/** Initialize the firewall rules */ int iptables_fw_init(void) { const s_config *config; char *ext_interface = NULL; int gw_port = 0; t_trusted_mac *p; int proxy_port; fw_quiet = 0; LOCK_CONFIG(); config = config_get_config(); gw_port = config->gw_port; if (config->external_interface) { ext_interface = safe_strdup(config->external_interface); } else { ext_interface = get_ext_iface(); } if (ext_interface == NULL) { UNLOCK_CONFIG(); debug(LOG_ERR, "FATAL: no external interface"); return 0; } /* * * Everything in the MANGLE table * */ /* Create new chains */ iptables_do_command("-t mangle -N " CHAIN_TRUSTED); iptables_do_command("-t mangle -N " CHAIN_OUTGOING); iptables_do_command("-t mangle -N " CHAIN_INCOMING); /* Assign links and rules to these new chains */ iptables_do_command("-t mangle -I PREROUTING 1 -i %s -j " CHAIN_OUTGOING, config->gw_interface); iptables_do_command("-t mangle -I PREROUTING 1 -i %s -j " CHAIN_TRUSTED, config->gw_interface); //this rule will be inserted before the prior one iptables_do_command("-t mangle -I POSTROUTING 1 -o %s -j " CHAIN_INCOMING, config->gw_interface); for (p = config->trustedmaclist; p != NULL; p = p->next) iptables_do_command("-t mangle -A " CHAIN_TRUSTED " -m mac --mac-source %s -j MARK --set-mark %d", p->mac, FW_MARK_KNOWN); /* * * Everything in the NAT table * */ /* Create new chains */ iptables_do_command("-t nat -N " CHAIN_OUTGOING); iptables_do_command("-t nat -N " CHAIN_TO_ROUTER); iptables_do_command("-t nat -N " CHAIN_TO_INTERNET); iptables_do_command("-t nat -N " CHAIN_GLOBAL); iptables_do_command("-t nat -N " CHAIN_UNKNOWN); iptables_do_command("-t nat -N " CHAIN_AUTHSERVERS); /* Assign links and rules to these new chains */ iptables_do_command("-t nat -A PREROUTING -i %s -j " CHAIN_OUTGOING, config->gw_interface); iptables_do_command("-t nat -A " CHAIN_OUTGOING " -d %s -j " CHAIN_TO_ROUTER, config->gw_address); iptables_do_command("-t nat -A " CHAIN_TO_ROUTER " -j ACCEPT"); iptables_do_command("-t nat -A " CHAIN_OUTGOING " -j " CHAIN_TO_INTERNET); if ((proxy_port = config_get_config()->proxy_port) != 0) { debug(LOG_DEBUG, "Proxy port set, setting proxy rule"); iptables_do_command("-t nat -A " CHAIN_TO_INTERNET " -p tcp --dport 80 -m mark --mark 0x%u -j REDIRECT --to-port %u", FW_MARK_KNOWN, proxy_port); iptables_do_command("-t nat -A " CHAIN_TO_INTERNET " -p tcp --dport 80 -m mark --mark 0x%u -j REDIRECT --to-port %u", FW_MARK_PROBATION, proxy_port); } iptables_do_command("-t nat -A " CHAIN_TO_INTERNET " -m mark --mark 0x%u -j ACCEPT", FW_MARK_KNOWN); iptables_do_command("-t nat -A " CHAIN_TO_INTERNET " -m mark --mark 0x%u -j ACCEPT", FW_MARK_PROBATION); iptables_do_command("-t nat -A " CHAIN_TO_INTERNET " -j " CHAIN_UNKNOWN); iptables_do_command("-t nat -A " CHAIN_UNKNOWN " -j " CHAIN_AUTHSERVERS); iptables_do_command("-t nat -A " CHAIN_UNKNOWN " -j " CHAIN_GLOBAL); iptables_do_command("-t nat -A " CHAIN_UNKNOWN " -p tcp --dport 80 -j REDIRECT --to-ports %d", gw_port); /* * * Everything in the FILTER table * */ /* Create new chains */ iptables_do_command("-t filter -N " CHAIN_TO_INTERNET); iptables_do_command("-t filter -N " CHAIN_AUTHSERVERS); iptables_do_command("-t filter -N " CHAIN_LOCKED); iptables_do_command("-t filter -N " CHAIN_GLOBAL); iptables_do_command("-t filter -N " CHAIN_VALIDATE); iptables_do_command("-t filter -N " CHAIN_KNOWN); iptables_do_command("-t filter -N " CHAIN_UNKNOWN); /* Assign links and rules to these new chains */ /* Insert at the beginning */ iptables_do_command("-t filter -I FORWARD -i %s -j " CHAIN_TO_INTERNET, config->gw_interface); iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -m state --state INVALID -j DROP"); /* XXX: Why this? it means that connections setup after authentication stay open even after the connection is done... iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -m state --state RELATED,ESTABLISHED -j ACCEPT"); */ //Won't this rule NEVER match anyway?!?!? benoitg, 2007-06-23 //iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -i %s -m state --state NEW -j DROP", ext_interface); /* TCPMSS rule for PPPoE */ iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -o %s -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu", ext_interface); iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -j " CHAIN_AUTHSERVERS); iptables_fw_set_authservers(); iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -m mark --mark 0x%u -j " CHAIN_LOCKED, FW_MARK_LOCKED); iptables_load_ruleset("filter", FWRULESET_LOCKED_USERS, CHAIN_LOCKED); iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -j " CHAIN_GLOBAL); iptables_load_ruleset("filter", FWRULESET_GLOBAL, CHAIN_GLOBAL); iptables_load_ruleset("nat", FWRULESET_GLOBAL, CHAIN_GLOBAL); iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -m mark --mark 0x%u -j " CHAIN_VALIDATE, FW_MARK_PROBATION); iptables_load_ruleset("filter", FWRULESET_VALIDATING_USERS, CHAIN_VALIDATE); iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -m mark --mark 0x%u -j " CHAIN_KNOWN, FW_MARK_KNOWN); iptables_load_ruleset("filter", FWRULESET_KNOWN_USERS, CHAIN_KNOWN); iptables_do_command("-t filter -A " CHAIN_TO_INTERNET " -j " CHAIN_UNKNOWN); iptables_load_ruleset("filter", FWRULESET_UNKNOWN_USERS, CHAIN_UNKNOWN); iptables_do_command("-t filter -A " CHAIN_UNKNOWN " -j REJECT --reject-with icmp-port-unreachable"); UNLOCK_CONFIG(); free(ext_interface); return 1; }
int iptables_fw_init(void) { const s_config *config; char * ext_interface = NULL; // 获取WAN口名称 int gw_port = 0; t_trusted_mac *p; fw_quiet = 0; LOCK_CONFIG(); config = config_get_config(); gw_port = config->gw_port; if (config->external_interface) { ext_interface = safe_strdup(config->external_interface); } else { ext_interface = get_ext_iface(); // 获取WAN口名称 } if (ext_interface == NULL) { UNLOCK_CONFIG(); debug(LOG_ERR, "FATAL: no external interface"); return 0; } /* * * Everything in the MANGLE table * */ /* Create new chains */// 创建自定义规则链 // modified by lijg, 2013-05-17, 取消打标记 //iptables_do_command("-t mangle -N " TABLE_WIFIDOG_TRUSTED); IPT_DO_CMMD("-t mangle -N " TABLE_WIFIDOG_OUTGOING); IPT_DO_CMMD("-t mangle -N " TABLE_WIFIDOG_INCOMING); /* Assign links and rules to these new chains */ // modified by lijg, 2013-04-24, avoid confliting with QoS IPT_DO_CMMD("-t mangle -I PREROUTING 1 -i %s -j " TABLE_WIFIDOG_OUTGOING, config->gw_interface); //iptables_do_command("-t mangle -I PREROUTING 1 -i %s -j " TABLE_WIFIDOG_TRUSTED, config->gw_interface);//this rule will be inserted before the prior one IPT_DO_CMMD("-t mangle -I POSTROUTING 1 -o %s -j " TABLE_WIFIDOG_INCOMING, config->gw_interface); // modified by lijg, 2013-05-17, avoid confliting with QoS //for (p = config->trustedmaclist; p != NULL; p = p->next) // iptables_do_command("-t mangle -A " TABLE_WIFIDOG_TRUSTED " -m mac --mac-source %s -j MARK --or-mark %d", p->mac, FW_MARK_KNOWN); /* * * Everything in the NAT table * */ /* Create new chains */ IPT_DO_CMMD("-t nat -N " TABLE_WIFIDOG_OUTGOING); IPT_DO_CMMD("-t nat -N " TABLE_WIFIDOG_WIFI_TO_ROUTER); IPT_DO_CMMD("-t nat -N " TABLE_WIFIDOG_WIFI_TO_INTERNET); IPT_DO_CMMD("-t nat -N " TABLE_WIFIDOG_GLOBAL); IPT_DO_CMMD("-t nat -N " TABLE_WIFIDOG_UNKNOWN); IPT_DO_CMMD("-t nat -N " TABLE_WIFIDOG_AUTHSERVERS); // add by lijg, 2013-08-14, create chains for white list IPT_DO_CMMD("-t nat -N " TABLE_WIFIDOG_WLIST); /* Assign links and rules to these new chains */ IPT_DO_CMMD("-t nat -A PREROUTING -i %s -j " TABLE_WIFIDOG_OUTGOING, config->gw_interface); IPT_DO_CMMD("-t nat -A " TABLE_WIFIDOG_OUTGOING " -d %s -j " TABLE_WIFIDOG_WIFI_TO_ROUTER, config->gw_address); IPT_DO_CMMD("-t nat -A " TABLE_WIFIDOG_WIFI_TO_ROUTER " -j ACCEPT"); IPT_DO_CMMD("-t nat -A " TABLE_WIFIDOG_OUTGOING " -j " TABLE_WIFIDOG_WIFI_TO_INTERNET); // modified by lijg, 2013-04-24, match mark mask = ff00 IPT_DO_CMMD("-t nat -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -m mark --mark 0x%04x/0xff00 -j