|
@@ -128,18 +128,18 @@ do
|
|
|
shift
|
|
shift
|
|
|
done
|
|
done
|
|
|
|
|
|
|
|
-if ! [ -x $IP_TABLES ]; then
|
|
|
|
|
- echo "$IP_TABLES is not executable or not present" >&2
|
|
|
|
|
|
|
+if ! [ -x $IPTABLES ]; then
|
|
|
|
|
+ echo "$IPTABLES is not executable or not present" >&2
|
|
|
exit 1
|
|
exit 1
|
|
|
fi
|
|
fi
|
|
|
|
|
|
|
|
-if ! [ -x $IP_TABLES_RESTORE ]; then
|
|
|
|
|
- echo "$IP_TABLES_RESTORE is not executable or not present" >&2
|
|
|
|
|
|
|
+if ! [ -x $IPTABLES_RESTORE ]; then
|
|
|
|
|
+ echo "$IPTABLES_RESTORE is not executable or not present" >&2
|
|
|
exit 3
|
|
exit 3
|
|
|
fi
|
|
fi
|
|
|
|
|
|
|
|
-if ! [ -x $IP_TABLES_RESTORE_6 ]; then
|
|
|
|
|
- echo "$IP_TABLES_RESTORE_6 is not executable or not present" >&2
|
|
|
|
|
|
|
+if ! [ -x $IPTABLES_RESTORE_6 ]; then
|
|
|
|
|
+ echo "$IPTABLES_RESTORE_6 is not executable or not present" >&2
|
|
|
exit 6
|
|
exit 6
|
|
|
fi
|
|
fi
|
|
|
|
|
|
|
@@ -335,12 +335,12 @@ fw_blacklist(){
|
|
|
then
|
|
then
|
|
|
for ban_list in ${BANNED_LISTS}
|
|
for ban_list in ${BANNED_LISTS}
|
|
|
do
|
|
do
|
|
|
- if ipset list ${ban_list} > /dev/null
|
|
|
|
|
|
|
+ if $IPSET list ${ban_list} > /dev/null
|
|
|
then
|
|
then
|
|
|
- if ! iptables -C INPUT -m set --match-set ${ban_list} src -j DROP > /dev/null 2>&1
|
|
|
|
|
|
|
+ if ! $IPTABLES -C INPUT -m set --match-set ${ban_list} src -j DROP > /dev/null 2>&1
|
|
|
then
|
|
then
|
|
|
echo "Enabling $ban_list"
|
|
echo "Enabling $ban_list"
|
|
|
- iptables -I INPUT -m set --match-set ${ban_list} src -j DROP
|
|
|
|
|
|
|
+ $IPTABLES -I INPUT -m set --match-set ${ban_list} src -j DROP
|
|
|
fi
|
|
fi
|
|
|
else
|
|
else
|
|
|
warn_user_missing_ban_list ${ban_list}
|
|
warn_user_missing_ban_list ${ban_list}
|
|
@@ -400,12 +400,18 @@ fw_network_protection(){
|
|
|
# Other network protections
|
|
# Other network protections
|
|
|
# (some will only work with some kernel versions)
|
|
# (some will only work with some kernel versions)
|
|
|
#**************************************************************************#
|
|
#**************************************************************************#
|
|
|
- if [ "${ALLOW_IP_FORWARDING:-0}" = 0 ]
|
|
|
|
|
- then
|
|
|
|
|
- echo 0 > /proc/sys/net/ipv4/ip_forward
|
|
|
|
|
- else
|
|
|
|
|
- echo 1 > /proc/sys/net/ipv4/ip_forward
|
|
|
|
|
- fi
|
|
|
|
|
|
|
+ $do_log "ALLOW_IP_FORWARDING='${ALLOW_IP_FORWARDING:-}'"
|
|
|
|
|
+ case "${ALLOW_IP_FORWARDING:-}" in
|
|
|
|
|
+ 1)
|
|
|
|
|
+ echo 1 > /proc/sys/net/ipv4/ip_forward
|
|
|
|
|
+ ;;
|
|
|
|
|
+ 0)
|
|
|
|
|
+ echo 0 > /proc/sys/net/ipv4/ip_forward
|
|
|
|
|
+ ;;
|
|
|
|
|
+ "")
|
|
|
|
|
+ :
|
|
|
|
|
+ ;;
|
|
|
|
|
+ esac
|
|
|
if [ "${NETWORK_PROTECTION:-1}" = 1 ]
|
|
if [ "${NETWORK_PROTECTION:-1}" = 1 ]
|
|
|
then
|
|
then
|
|
|
echo 1 > /proc/sys/net/ipv4/tcp_syncookies
|
|
echo 1 > /proc/sys/net/ipv4/tcp_syncookies
|
|
@@ -430,8 +436,8 @@ do_this(){
|
|
|
# Backups user rules
|
|
# Backups user rules
|
|
|
##########################
|
|
##########################
|
|
|
fw_backup_user(){
|
|
fw_backup_user(){
|
|
|
- $IP_TABLES_SAVE > ${USER_RULES_IPTABLES}
|
|
|
|
|
- $IP_TABLES_SAVE_6 > ${USER_RULES_IPTABLES_6}
|
|
|
|
|
|
|
+ $IPTABLES_SAVE > ${USER_RULES_IPTABLES}
|
|
|
|
|
