1 # Copyright (C) 2009-2010 OpenWrt.org
2 # Copyright (C) 2008 John Crispin <blogic@openwrt.org>
17 FW_DEFAULT_INPUT_POLICY=REJECT
18 FW_DEFAULT_OUTPUT_POLICY=REJECT
19 FW_DEFAULT_FORWARD_POLICY=REJECT
26 fw_config_get_section "$1" defaults { \
27 string input $FW_DEFAULT_INPUT_POLICY \
28 string output $FW_DEFAULT_OUTPUT_POLICY \
29 string forward $FW_DEFAULT_FORWARD_POLICY \
30 boolean drop_invalid 0 \
32 boolean synflood_protect 0 \
33 string synflood_rate 25 \
34 string synflood_burst 50 \
35 boolean tcp_syncookies 1 \
37 boolean tcp_westwood 0 \
38 boolean tcp_window_scaling 1 \
39 boolean accept_redirects 0 \
40 boolean accept_source_route 0 \
41 boolean custom_chains 1 \
42 boolean disable_ipv6 0 \
44 [ -n "$FW_DEFAULTS_APPLIED" ] && {
45 echo "Error: multiple defaults sections detected"
50 FW_DEFAULT_INPUT_POLICY=$defaults_input
51 FW_DEFAULT_OUTPUT_POLICY=$defaults_output
52 FW_DEFAULT_FORWARD_POLICY=$defaults_forward
54 FW_ADD_CUSTOM_CHAINS=$defaults_custom_chains
56 FW_ACCEPT_REDIRECTS=$defaults_accept_redirects
57 FW_ACCEPT_SRC_ROUTE=$defaults_accept_source_route
59 FW_DISABLE_IPV6=$defaults_disable_ipv6
61 fw_callback pre defaults
63 # Seems like there are only one sysctl for both IP versions.
64 for s in syncookies ecn westwood window_scaling; do
65 eval "sysctl -e -w net.ipv4.tcp_${s}=\$defaults_tcp_${s}" >/dev/null
67 fw_sysctl_interface all
69 [ $defaults_drop_invalid == 1 ] && {
70 fw add i f INPUT DROP { -m state --state INVALID }
71 fw add i f OUTPUT DROP { -m state --state INVALID }
72 fw add i f FORWARD DROP { -m state --state INVALID }
76 fw add i f INPUT ACCEPT { -m state --state RELATED,ESTABLISHED }
77 fw add i f OUTPUT ACCEPT { -m state --state RELATED,ESTABLISHED }
78 fw add i f FORWARD ACCEPT { -m state --state RELATED,ESTABLISHED }
80 fw add i f INPUT ACCEPT { -i lo }
81 fw add i f OUTPUT ACCEPT { -o lo }
83 # Compatibility to old 'syn_flood' parameter
84 [ $defaults_syn_flood == 1 ] && \
85 defaults_synflood_protect=1
87 [ "${defaults_synflood_rate%/*}" == "$defaults_synflood_rate" ] && \
88 defaults_synflood_rate="$defaults_synflood_rate/second"
90 [ $defaults_synflood_protect == 1 ] && {
91 echo "Loading synflood protection"
92 fw_callback pre synflood
94 fw add i f syn_flood RETURN { \
96 -m limit --limit "${defaults_synflood_rate}" --limit-burst "${defaults_synflood_burst}" \
98 fw add i f syn_flood DROP
99 fw add i f INPUT syn_flood { -p tcp --syn }
100 fw_callback post synflood
103 [ $defaults_custom_chains == 1 ] && {
104 echo "Adding custom chains"
105 fw add i f input_rule
106 fw add i f output_rule
107 fw add i f forwarding_rule
108 fw add i n prerouting_rule
109 fw add i n postrouting_rule
111 fw add i f INPUT input_rule
112 fw add i f OUTPUT output_rule
113 fw add i f FORWARD forwarding_rule
114 fw add i n PREROUTING prerouting_rule
115 fw add i n POSTROUTING postrouting_rule
122 fw add i f INPUT input
123 fw add i f OUTPUT output
124 fw add i f FORWARD forward
127 fw add i f reject REJECT { --reject-with tcp-reset -p tcp }
128 fw add i f reject REJECT { --reject-with port-unreach }
132 fw_callback post defaults
136 fw_config_get_zone() {
137 [ "${zone_NAME}" != "$1" ] || return
138 fw_config_get_section "$1" zone { \