ACCEPT", FW_MARK_KNOWN); IPT_DO_CMMD("-t nat -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -m mark --mark 0x%04x/0xff00 -j ACCEPT", FW_MARK_PROBATION); // add by lijg, 2013-08-14, add a white list chain IPT_DO_CMMD("-t nat -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -j " TABLE_WIFIDOG_WLIST); IPT_DO_CMMD("-t nat -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -j " TABLE_WIFIDOG_UNKNOWN); IPT_DO_CMMD("-t nat -A " TABLE_WIFIDOG_UNKNOWN " -j " TABLE_WIFIDOG_AUTHSERVERS); // modified by lijg, 2013-05-17, 取消该规则 //iptables_do_command("-t nat -A " TABLE_WIFIDOG_UNKNOWN " -j " TABLE_WIFIDOG_GLOBAL); IPT_DO_CMMD("-t nat -A " TABLE_WIFIDOG_UNKNOWN " -p tcp --dport 80 -j REDIRECT --to-ports %d", gw_port); /* * * Everything in the FILTER table * */ /* Create new chains */ IPT_DO_CMMD("-t filter -N " TABLE_WIFIDOG_WIFI_TO_INTERNET); IPT_DO_CMMD("-t filter -N " TABLE_WIFIDOG_AUTHSERVERS); IPT_DO_CMMD("-t filter -N " TABLE_WIFIDOG_LOCKED); IPT_DO_CMMD("-t filter -N " TABLE_WIFIDOG_GLOBAL); IPT_DO_CMMD("-t filter -N " TABLE_WIFIDOG_VALIDATE); IPT_DO_CMMD("-t filter -N " TABLE_WIFIDOG_KNOWN); IPT_DO_CMMD("-t filter -N " TABLE_WIFIDOG_UNKNOWN); // add by lijg, 2013-08-14, create chains for white list IPT_DO_CMMD("-t filter -N " TABLE_WIFIDOG_WLIST); /* Assign links and rules to these new chains */ /* Insert at the beginning */ IPT_DO_CMMD("-t filter -I FORWARD -i %s -j " TABLE_WIFIDOG_WIFI_TO_INTERNET, config->gw_interface); //IPT_DO_CMMD("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -m state --state INVALID -j DROP"); /* XXX: Why this? it means that connections setup after authentication stay open even after the connection is done... iptables_do_command("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -m state --state RELATED,ESTABLISHED -j ACCEPT");*/ //Won't this rule NEVER match anyway?!?!? benoitg, 2007-06-23 //iptables_do_command("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -i %s -m state --state NEW -j DROP", ext_interface); /* TCPMSS rule for PPPoE */ // modified by lijg, 2013-05-28, cancel this fw rule , repeated in openwrt FW rules //iptables_do_command("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -o %s -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu", ext_interface); IPT_DO_CMMD("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -j " TABLE_WIFIDOG_AUTHSERVERS); iptables_fw_set_authservers(); // modified by lijg, 2013-05-17, 取消匹配标记 //iptables_do_command("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -m mark --mark 0x%04x/0xff00 -j " TABLE_WIFIDOG_LOCKED, FW_MARK_LOCKED); //iptables_load_ruleset("filter", "locked-users", TABLE_WIFIDOG_LOCKED); //iptables_do_command("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -j " TABLE_WIFIDOG_GLOBAL); //iptables_load_ruleset("filter", "global", TABLE_WIFIDOG_GLOBAL); //iptables_load_ruleset("nat", "global", TABLE_WIFIDOG_GLOBAL); // modified by lijg, 2013-05-17, 取消该规则 IPT_DO_CMMD("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -m mark --mark 0x%04x/0xff00 -j " TABLE_WIFIDOG_VALIDATE, FW_MARK_PROBATION); iptables_load_ruleset("filter", "validating-users", TABLE_WIFIDOG_VALIDATE); // add by lijg, 2013-08-14, add a white list chain IPT_DO_CMMD("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -j " TABLE_WIFIDOG_WLIST); // modified by lijg, 2013-05-17, 取消打标记 IPT_DO_CMMD("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -m mark --mark 0x%04x/0xff00 -j " TABLE_WIFIDOG_KNOWN, FW_MARK_KNOWN); iptables_load_ruleset("filter", "known-users", TABLE_WIFIDOG_KNOWN); IPT_DO_CMMD("-t filter -A " TABLE_WIFIDOG_WIFI_TO_INTERNET " -j " TABLE_WIFIDOG_UNKNOWN); iptables_load_ruleset("filter", "unknown-users", TABLE_WIFIDOG_UNKNOWN); IPT_DO_CMMD("-t filter -A " TABLE_WIFIDOG_UNKNOWN " -j REJECT --reject-with icmp-port-unreachable"); // add by lijg, 2013-08-14, Load wwlist config rule load_wwlist_conf("/etc/config/wwlist"); UNLOCK_CONFIG(); // add by lijg, 2013-05-17, free(ext_interface); return 1; }