forked from steve8x8/filehub-config
-
Notifications
You must be signed in to change notification settings - Fork 0
/
10firewall.sh
127 lines (118 loc) · 3.87 KB
/
10firewall.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
# Stops external network access to the device, increases security.
# Got to do this each time the WAN interface gets reconfig'd
# /etc/rc.local is NOT a good place to do this (but won't harm)
# /sbin/wan.sh -> /sbin/udhcpc.sh -> /etc/init,d/upnpd.sh
# /etc_ro/ppp/ip-up -> /etc/init.d/upnpd.sh restart
# invokes /etc/init.d/control.sh (if exists)
# in more recent FW: control.sh == ipnpc.sh (called by /usr/sbin/ioos)
# I *think* it's still safe to overwrite it,
# but better have it in two steps: myfirewall.sh and control.sh
# Delete existing modification from file, if it exists
sed -i '/#START_MOD/,/#END_MOD/d' /etc/rc.local
sed -i '/setting firewall/d' /etc/rc.local
sed -i '/#START_MOD/,/#END_MOD/d' /etc/init.d/control.sh
cat <<'EOF' >> /etc/rc.local
#START_MOD
echo /etc/rc.local setting firewall
/etc/init.d/myfirewall.sh start
#END_MOD
EOF
cat <<'EOF' > /etc/init.d/myfirewall.sh
#! /bin/sh
# Call parameter (start, stop, ...) not used yet
#
# This script is invoked each time the WAN interface gets reconfigured
# Try to get name of external interface
. /sbin/global.sh
{
echo "Running $0" `date`
# check whether FW comes with own "stateful" iptables fw (WD03 .016)
# (availability of "-m state")
if grep -q 'iptables .*state' /sbin/netinit.sh
then
echo "Using builtin \"state\" match"
STATE=1
else
echo "No \"state\" match, opening DNS and NTP ports"
STATE=0
fi
echo Current WAN interface: ${wan_if}
# Apply firewall rules to external interface
echo Add ipv4 iptables entries for ${wan_if}
iptables -F INPUT
# if we have state supprt for iptables, we may drop everything
# except responses to valid DNS and NTP requests
if [ $STATE -eq 1 ]
then
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
else
# Drop all tcp traffic incoming on wan_if, except DNS and NTP
iptables -A INPUT -p tcp -i ${wan_if} --sport 53 -j ACCEPT
iptables -A INPUT -p tcp -i ${wan_if} --dport 53 -j ACCEPT
iptables -A INPUT -p tcp -i ${wan_if} --sport 123 -j ACCEPT
iptables -A INPUT -p tcp -i ${wan_if} --dport 123 -j ACCEPT
# Drop all udp traffic incoming on wan_if, except DNS and NTP
iptables -A INPUT -p udp -i ${wan_if} --sport 53 -j ACCEPT
iptables -A INPUT -p udp -i ${wan_if} --dport 53 -j ACCEPT
iptables -A INPUT -p udp -i ${wan_if} --sport 123 -j ACCEPT
iptables -A INPUT -p udp -i ${wan_if} --dport 123 -j ACCEPT
fi
iptables -A INPUT -p tcp -i ${wan_if} -j DROP
iptables -A INPUT -p udp -i ${wan_if} -j DROP
#
# Attempt to disable IPv6 completely, feedback appreciated
wan_if_x=`echo ${wan_if} | cut -d. -f1`
# There seems to be no way to disable_ipv6 via /proc/sys?
# Does this work:
#ip -6 route add unreachable default dev ${wan_if_x}
ip -6 route show \
| while read route dev if dummy
do
if [ "$if" = "$wan_if_x" -o "$if" = "$wan_if" ]
then
echo "Delete ipv6 route on ${if}"
ip -6 route del ${route} dev ${if}
fi
done
# No IPv6 filter is installed, so remove IPv6 address on i/f
ip6addr=`/bin/ip addr show dev ${wan_if} | grep inet6 | awk '{print $2}'`
if [ -n "${ip6addr}" ]
then
echo "Disable ipv6 addr on ${wan_if} ${wan_if_x}"
ip -6 addr del "${ip6addr}" dev ${wan_if_x}
ip -6 addr del "${ip6addr}" dev ${wan_if} 2> /dev/null
fi
#iptables -nL
#ip addr show
#ip -6 addr show
#ip -6 route show
} >> /tmp/firewall 2>&1
EOF
chmod +x /etc/init.d/myfirewall.sh
ls -l /etc/init.d/myfirewall.sh
rm -f /tmp/firewall
# Yes, we overwrite the existing control.sh which is a clone of upnpc.sh
cat <<'EOF' > /etc/init.d/control.sh
#! /bin/sh
#START_MOD
#?#/etc/init.d/upnpc.sh "$@"
/etc/init.d/myfirewall.sh "$@"
exit 0
#END_MOD
EOF
chmod +x /etc/init.d/control.sh
ls -l /etc/init.d/control.sh
# Make executable, and run it now!
echo pre-apply:
iptables -nL
ip addr show
ip -6 addr show
ip -6 route show
echo apply:
/etc/init.d/myfirewall.sh start
cat /tmp/firewall
echo post-apply:
iptables -nL
ip addr show
ip -6 addr show
ip -6 route show