141 string input "$FW_DEFAULT_INPUT_POLICY" \
142 string output "$FW_DEFAULT_OUTPUT_POLICY" \
143 string forward "$FW_DEFAULT_FORWARD_POLICY" \
146 string masq_dest "" \
147 boolean conntrack 0 \
149 boolean custom_chains "$FW_ADD_CUSTOM_CHAINS" \
151 string log_limit 10 \
154 [ -n "$zone_name" ] || zone_name=$zone_NAME
155 [ -n "$zone_network" ] || zone_network=$zone_name
159 fw_config_get_zone "$1"
161 list_contains FW_ZONES $zone_name && {
162 fw_die "zone ${zone_name}: duplicated zone"
164 append FW_ZONES $zone_name
168 [ $zone_conntrack = 1 -o $zone_masq = 1 ] && \
169 append FW_CONNTRACK_ZONES "$zone_name"
172 case "$zone_family" in
175 append FW_ZONES4 $zone_name
176 uci_set_state firewall core ${zone_name}_ipv4 1
180 append FW_ZONES6 $zone_name
181 uci_set_state firewall core ${zone_name}_ipv6 1
185 append FW_ZONES4 $zone_name
186 append FW_ZONES6 $zone_name
187 uci_set_state firewall core ${zone_name}_ipv4 1
188 uci_set_state firewall core ${zone_name}_ipv6 1
192 local chain=zone_${zone_name}
194 fw add $mode f ${chain}_ACCEPT
195 fw add $mode f ${chain}_DROP
196 fw add $mode f ${chain}_REJECT
197 fw add $mode f ${chain}_MSSFIX
199 # TODO: Rename to ${chain}_input
200 fw add $mode f ${chain}
201 fw add $mode f ${chain} ${chain}_${zone_input} $
203 fw add $mode f ${chain}_forward
204 fw add $mode f ${chain}_forward ${chain}_${zone_forward} $
206 # TODO: add ${chain}_output
207 fw add $mode f output ${chain}_${zone_output} $
209 # TODO: Rename to ${chain}_MASQUERADE
210 fw add $mode n ${chain}_nat
211 fw add $mode n ${chain}_prerouting
213 fw add $mode r ${chain}_notrack
215 [ $zone_masq == 1 ] && \
216 fw add $mode n POSTROUTING ${chain}_nat $
218 [ $zone_mtu_fix == 1 ] && \
219 fw add $mode f FORWARD ${chain}_MSSFIX ^
221 [ $zone_custom_chains == 1 ] && {
222 [ $FW_ADD_CUSTOM_CHAINS == 1 ] || \
223 fw_die "zone ${zone_name}: custom_chains globally disabled"
225 fw add $mode f input_${zone_name}
226 fw add $mode f ${chain} input_${zone_name} ^
228 fw add $mode f forwarding_${zone_name}
229 fw add $mode f ${chain}_forward forwarding_${zone_name} ^
231 fw add $mode n prerouting_${zone_name}
232 fw add $mode n ${chain}_prerouting prerouting_${zone_name} ^
235 [ "$zone_log" == 1 ] && {
236 [ "${zone_log_limit%/*}" == "$zone_log_limit" ] && \
237 zone_log_limit="$zone_log_limit/minute"
240 for t in REJECT DROP MSSFIX; do
241 fw add $mode f ${chain}_${t} LOG ^ \
242 { -m limit --limit $zone_log_limit --log-prefix "$t($zone_name): " }
246 fw_callback post zone
249 fw_load_notrack_zone() {
250 fw_config_get_zone "$1"
251 list_contains FW_CONNTRACK_ZONES "${zone_name}" && return
253 fw_callback pre notrack
255 fw add i r zone_${zone_name}_notrack NOTRACK $
257 fw_callback post notrack
264 local path; config_get path ${name} path
265 [ -e $path ] && . $path
272 fw_set_filter_policy $policy
280 fw_set_filter_policy() {
284 for chn in INPUT OUTPUT FORWARD; do
285 eval "tgt=\${policy:-\${FW_DEFAULT_${chn}_POLICY}}"
286 [ $tgt == "REJECT" ] && tgt=reject
287 [ $tgt == "ACCEPT" -o $tgt == "DROP" ] || {
288 fw add i f $chn $tgt $
291 fw policy i f $chn $tgt
301 eval "libs=\$FW_CB_${pp}_${hk}"
302 [ -n "$libs" ] || return
304 ${lib}_${pp}_${hk}_cb