2005-05-18 18:21:54 +02:00
|
|
|
# this skript is GPL software (http://www.fsf.org/licensing/licenses/gpl.html)
|
|
|
|
# suggestions and questions to: devel@sumpfralle.de
|
|
|
|
# homepage: https://systemausfall.org/toolforge/web-splash
|
|
|
|
#
|
|
|
|
# this file will be sourced by web-splash.sh
|
|
|
|
#
|
|
|
|
|
2005-05-17 02:26:11 +02:00
|
|
|
remove_old()
|
|
|
|
{
|
|
|
|
# remove the rules from PREROUTING
|
|
|
|
$IPT -t nat -F $CHAIN_FORWARD_CHECK 2>/dev/null && $IPT -t nat -D PREROUTING -i $IF_SRC -j $CHAIN_FORWARD_CHECK
|
|
|
|
$IPT -t nat -F $CHAIN_REDIRECT 2>/dev/null && $IPT -t nat -D PREROUTING -i $IF_SRC -j $CHAIN_REDIRECT
|
2005-05-17 12:11:28 +02:00
|
|
|
$IPT -t nat -F $CHAIN_SERVICES 2>/dev/null && $IPT -t nat -D PREROUTING -i $IF_SRC -j $CHAIN_SERVICES
|
2005-05-18 19:27:51 +02:00
|
|
|
|
|
|
|
# remove the rule from FORWARD
|
|
|
|
$IPT -F $CHAIN_RETURN 2>/dev/null && $IPT -D FORWARD -o $IF_SRC -j $CHAIN_RETURN
|
2005-05-17 02:26:11 +02:00
|
|
|
|
2005-05-18 19:27:51 +02:00
|
|
|
# empty and remove chains if they exist (from POSTROUTING)
|
2005-05-17 12:11:28 +02:00
|
|
|
for a in $CHAIN_FORWARD_ACTION $CHAIN_FORWARD_CHECK $CHAIN_REDIRECT $CHAIN_SERVICES
|
2005-05-17 02:26:11 +02:00
|
|
|
do $IPT -t nat -F $a 2>/dev/null && $IPT -t nat -X $a
|
|
|
|
true
|
|
|
|
done
|
2005-05-18 19:27:51 +02:00
|
|
|
|
|
|
|
# empty and remove chains if they exist (from FORWARD)
|
|
|
|
for a in $CHAIN_RETURN
|
|
|
|
do $IPT -F $a 2>/dev/null && $IPT -X $a
|
|
|
|
true
|
|
|
|
done
|
2005-05-17 02:26:11 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
init_chains()
|
|
|
|
{
|
2005-05-18 19:27:51 +02:00
|
|
|
# create chains (in nat table)
|
2005-05-17 12:11:28 +02:00
|
|
|
for a in $CHAIN_FORWARD_ACTION $CHAIN_FORWARD_CHECK $CHAIN_REDIRECT $CHAIN_SERVICES
|
2005-05-17 02:26:11 +02:00
|
|
|
do $IPT -t nat -N $a
|
|
|
|
done
|
|
|
|
|
2005-05-18 19:27:51 +02:00
|
|
|
# create chains (in filter table)
|
|
|
|
for a in $CHAIN_RETURN
|
|
|
|
do $IPT -N $a
|
|
|
|
done
|
|
|
|
|
|
|
|
# all packets from the specified interface go to the web-splash-chains first
|
|
|
|
# "-I" means insert before every other chain -> inserting reverse ordered
|
|
|
|
$IPT -t nat -I PREROUTING -i $IF_SRC -j $CHAIN_REDIRECT
|
|
|
|
$IPT -t nat -I PREROUTING -i $IF_SRC -j $CHAIN_FORWARD_CHECK
|
|
|
|
$IPT -t nat -I PREROUTING -i $IF_SRC -j $CHAIN_SERVICES
|
|
|
|
|
|
|
|
# add a "counting" chain for return packets
|
|
|
|
# it does nothing - except providing a counter for returned bytes
|
|
|
|
$IPT -I FORWARD -o $IF_SRC -j $CHAIN_RETURN
|
2005-05-17 02:26:11 +02:00
|
|
|
|
|
|
|
# rules for CHAIN_REDIRECT
|
2005-05-17 12:11:28 +02:00
|
|
|
$IPT -t nat -A $CHAIN_REDIRECT -p tcp --dport 80 -j DNAT --to-destination $INTERN_IP
|
2005-05-17 02:26:11 +02:00
|
|
|
$IPT -t nat -A $CHAIN_REDIRECT -p tcp --dport 80 -j ACCEPT
|
|
|
|
$IPT -t nat -A $CHAIN_REDIRECT -j $REJECT_ACTION
|
|
|
|
|
|
|
|
