {
for mod in ${modules[@]} ; do
modprobe --syslog $mod
done
# set up notrack chains/rules for IPv4
# by default, nothing is tracked.
iptables -t raw -N VYATTA_PRE_CT_PREROUTING_HOOK
iptables -t raw -A VYATTA_PRE_CT_PREROUTING_HOOK -j RETURN
iptables -t raw -A PREROUTING -j VYATTA_PRE_CT_PREROUTING_HOOK
iptables -t raw -A PREROUTING -j NOTRACK
iptables -t raw -N VYATTA_PRE_CT_OUTPUT_HOOK
iptables -t raw -A VYATTA_PRE_CT_OUTPUT_HOOK -j RETURN
iptables -t raw -A OUTPUT -j VYATTA_PRE_CT_OUTPUT_HOOK
iptables -t raw -A OUTPUT -j NOTRACK
if [ -d /proc/sys/net/ipv6 ] ; then
# set up notrack chains/rules for IPv6
ip6tables -t raw -N VYATTA_PRE_CT_PREROUTING_HOOK
ip6tables -t raw -A VYATTA_PRE_CT_PREROUTING_HOOK -j RETURN
ip6tables -t raw -A PREROUTING -j VYATTA_PRE_CT_PREROUTING_HOOK
ip6tables -t raw -A PREROUTING -j NOTRACK
ip6tables -t raw -N VYATTA_PRE_CT_OUTPUT_HOOK
ip6tables -t raw -A VYATTA_PRE_CT_OUTPUT_HOOK -j RETURN
ip6tables -t raw -A OUTPUT -j VYATTA_PRE_CT_OUTPUT_HOOK
ip6tables -t raw -A OUTPUT -j NOTRACK
# set up post-firewall hook for IPv6
ip6tables -N VYATTA_POST_FW_HOOK
ip6tables -A VYATTA_POST_FW_HOOK -j ACCEPT
ip6tables -A INPUT -j VYATTA_POST_FW_HOOK
ip6tables -A FORWARD -j VYATTA_POST_FW_HOOK
else
logger -t "Vyatta firewall init" -p warning "Kernel IPv6 support disabled. Not initializing IPv6 firewall"
fi
# set up post-firewall hook for IPv4
iptables -N VYATTA_POST_FW_HOOK
iptables -A VYATTA_POST_FW_HOOK -j ACCEPT
iptables -A INPUT -j VYATTA_POST_FW_HOOK
iptables -A FORWARD -j VYATTA_POST_FW_HOOK
# set up pre-DNAT hook
iptables -t nat -N VYATTA_PRE_DNAT_HOOK
iptables -t nat -A VYATTA_PRE_DNAT_HOOK -j RETURN
iptables -t nat -A PREROUTING -j VYATTA_PRE_DNAT_HOOK
# set up pre-SNAT hook
iptables -t nat -N VYATTA_PRE_SNAT_HOOK
iptables -t nat -A VYATTA_PRE_SNAT_HOOK -j RETURN
iptables -t nat -A POSTROUTING -j VYATTA_PRE_SNAT_HOOK
# Loosen the acceptability rules for TCP sequence and ACK numbers in
# conntrack. This allows TCP connections through NAT to survive certain
# cases of packet loss where conntrack can not accurately track the
# connection state
sysctl -q -w net.netfilter.nf_conntrack_tcp_be_liberal=1
# set conntrack table size
sysctl -q -w net.nf_conntrack_max=16384
# set conntrack expect table size
sysctl -q -w net.netfilter.nf_conntrack_expect_max=2048
}
case "$ACTION" in
start) start ;;
stop|restart|force-reload) true ;; # nothing to stop/restart
*) log_failure_msg "action unknown: $ACTION" ;
false ;;
esac
exit $?
# Local Variables:
# mode: shell-script
# sh-indentation: 4
# End:
|