1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
|
#!/usr/bin/perl #
# Module:ConntrackUtil.pm
#
# **** License ****
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# General Public License for more details.
#
# This code was originally developed by Vyatta, Inc.
# Portions created by Vyatta are Copyright (C) 2010 Vyatta, Inc.
# All Rights Reserved.
#
# Author: Gaurav Sinha
# Date: Dec 2011
# Description: Utility scripts for Vyatta conntrack
#
#
# **** End License ****
#
package Vyatta::Conntrack::ConntrackUtil;
use Vyatta::IpTables::Mgr;
use base qw(Exporter);
sub process_protocols {
my $proto = undef;
my %proto_hash = ();
my $PROTO_FILE = '/etc/protocols';
# do nothing if can't open
return if (!open($proto, $PROTO_FILE));
while (<$proto>) {
next if (/^\s*#/);
next if (!/^\S+\s+(\d+)\s+(\S+)\s/);
$proto_hash{$1} = $2;
}
close $proto;
return \%proto_hash;
}
our @EXPORT = qw(check_for_conntrack_hooks, process_protocols, check_and_add_helpers, run_cmd);
#function to find if connection tracking is enabled.
#looks in the iptables to see if any of the features introduced
#its chain in the hooks.
#
#returns one if any hook is present
sub check_for_conntrack_hooks {
my @output = `sudo iptables -L -t raw`;
foreach(@output) {
if (($_ =~ m/WEBPROXY_CONNTRACK/)) {
return 1;
}
if (($_ =~ m/NAT_CONNTRACK/)) {
return 1;
}
if (($_ =~ m/FW_CONNTRACK/)) {
return 1;
}
}
}
1;
sub
check_ct_helper_rules {
my $index;
my $cthelper_chain = "VYATTA_CT_HELPER";
foreach my $label ('PREROUTING', 'OUTPUT') {
$index = ipt_find_chain_rule($iptables_cmd, 'raw', $label, $cthelper_chain);
if (!defined($index)) {
# add VYATTA_CT_HELPER to PREROUTING / OUTPUT
print "hook not present\n";
}
}
}
sub check_and_add_helpers {
if (check_for_conntrack_hooks()) {
check_ct_helper_rules();
}
}
sub log_msg {
my $message = shift;
print "DEBUG: $message\n" if $debug_flag;
syslog(LOG_DEBUG, "%s", $message) if $syslog_flag;
}
# Run command and capture output
# run_cmd("$iptables_cmd -t $table -F $name", 1);
# if command fails, then send output to syslog
sub run_cmd {
my ($cmd_to_run, $redirect) = @_;
log_msg("Running: $cmd_to_run");
if ($redirect) {
open (my $out, '-|', $cmd_to_run . ' 2>&1')
or die "Can't run command \"$cmd_to_run\": $!";
my @cmd_out = <$out>;
# if command suceeds to do nothing.
return if (close ($out));
foreach my $line (@cmd_out) {
chomp $line;
syslog(LOG_INFO, "%s", $line);
}
} else {
system($cmd_to_run);
}
}
# end of file
|