Default policy support, which I believe makes this release Alpha 1 quality
This commit is contained in:
		
							parent
							
								
									6dfe77b118
								
							
						
					
					
						commit
						d71e8794c6
					
				@ -175,6 +175,10 @@ if [ "${EnableIPv4}" == "yes" ]; then
 | 
				
			|||||||
	
 | 
						
 | 
				
			||||||
	[[ ${AllowAllv4Loopback} == "yes" ]] && allow_all_loopback ipv4
 | 
						[[ ${AllowAllv4Loopback} == "yes" ]] && allow_all_loopback ipv4
 | 
				
			||||||
	[[ ${EnableTrustedv4Hosts} == "yes" ]] && allow_trusted_hosts ipv4
 | 
						[[ ${EnableTrustedv4Hosts} == "yes" ]] && allow_trusted_hosts ipv4
 | 
				
			||||||
 | 
						Defaultv4InPolicy=${Defaultv4InPolicy=ACCEPT}
 | 
				
			||||||
 | 
						Defaultv4OutPolicy=${Defaultv4OutPolicy=ACCEPT}
 | 
				
			||||||
 | 
						Defaultv4FwdPolicy=${Defaultv4FwdPolicy=ACCEPT}
 | 
				
			||||||
 | 
						default_policy_set ipv4 ${Defaultv4InPolicy} ${Defaultv4OutPolicy} ${Defaultv4FwdPolicy} 
 | 
				
			||||||
	[[ ${Enablev4MSSClamp} == "yes" ]] && enable_mss_clamp ipv4
 | 
						[[ ${Enablev4MSSClamp} == "yes" ]] && enable_mss_clamp ipv4
 | 
				
			||||||
	([[ ${Enablev4ConnTrackInterfaces} != "none" ]] && [[ ${Enablev4ConnectionTracking} == "yes" ]]) \
 | 
						([[ ${Enablev4ConnTrackInterfaces} != "none" ]] && [[ ${Enablev4ConnectionTracking} == "yes" ]]) \
 | 
				
			||||||
			&& enable_conntrack_int ipv4 "${Enablev4ConnTrackInterfaces}"
 | 
								&& enable_conntrack_int ipv4 "${Enablev4ConnTrackInterfaces}"
 | 
				
			||||||
@ -200,6 +204,10 @@ if [ "${EnableIPv6}" == "yes" ]; then
 | 
				
			|||||||
	
 | 
						
 | 
				
			||||||
	[[ ${AllowAllv6Loopback} == "yes" ]] && allow_all_loopback ipv6
 | 
						[[ ${AllowAllv6Loopback} == "yes" ]] && allow_all_loopback ipv6
 | 
				
			||||||
	[[ ${EnableTrustedv6Hosts} == "yes" ]] && allow_trusted_hosts ipv6
 | 
						[[ ${EnableTrustedv6Hosts} == "yes" ]] && allow_trusted_hosts ipv6
 | 
				
			||||||
 | 
						Defaultv6InPolicy=${Defaultv6InPolicy=ACCEPT}
 | 
				
			||||||
 | 
						Defaultv6OutPolicy=${Defaultv6OutPolicy=ACCEPT}
 | 
				
			||||||
 | 
						Defaultv6FwdPolicy=${Defaultv6FwdPolicy=ACCEPT}
 | 
				
			||||||
 | 
						default_policy_set ipv6 ${Defaultv6InPolicy} ${Defaultv6OutPolicy} ${Defaultv6FwdPolicy}
 | 
				
			||||||
	[[ ${Enablev6MSSClamp} == "yes" ]] && enable_mss_clamp ipv6
 | 
						[[ ${Enablev6MSSClamp} == "yes" ]] && enable_mss_clamp ipv6
 | 
				
			||||||
	([[ ${Enablev6ConnTrackInterfaces} != "none" ]] && [[ ${Enablev6ConnectionTracking} == "yes" ]]) \
 | 
						([[ ${Enablev6ConnTrackInterfaces} != "none" ]] && [[ ${Enablev6ConnectionTracking} == "yes" ]]) \
 | 
				