# all registered senders are simply accepted
|
|
|
|
$IPT -t nat -A $CHAIN_FORWARD_ACTION -j ACCEPT
|
2005-05-17 12:11:28 +02:00
|
|
|
|
|
|
|
# allowed packets (services like dns, dhcp and ssh (to the router only))
|
|
|
|
$IPT -t nat -A $CHAIN_SERVICES -p udp --dport 53 -j ACCEPT
|
|
|
|
$IPT -t nat -A $CHAIN_SERVICES -p udp --dport 67 -j ACCEPT
|
|
|
|
$IPT -t nat -A $CHAIN_SERVICES -p tcp --dport 67 -j ACCEPT
|
|
|
|
$IPT -t nat -A $CHAIN_SERVICES -p tcp -d $INTERN_IP --dport 22 -j ACCEPT
|
|
|
|
|
|
|
|
# user defined "privileged" source IPs
|
|
|
|
for a in $ALLOW_IP_LIST
|
|
|
|
do $IPT -t nat -A $CHAIN_SERVICES -s $a -j ACCEPT
|
|
|
|
done
|
|
|
|
|
|
|
|
# user defined forbidden source IPs
|
|
|
|
for a in $DENY_IP_LIST
|
|
|
|
do $IPT -t nat -I $CHAIN_SERVICES -s $a -j $REJECT_ACTION
|
|
|
|
done
|
2005-05-17 02:26:11 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-05-18 19:53:05 +02:00
|
|
|
get_IP_list()
|
|
|
|
# prints out all active forwarding IPs
|
2005-05-17 02:26:11 +02:00
|
|
|
{
|
2005-05-18 19:53:05 +02:00
|
|
|
$IPT -t nat -L "$CHAIN_FORWARD_CHECK" -vnx | sed "1,2d; s/ */ /g" | cut -d " " -f 9
|
2005-05-17 02:26:11 +02:00
|
|
|
# get all active forward chains
|
|
|
|
# remove the first two lines
|
|
|
|
# remove multiple spaces
|
2005-05-18 19:53:05 +02:00
|
|
|
# take only the IP
|
2005-05-17 02:26:11 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
register_IP()
|
|
|
|
# add a new allowed IP
|
|
|
|
{
|
2005-05-18 20:09:43 +02:00
|
|
|
if get_IP_list | grep -q "^$1$"
|
|
|
|
then echo "die IP $1 war bereits freigeschaltet!"
|
|
|
|
else eval `echo "$RULE_ADD" | sed "s/_IP_/$1/g"`
|
|
|
|
fi
|
2005-05-17 02:26:11 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
unregister_IP()
|
|
|
|
# remove the specified IP
|
|
|
|
{
|
2005-05-18 20:09:43 +02:00
|
|
|
if get_IP_list | grep -q "^$1$"
|
|
|
|
then eval `echo "$RULE_DEL" | sed "s/_IP_/$1/g"`
|
|
|
|
else echo "die IP $1 war nicht freigeschaltet!"
|
|
|
|
fi
|
2005-05-17 02:26:11 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-05-18 19:53:05 +02:00
|
|
|
update_IP_list()
|
|
|
|
# remove inactive IPs from the forwarding list
|
2005-05-17 02:26:11 +02:00
|
|
|
{
|
|
|
|
local IP
|
2005-05-18 19:53:05 +02:00
|
|
|
get_IPs | while read IP
|
|
|
|
do [ `get_IP_traffic $IP` -gt 0 ] && unregister_IP "$IP"
|
2005-05-17 02:26:11 +02:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2005-05-18 19:53:05 +02:00
|
|
|
get_IP_traffic()
|
|
|
|
{
|
|
|
|
local IP="$1"
|
|
|
|
local out_traffic="`$IPT -t nat -L \"$CHAIN_FORWARD_CHECK\" -vnx | sed '1,2d; s/ */ /g' | cut -d ' ' -f 3,9 | grep \" $IP$\" | cut -d ' ' -f 1`"
|
|
|
|
local in_traffic="`$IPT -L \"$CHAIN_RETURN\" -vnx | sed '1,2d; s/ */ /g' | cut -d ' ' -f 3,9 | grep \" $IP$\" | cut -d ' ' -f 1`"
|
|
|
|
if [ -n "$in_traffic" -a -n "$out_traffic" ]
|
|
|
|
then echo $((in_traffic+out_traffic))
|
|
|
|
else echo 0
|
|
|
|
fi
|
|
|
|
}
|