X-Git-Url: http://git.archive.openwrt.org/?p=project%2Ffirewall3.git;a=blobdiff_plain;f=main.c;h=5888ab50285a6e416d3434ea28f9e16901d7106a;hp=fdb901a7ba997b4e366f0608ca469f35a2ae29d4;hb=0a7d36d8cf56f160b531f3db9f045e3f9315dd15;hpb=ea1e5c25c1c4c8c82b51c0440d033944ccb4e2e2 diff --git a/main.c b/main.c index fdb901a..5888ab5 100644 --- a/main.c +++ b/main.c @@ -1,7 +1,7 @@ /* * firewall3 - 3rd OpenWrt UCI firewall implementation * - * Copyright (C) 2013 Jo-Philipp Wich + * Copyright (C) 2013-2014 Jo-Philipp Wich * * Permission to use, copy, modify, and/or distribute this software for any * purpose with or without fee is hereby granted, provided that the above @@ -24,58 +24,92 @@ #include "zones.h" #include "rules.h" #include "redirects.h" +#include "snats.h" #include "forwards.h" #include "ipsets.h" +#include "includes.h" #include "ubus.h" +#include "iptables.h" -static bool print_rules = false; -static bool skip_family[FW3_FAMILY_V6 + 1] = { false }; +static enum fw3_family print_family = FW3_FAMILY_ANY; +static struct fw3_state *run_state = NULL; +static struct fw3_state *cfg_state = NULL; -static struct fw3_state * -build_state(void) + +static bool +build_state(bool runtime) { struct fw3_state *state = NULL; struct uci_package *p = NULL; + FILE *sf; - state = malloc(sizeof(*state)); - + state = calloc(1, sizeof(*state)); if (!state) error("Out of memory"); - memset(state, 0, sizeof(*state)); state->uci = uci_alloc_context(); if (!state->uci) error("Out of memory"); - if (uci_load(state->uci, "firewall", &p)) + if (runtime) { - uci_perror(state->uci, NULL); - error("Failed to load /etc/config/firewall"); - } + sf = fopen(FW3_STATEFILE, "r"); + + if (sf) + { + uci_import(state->uci, sf, "fw3_state", &p, true); + fclose(sf); + } + + if (!p) + { + uci_free_context(state->uci); + free(state); + + return false; + } + + state->statefile = true; - if (!fw3_find_command("ipset")) + run_state = state; + } + else { - warn("Unable to locate ipset utility, disabling ipset support"); - state->disable_ipsets = true; + if (!fw3_ubus_connect()) + warn("Failed to connect to ubus"); + + if (uci_load(state->uci, "firewall", &p)) + { + uci_perror(state->uci, NULL); + error("Failed to load /etc/config/firewall"); + } + + if (!fw3_find_command("ipset")) + { + warn("Unable to locate ipset utility, disabling ipset support"); + state->disable_ipsets = true; + } + + cfg_state = state; } + + struct blob_buf b = {NULL, NULL, 0, NULL}; + fw3_ubus_rules(&b); + fw3_load_defaults(state, p); fw3_load_ipsets(state, p); fw3_load_zones(state, p); - fw3_load_rules(state, p); - fw3_load_redirects(state, p); + fw3_load_rules(state, p, b.head); + fw3_load_redirects(state, p, b.head); + fw3_load_snats(state, p, b.head); fw3_load_forwards(state, p); + fw3_load_includes(state, p); - if (state->defaults.disable_ipv6 && !skip_family[FW3_FAMILY_V6]) - { - warn("IPv6 rules globally disabled in configuration"); - skip_family[FW3_FAMILY_V6] = true; - } - - return state; + return true; } static void @@ -92,9 +126,18 @@ free_state(struct fw3_state *state) list_for_each_safe(cur, tmp, &state->redirects) fw3_free_redirect((struct fw3_redirect *)cur); + list_for_each_safe(cur, tmp, &state->snats) + fw3_free_snat((struct fw3_snat *)cur); + list_for_each_safe(cur, tmp, &state->forwards) fw3_free_forward((struct fw3_forward *)cur); + list_for_each_safe(cur, tmp, &state->ipsets) + fw3_free_ipset((struct fw3_ipset *)cur); + + list_for_each_safe(cur, tmp, &state->includes) + fw3_free_include((struct fw3_include *)cur); + uci_free_context(state->uci); free(state); @@ -104,148 +147,295 @@ free_state(struct fw3_state *state) static bool -restore_pipe(enum fw3_family family, bool silent) +family_running(enum fw3_family family) { - const char *cmd[] = { - "(bug)", - "iptables-restore", - "ip6tables-restore", - }; - - if (print_rules) - return fw3_stdout_pipe(); + return (run_state && has(run_state->defaults.flags, family, family)); +} - if (!fw3_command_pipe(silent, cmd[family], "--lenient", "--noflush")) - { - warn("Unable to execute %s", cmd[family]); - return false; - } +static void +family_set(struct fw3_state *state, enum fw3_family family, bool set) +{ + if (!state) + return; - return true; + if (set) + set(state->defaults.flags, family, family); + else + del(state->defaults.flags, family, family); } static int -stop(struct fw3_state *state, bool complete, bool ipsets) +stop(bool complete) { + int rv = 1; enum fw3_family family; enum fw3_table table; + struct fw3_ipt_handle *handle; - struct list_head *statefile = fw3_read_state(); + if (!complete && !run_state) + { + warn("The firewall appears to be stopped. " + "Use the 'flush' command to forcefully purge all rules."); + + return rv; + } - const char *tables[] = { - "filter", - "nat", - "mangle", - "raw", - }; + if (!print_family && run_state) + fw3_hotplug_zones(run_state, false); for (family = FW3_FAMILY_V4; family <= FW3_FAMILY_V6; family++) { - if (skip_family[family] || !restore_pipe(family, true)) + if (!complete && !family_running(family)) continue; - info("Removing IPv%d rules ...", family == FW3_FAMILY_V4 ? 4 : 6); - for (table = FW3_TABLE_FILTER; table <= FW3_TABLE_RAW; table++) { - if (!fw3_has_table(family == FW3_FAMILY_V6, tables[table])) + if (!fw3_has_table(family == FW3_FAMILY_V6, fw3_flag_names[table])) continue; - info(" * %sing %s table", - complete ? "Flush" : "Clear", tables[table]); + if (!(handle = fw3_ipt_open(family, table))) + continue; - fw3_pr("*%s\n", tables[table]); + info(" * %sing %s %s table", complete ? "Flush" : "Clear", + fw3_flag_names[family], fw3_flag_names[table]); if (complete) { - fw3_flush_all(table); + fw3_flush_all(handle); } - else + else if (run_state) { - /* pass 1 */ - fw3_flush_rules(table, family, false, statefile); - fw3_flush_zones(table, family, false, statefile); - - /* pass 2 */ - fw3_flush_rules(table, family, true, statefile); - fw3_flush_zones(table, family, true, statefile); + fw3_flush_rules(handle, run_state, false); + fw3_flush_zones(handle, run_state, false); } - fw3_pr("COMMIT\n"); + fw3_ipt_commit(handle); + fw3_ipt_close(handle); } - fw3_command_close(); + family_set(run_state, family, false); + family_set(cfg_state, family, false); + + rv = 0; } - if (ipsets && fw3_command_pipe(false, "ipset", "-exist", "-")) + if (run_state) + fw3_destroy_ipsets(run_state); + + if (complete) + fw3_flush_conntrack(NULL); + + if (!rv && run_state) + fw3_write_statefile(run_state); + + return rv; +} + +static int +start(void) +{ + int rv = 1; + enum fw3_family family; + enum fw3_table table; + struct fw3_ipt_handle *handle; + + if (!print_family) + fw3_create_ipsets(cfg_state); + + for (family = FW3_FAMILY_V4; family <= FW3_FAMILY_V6; family++) { - fw3_destroy_ipsets(statefile); - fw3_command_close(); + if (family == FW3_FAMILY_V6 && cfg_state->defaults.disable_ipv6) + continue; + + if (print_family && family != print_family) + continue; + + if (!print_family && family_running(family)) + { + warn("The %s firewall appears to be started already. " + "If it is indeed empty, remove the %s file and retry.", + fw3_flag_names[family], FW3_STATEFILE); + + continue; + } + + for (table = FW3_TABLE_FILTER; table <= FW3_TABLE_RAW; table++) + { + if (!fw3_has_table(family == FW3_FAMILY_V6, fw3_flag_names[table])) + continue; + + if (!