			||||||
			&& enable_conntrack_int ipv6 "${Enablev6ConnTrackInterfaces}"
 | 
								&& enable_conntrack_int ipv6 "${Enablev6ConnTrackInterfaces}"
 | 
				
			||||||
 | 
				
			|||||||
@ -96,3 +96,13 @@ Enablev4NAT="yes"
 | 
				
			|||||||
# Config file: ipv4/portfw.conf
 | 
					# Config file: ipv4/portfw.conf
 | 
				
			||||||
# Values: no | yes (default)
 | 
					# Values: no | yes (default)
 | 
				
			||||||
Enablev4PortForwarding="yes"
 | 
					Enablev4PortForwarding="yes"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Default policy for filtering rules
 | 
				
			||||||
 | 
					# netfilter/iptables has a default policy that can be set, such as
 | 
				
			||||||
 | 
					# DROP all unless it is explicitly allowed via rules.
 | 
				
			||||||
 | 
					# Values: ACCEPT (default) | DROP
 | 
				
			||||||
 | 
					# Please note if you do not specify policies, they will default to
 | 
				
			||||||
 | 
					# ACCEPT, which may not be what you want.
 | 
				
			||||||
 | 
					Defaultv4InPolicy="ACCEPT"
 | 
				
			||||||
 | 
					Defaultv4OutPolicy="ACCEPT"
 | 
				
			||||||
 | 
					Defaultv4FwdPolicy="ACCEPT"
 | 
				
			||||||
@ -96,3 +96,13 @@ Enablev6NAT="yes"
 | 
				
			|||||||
# Config file: ipv6/portfw.conf
 | 
					# Config file: ipv6/portfw.conf
 | 
				
			||||||
# Values: no | yes (default)
 | 
					# Values: no | yes (default)
 | 
				
			||||||
Enablev6PortForwarding="yes"
 | 
					Enablev6PortForwarding="yes"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Default policy for filtering rules
 | 
				
			||||||
 | 
					# netfilter/iptables has a default policy that can be set, such as
 | 
				
			||||||
 | 
					# DROP all unless it is explicitly allowed via rules.
 | 
				
			||||||
 | 
					# Values: ACCEPT (default) | DROP
 | 
				
			||||||
 | 
					# Please note if you do not specify policies, they will default to
 | 
				
			||||||
 | 
					# ACCEPT, which may not be what you want.
 | 
				
			||||||
 | 
					Defaultv6InPolicy="ACCEPT"
 | 
				
			||||||
 | 
					Defaultv6OutPolicy="ACCEPT"
 | 
				
			||||||
 | 
					Defaultv6FwdPolicy="ACCEPT"
 | 
				
			||||||
@ -30,6 +30,9 @@ function iptables_rules_flush {
 | 
				
			|||||||
		ipv4|*) VER_IPTABLES=${IPTABLES} ; TABLE_NAMES=/proc/net/ip_tables_names ;;
 | 
							ipv4|*) VER_IPTABLES=${IPTABLES} ; TABLE_NAMES=/proc/net/ip_tables_names ;;
 | 
				
			||||||
	esac
 | 
						esac
 | 
				
			||||||
	${display} GREEN "Flushing ${IP_VERSION} rules..."
 | 
						${display} GREEN "Flushing ${IP_VERSION} rules..."
 | 
				
			||||||
 | 
						${VER_IPTABLES} -P INPUT ACCEPT &>/dev/null
 | 
				
			||||||
 | 
						${VER_IPTABLES} -P OUTPUT ACCEPT &>/dev/null
 | 
				
			||||||
 | 
						${VER_IPTABLES} -P FORWARD ACCEPT &>/dev/null
 | 
				
			||||||
	${VER_IPTABLES} -F &>/dev/null
 | 
						${VER_IPTABLES} -F &>/dev/null
 | 
				
			||||||
	${VER_IPTABLES} -X &>/dev/null
 | 
						${VER_IPTABLES} -X &>/dev/null
 | 
				