+ $IPTABLES_SAVE_6 > ${USER_RULES_IPTABLES_6}
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
##########################
|
|
##########################
|
|
@@ -439,10 +445,10 @@ fw_backup_user(){
|
|
|
##########################
|
|
##########################
|
|
|
fw_restore_user(){
|
|
fw_restore_user(){
|
|
|
if [ -f $USER_RULES_IPTABLES ] ; then
|
|
if [ -f $USER_RULES_IPTABLES ] ; then
|
|
|
- $IP_TABLES_RESTORE < ${USER_RULES_IPTABLES}
|
|
|
|
|
|
|
+ $IPTABLES_RESTORE < ${USER_RULES_IPTABLES}
|
|
|
fi
|
|
fi
|
|
|
if [ -f $USER_RULES_IPTABLES_6 ] ; then
|
|
if [ -f $USER_RULES_IPTABLES_6 ] ; then
|
|
|
- $IP_TABLES_RESTORE_6 < ${USER_RULES_IPTABLES_6}
|
|
|
|
|
|
|
+ $IPTABLES_RESTORE_6 < ${USER_RULES_IPTABLES_6}
|
|
|
fi
|
|
fi
|
|
|
}
|
|
}
|
|
|
|
|
|
|
@@ -470,12 +476,12 @@ fw_stop () {
|
|
|
##########################
|
|
##########################
|
|
|
|
|
|
|
|
fw_dropall(){
|
|
fw_dropall(){
|
|
|
- do_this $IP_TABLES -F
|
|
|
|
|
- do_this $IP_TABLES -t nat -F
|
|
|
|
|
- do_this $IP_TABLES -t mangle -F
|
|
|
|
|
|
|
+ do_this $IPTABLES -F
|
|
|
|
|
+ do_this $IPTABLES -t nat -F
|
|
|
|
|
+ do_this $IPTABLES -t mangle -F
|
|
|
fw_exec_basic_input_rules do_exec
|
|
fw_exec_basic_input_rules do_exec
|
|
|
- do_this $IP_TABLES -P FORWARD ACCEPT
|
|
|
|
|
- do_this $IP_TABLES -P OUTPUT ACCEPT
|
|
|
|
|
|
|
+ do_this $IPTABLES -P FORWARD ACCEPT
|
|
|
|
|
+ do_this $IPTABLES -P OUTPUT ACCEPT
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
##########################
|
|
##########################
|
|
@@ -483,11 +489,11 @@ fw_dropall(){
|
|
|
##########################
|
|
##########################
|
|
|
|
|
|
|
|
fw_clear () {
|
|
fw_clear () {
|
|
|
- do_this $IP_TABLES -F
|
|
|
|
|
- do_this $IP_TABLES -X
|
|
|
|
|
- do_this $IP_TABLES -P INPUT ACCEPT
|
|
|
|
|
- do_this $IP_TABLES -P FORWARD ACCEPT
|
|
|
|
|
- do_this $IP_TABLES -P OUTPUT ACCEPT
|
|
|
|
|
|
|
+ do_this $IPTABLES -F
|
|
|
|
|
+ do_this $IPTABLES -X
|
|
|
|
|
+ do_this $IPTABLES -P INPUT ACCEPT
|
|
|
|
|
+ do_this $IPTABLES -P FORWARD ACCEPT
|
|
|
|
|
+ do_this $IPTABLES -P OUTPUT ACCEPT
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
##########################
|
|
##########################
|
|
@@ -496,10 +502,10 @@ fw_clear () {
|
|
|
|
|
|
|
|
fw_save () {
|
|
fw_save () {
|
|
|
if [ ${verbose} -ge 1 ] ; then
|
|
if [ ${verbose} -ge 1 ] ; then
|
|
|
- echo "$IP_TABLES_SAVE > /etc/lfirewall/iptables.backup"
|
|
|
|
|
|
|
+ echo "$IPTABLES_SAVE > /etc/lfirewall/iptables.backup"
|
|
|
fi
|
|
fi
|
|
|
|
|
|
|
|
- $IP_TABLES_SAVE > /etc/lfirewall/iptables.backup
|
|
|
|
|
|
|
+ $IPTABLES_SAVE > /etc/lfirewall/iptables.backup
|
|
|
}
|
|
}
|
|
|
|
|
|
|
|
fw_restore () {
|
|
fw_restore () {
|
|
@@ -507,10 +513,10 @@ fw_restore () {
|
|
|
BACKUP_FILE=/etc/lfirewall/iptables.backup
|
|
BACKUP_FILE=/etc/lfirewall/iptables.backup
|
|
|
if [ -e $BACKUP_FILE ]; then
|
|
if [ -e $BACKUP_FILE ]; then
|
|
|
if [ ${verbose} -ge 1 ] ; then
|
|
if [ ${verbose} -ge 1 ] ; then
|
|
|
- echo "IP_TABLES_RESTORE > $BACKUP_FILE"
|
|
|
|
|
|
|
+ echo "IPTABLES_RESTORE > $BACKUP_FILE"
|
|
|
fi
|
|
fi
|
|
|
|
|
|
|
|
- $IP_TABLES_RESTORE < $BACKUP_FILE
|
|
|
|
|
|
|
+ $IPTABLES_RESTORE < $BACKUP_FILE
|
|
|
fi
|
|
fi
|
|
|
}
|
|
}
|
|
|
|
|
|