(handle = fw3_ipt_open(family, table))) + continue; + + info(" * Populating %s %s table", + fw3_flag_names[family], fw3_flag_names[table]); + + fw3_print_default_chains(handle, cfg_state, false); + fw3_print_zone_chains(handle, cfg_state, false); + fw3_print_default_head_rules(handle, cfg_state, false); + fw3_print_rules(handle, cfg_state); + fw3_print_redirects(handle, cfg_state); + fw3_print_snats(handle, cfg_state); + fw3_print_forwards(handle, cfg_state); + fw3_print_zone_rules(handle, cfg_state, false); + fw3_print_default_tail_rules(handle, cfg_state, false); + + if (!print_family) + fw3_ipt_commit(handle); + + fw3_ipt_close(handle); + } + + if (!print_family) + fw3_print_includes(cfg_state, family, false); + + family_set(run_state, family, true); + family_set(cfg_state, family, true); + + rv = 0; } - fw3_free_state(statefile); + if (!rv) + { + fw3_flush_conntrack(run_state); + fw3_set_defaults(cfg_state); - return 0; + if (!print_family) + { + fw3_run_includes(cfg_state, false); + fw3_hotplug_zones(cfg_state, true); + fw3_write_statefile(cfg_state); + } + } + + return rv; } + static int -start(struct fw3_state *state) +reload(void) { + int rv = 1; enum fw3_family family; enum fw3_table table; + struct fw3_ipt_handle *handle; + + if (!run_state) + return start(); + + fw3_hotplug_zones(run_state, false); + + for (family = FW3_FAMILY_V4; family <= FW3_FAMILY_V6; family++) + { + if (!family_running(family)) + goto start; + + for (table = FW3_TABLE_FILTER; table <= FW3_TABLE_RAW; table++) + { + if (!fw3_has_table(family == FW3_FAMILY_V6, fw3_flag_names[table])) + continue; + + if (!(handle = fw3_ipt_open(family, table))) + continue; + + info(" * Clearing %s %s table", + fw3_flag_names[family], fw3_flag_names[table]); + + fw3_flush_rules(handle, run_state, true); + fw3_flush_zones(handle, run_state, true); + fw3_ipt_commit(handle); + fw3_ipt_close(handle); + } + + family_set(run_state, family, false); + family_set(cfg_state, family, false); - const char *tables[] = { - "filter", - "nat", - "mangle", - "raw", - }; +start: + if (family == FW3_FAMILY_V6 && cfg_state->defaults.disable_ipv6) + continue; + + for (table = FW3_TABLE_FILTER; table <= FW3_TABLE_RAW; table++) + { + if (!fw3_has_table(family == FW3_FAMILY_V6, fw3_flag_names[table])) + continue; + + if (!(handle = fw3_ipt_open(family, table))) + continue; + + info(" * Populating %s %s table", + fw3_flag_names[family], fw3_flag_names[table]); + + fw3_print_default_chains(handle, cfg_state, true); + fw3_print_zone_chains(handle, cfg_state, true); + fw3_print_default_head_rules(handle, cfg_state, true); + fw3_print_rules(handle, cfg_state); + fw3_print_redirects(handle, cfg_state); + fw3_print_snats(handle, cfg_state); + fw3_print_forwards(handle, cfg_state); + fw3_print_zone_rules(handle, cfg_state, true); + fw3_print_default_tail_rules(handle, cfg_state, true); + + fw3_ipt_commit(handle); + fw3_ipt_close(handle); + } - if (!print_rules && fw3_command_pipe(false, "ipset", "-exist", "-")) + fw3_print_includes(cfg_state, family, true); + + family_set(run_state, family, true); + family_set(cfg_state, family, true); + + rv = 0; + } + + if (!rv) { - fw3_create_ipsets(state); - fw3_command_close(); + fw3_flush_conntrack(run_state); + + fw3_set_defaults(cfg_state); + fw3_run_includes(cfg_state, true); + fw3_hotplug_zones(cfg_state, true); + fw3_write_statefile(cfg_state); } + return rv; +} + +static int +gc(void) +{ + enum fw3_family family; + enum fw3_table table; + struct fw3_ipt_handle *handle; + for (family = FW3_FAMILY_V4; family <= FW3_FAMILY_V6; family++) { - if (skip_family[family] || !restore_pipe(family, false)) + if (family == FW3_FAMILY_V6 && cfg_state->defaults.disable_ipv6) continue; - info("Constructing IPv%d rules ...", family == FW3_FAMILY_V4 ? 4 : 6); - for (table = FW3_TABLE_FILTER; table <= FW3_TABLE_RAW; table++) { - if (!fw3_has_table(family == FW3_FAMILY_V6, tables[table])) + if (!fw3_has_table(family == FW3_FAMILY_V6, fw3_flag_names[table])) continue; - info(" * Populating %s table", tables[table]); - - fw3_pr("*%s\n", tables[table]); - fw3_print_default_chains(table, family, state); - fw3_print_zone_chains(table, family, state); - fw3_print_default_head_rules(table, family, state); - fw3_print_rules(table, family, state); - fw3_print_redirects(table, family, state); - fw3_print_forwards(table, family, state); - fw3_print_zone_rules(table, family, state); - fw3_print_default_tail_rules(table, family, state); - fw3_pr("COMMIT\n"); - } + if (!(handle = fw3_ipt_open(family, table))) + continue; - fw3_command_close(); + fw3_ipt_gc(handle); + fw3_ipt_commit(handle); + fw3_ipt_close(handle); + } } return 0; } static int -lookup_network(struct fw3_state *state, const char *net) +lookup_network(const char *net) { struct fw3_zone *z; struct fw3_device *d; - list_for_each_entry(z, &state->zones, list) + list_for_each_entry(z, &cfg_state->zones, list) { list_for_each_entry(d, &z->networks, list) { @@ -261,12 +451,12 @@ lookup_network(struct fw3_state *state, const char *net) } static int -lookup_device(struct fw3_state *state, const char *dev) +lookup_device(const char *dev) { struct fw3_zone *z; struct fw3_device *d; - list_for_each_entry(z, &state->zones, list) + list_for_each_entry(z, &cfg_state->zones, list) { list_for_each_entry(d, &z->devices, list) { @@ -282,11 +472,42 @@ lookup_device(struct fw3_state *state, const char *dev) } static int +lookup_zone(const char *zone, const char *device) +{ + struct fw3_zone *z; + struct fw3_device *d; + + list_for_each_entry(z, &cfg_state->zones, list) + { + if (strcmp(z->name, zone)) + continue; + + list_for_each_entry(d, &z->devices, list) + { + if (device && strcmp(device, d->name)) + continue; + + printf("%s\n", d->name); + + if (device) + return 0; + } + + if (!device) + return 0; + } + + return 1; +} + +static int usage(void) { - fprintf(stderr, "fw3 [-4] [-6] [-q] {start|stop|flush|restart|print}\n"); + fprintf(stderr, "fw3 [-4] [-6] [-q] print\n"); + fprintf(stderr, "fw3 [-q] {start|stop|flush|reload|restart}\n"); fprintf(stderr, "fw3 [-q] network {net}\n"); fprintf(stderr, "fw3 [-q] device {dev}\n"); + fprintf(stderr, "fw3 [-q] zone {zone} [dev]\n"); return 1; } @@ -295,24 +516,27 @@ usage(void) int main(int argc, char **argv) { int ch, rv = 1; - struct fw3_state *state = NULL; + enum fw3_family family = FW3_FAMILY_ANY; + struct fw3_defaults *defs = NULL; - while ((ch = getopt(argc, argv, "46qh")) != -1) + while ((ch = getopt(argc, argv, "46dqh")) != -1) { switch (ch) { case '4': - skip_family[FW3_FAMILY_V4] = false; - skip_family[FW3_FAMILY_V6] = true; + family = FW3_FAMILY_V4; break; case '6': - skip_family[FW3_FAMILY_V4] = true; - skip_family[FW3_FAMILY_V6] = false; + family = FW3_FAMILY_V6; + break; + + case 'd': + fw3_pr_debug = true; break; case 'q': - freopen("/dev/null", "w", stderr); + if (freopen("/dev/null", "w", stderr)) {} break; case 'h': @@ -321,13 +545,8 @@ int main(int argc, char **argv) } } - if (!fw3_ubus_connect()) - error("Failed to connect to ubus"); - - state = build_state(); - - if (!fw3_lock()) - goto out; + build_state(false); + defs = &cfg_state->defaults; if (optind >= argc) { @@ -337,69 +556,98 @@ int main(int argc, char **argv) if (!strcmp(argv[optind], "print")) { - freopen("/dev/null", "w", stderr); + if (family == FW3_FAMILY_ANY) + { + family = FW3_FAMILY_V4; + } + else if (family == FW3_FAMILY_V6) + { + if (defs->disable_ipv6) + warn("IPv6 rules globally disabled in configuration"); +#ifdef DISABLE_IPV6 + else + warn("IPv6 support is not compiled in"); +#endif + } - state->disable_ipsets = true; - print_rules = true; + if (freopen("/dev/null", "w", stderr)) {}; - if (!skip_family[FW3_FAMILY_V4] && !skip_family[FW3_FAMILY_V6]) - skip_family[FW3_FAMILY_V6] = true; + cfg_state->disable_ipsets = true; + print_family = family; + fw3_pr_debug = true; - rv = start(state); + if (fw3_lock()) + { + build_state(true); + rv = start(); + fw3_unlock(); + } } else if (!strcmp(argv[optind], "start")) { - if (fw3_has_state()) + if (fw3_lock()) { - warn("The firewall appears to be started already. " - "If it is indeed empty, remove the %s file and retry.", - FW3_STATEFILE); - - goto out; + build_state(true); + rv = start(); + fw3_unlock(); } - - rv = start(state); - fw3_write_state(state); } else if (!strcmp(argv[optind], "stop")) { - if (!fw3_has_state()) + if (fw3_lock()) { - warn("The firewall appears to be stopped. " - "Use the 'flush' command to forcefully purge all rules."); - - goto out; + build_state(true); + rv = stop(false); + fw3_unlock(); } - - rv = stop(state, false, true); - - fw3_remove_state(); } else if (!strcmp(argv[optind], "flush")) { - rv = stop(state, true, true); - - if (fw3_has_state()) - fw3_remove_state(); + if (fw3_lock()) + { + build_state(true); + rv = stop(true); + fw3_unlock(); + } } else if (!strcmp(argv[optind], "restart")) { - if (fw3_has_state()) + if (fw3_lock()) { - stop(state, false, false); - fw3_remove_state(); + build_state(true); + stop(true); + rv = start(); + fw3_unlock(); + } + } + else if (!strcmp(argv[optind], "reload")) + { + if (fw3_lock()) + { + build_state(true); + rv = reload(); + fw3_unlock(); + } + } + else if (!strcmp(argv[optind], "gc")) + { + if (fw3_lock()) + { + rv = gc(); + fw3_unlock(); } - - rv = start(state); - fw3_write_state(state); } else if (!strcmp(argv[optind], "network") && (optind + 1) < argc) { - rv = lookup_network(state, argv[optind + 1]); + rv = lookup_network(argv[optind + 1]); } else if (!strcmp(argv[optind], "device") && (optind + 1) < argc) { - rv = lookup_device(state, argv[optind + 1]); + rv = lookup_device(argv[optind + 1]); + } + else if (!strcmp(argv[optind], "zone") && (optind + 1) < argc) + { + rv = lookup_zone(argv[optind + 1], argv[optind + 2]); } else { @@ -407,10 +655,11 @@ int main(int argc, char **argv) } out: - if (state) - free_state(state); + if (cfg_state) + free_state(cfg_state); - fw3_unlock(); + if (run_state) + free_state(run_state); return rv; }