			||||||
	${VER_IPTABLES} -F INPUT &>/dev/null
 | 
						${VER_IPTABLES} -F INPUT &>/dev/null
 | 
				
			||||||
@ -39,9 +42,6 @@ function iptables_rules_flush {
 | 
				
			|||||||
	${VER_IPTABLES} -t nat -X &>/dev/null
 | 
						${VER_IPTABLES} -t nat -X &>/dev/null
 | 
				
			||||||
	${VER_IPTABLES} -t mangle -F &>/dev/null
 | 
						${VER_IPTABLES} -t mangle -F &>/dev/null
 | 
				
			||||||
	${VER_IPTABLES} -t mangle -X &>/dev/null
 | 
						${VER_IPTABLES} -t mangle -X &>/dev/null
 | 
				
			||||||
	${VER_IPTABLES} -P INPUT ACCEPT &>/dev/null
 | 
					 | 
				
			||||||
	${VER_IPTABLES} -P OUTPUT ACCEPT &>/dev/null
 | 
					 | 
				
			||||||
	${VER_IPTABLES} -P FORWARD ACCEPT &>/dev/null
 | 
					 | 
				
			||||||
	#for i in `cat $TABLE_NAMES`; do
 | 
						#for i in `cat $TABLE_NAMES`; do
 | 
				
			||||||
	#	${VER_IPTABLES} -F -t $i &>/dev/null
 | 
						#	${VER_IPTABLES} -F -t $i &>/dev/null
 | 
				
			||||||
	#done
 | 
						#done
 | 
				
			||||||
@ -51,17 +51,19 @@ function iptables_rules_flush {
 | 
				
			|||||||
# iptables_policy_set (ipv6|ipv4) (ACCEPT|DROP)
 | 
					# iptables_policy_set (ipv6|ipv4) (ACCEPT|DROP)
 | 
				
			||||||
# Sets all policy rules to either ACCEPT or DROP for ipv4 or ipv6
 | 
					# Sets all policy rules to either ACCEPT or DROP for ipv4 or ipv6
 | 
				
			||||||
# If no policy given, assume ACCEPT
 | 
					# If no policy given, assume ACCEPT
 | 
				
			||||||
function iptables_policy_reset {
 | 
					function default_policy_set {
 | 
				
			||||||
	IP_VERSION=$1
 | 
						IP_VERSION=$1
 | 
				
			||||||
	SET_POLICY=${2=ACCEPT}
 | 
						INPOLICY=${2=ACCEPT}
 | 
				
			||||||
 | 
						OUTPOLICY=${3=ACCEPT}
 | 
				
			||||||
 | 
						FWDPOLICY=${4=ACCEPT}
 | 
				
			||||||
	case $IP_VERSION in
 | 
						case $IP_VERSION in
 | 
				
			||||||
		ipv6) VER_IPTABLES=${IP6TABLES} ;;
 | 
							ipv6) VER_IPTABLES=${IP6TABLES} ;;
 | 
				
			||||||
		ipv4|*) VER_IPTABLES=${IPTABLES} ;;
 | 
							ipv4|*) VER_IPTABLES=${IPTABLES} ;;
 | 
				
			||||||
	esac
 | 
						esac
 | 
				
			||||||
	${display_c} RED "Setting ${IP_VERSION} policies to ${SET_POLICY}..."
 | 
						${display_c} RED "Setting ${IP_VERSION} policies to ${SET_POLICY}..."
 | 
				
			||||||
	${VER_IPTABLES} --policy INPUT ${SET_POLICY}
 | 
						${VER_IPTABLES} --policy INPUT ${INPOLICY}
 | 
				
			||||||
	${VER_IPTABLES} --policy OUTPUT ${SET_POLICY}
 | 
						${VER_IPTABLES} --policy OUTPUT ${OUTPOLICY}
 | 
				
			||||||
	${VER_IPTABLES} --policy FORWARD ${SET_POLICY}
 | 
						${VER_IPTABLES} --policy FORWARD ${FWDPOLICY}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# setup_iptables_chains (ipv4|ipv6)
 | 
					# setup_iptables_chains (ipv4|ipv6)
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user