summaryrefslogtreecommitdiff
path: root/package/network/config/firewall/files/reflection.hotplug
blob: 935ab425241ab460b98724a6df4ff20f7ed9ad20 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
#!/bin/sh

. /lib/functions.sh
. /lib/functions/network.sh

if [ "$ACTION" = "remove" ]; then

	delete_rules_by_comment() {
		local table="$1"
		local chain="$2"
		local comment="$3"

		iptables -t "$table" --line-numbers -nL "$chain" 2>/dev/null | \
			sed -e '
				1d;
				1! {
					\#^[0-9]\+ .* /\* '"$comment"' \*/.*$# {
						s/ .*$//;
						G; h;
					}
				};
				$!d;
			' | xargs -n1 iptables -t "$table" -D "$chain" 2>/dev/null
	}

	delete_rules_by_comment nat    nat_reflection_in  "$INTERFACE"
	delete_rules_by_comment nat    nat_reflection_out "$INTERFACE"
	delete_rules_by_comment filter nat_reflection_fwd "$INTERFACE"

elif [ "$ACTION" = "add" ]; then

	prepare_chains() {
		iptables -t nat -N nat_reflection_in 2>/dev/null && {
			iptables -t nat -A prerouting_rule -j nat_reflection_in
		}

		iptables -t nat -N nat_reflection_out 2>/dev/null && {
			iptables -t nat -A postrouting_rule -j nat_reflection_out
		}

		iptables -t filter -N nat_reflection_fwd 2>/dev/null && {
			iptables -t filter -A forwarding_rule -j nat_reflection_fwd
		}
	}

	find_networks() {
		find_networks_cb() {
			local cfg="$1"
			local zone="$2"
			local need_masq="${3:-0}"

			local name
			config_get name "$cfg" name

			local masq
			config_get_bool masq "$cfg" masq 0

			[ "$name" = "$zone" ] && [ "$masq" -ge "$need_masq" ] && {
				local network
				config_get network "$cfg" network

				echo ${network:-$zone}
				return 1
			}
		}

		config_foreach find_networks_cb zone "$1"
	}

	setup_fwd() {
		local cfg="$1"

		local reflection
		config_get_bool reflection "$cfg" reflection 1
		[ "$reflection" == 1 ] || return

		local src
		config_get src "$cfg" src
		[ "$src" == "$ZONE" ] || return

		local dest
		config_get dest "$cfg" dest
		[ "$dest" != "*" ] || return

		local target
		config_get target "$cfg" target DNAT
		[ "$target" = DNAT ] || return

		prepare_chains

		local net
		for net in $(find_networks "$dest" 0); do
			local intnet
			network_get_subnet intnet "$net" || continue

			local proto
			config_get proto "$cfg" proto

			local epmin epmax extport
			config_get extport "$cfg" src_dport "1-65535"
			[ -n "$extport" ] || return

			epmin="${extport%[-:]*}"; epmax="${extport#*[-:]}"
			[ "${epmin#!}" != "$epmax" ] || epmax=""

			local ipmin ipmax intport
			config_get intport "$cfg" dest_port "$extport"

			ipmin="${intport%[-:]*}"; ipmax="${intport#*[-:]}"
			[ "${ipmin#!}" != "$ipmax" ] || ipmax=""

			local exthost
			config_get exthost "$cfg" src_dip "$extip"

			local inthost
			config_get inthost "$cfg" dest_ip
			[ -n "$inthost" ] || return

			[ "$proto" = all    ] && proto="tcp udp"
			[ "$proto" = tcpudp ] && proto="tcp udp"

			[ "${inthost#!}" = "$inthost" ] || return 0
			[ "${exthost#!}" = "$exthost" ] || return 0

			[ "${epmin#!}" != "$epmin" ] && \
				extport="! --dport ${epmin#!}${epmax:+:$epmax}" || \
				extport="--dport $epmin${epmax:+:$epmax}"

			[ "${ipmin#!}" != "$ipmin" ] && \
				intport="! --dport ${ipmin#!}${ipmax:+:$ipmax}" || \
				intport="--dport $ipmin${ipmax:+:$ipmax}"

			local p
			for p in ${proto:-tcp udp}; do
				case "$p" in
					tcp|udp|6|17)
						iptables -t nat -A nat_reflection_in \
							-s $intnet -d $exthost \
							-p $p $extport \
							-m comment --comment "$INTERFACE" \
							-j DNAT --to $inthost:${ipmin#!}${ipmax:+-$ipmax}

						iptables -t nat -A nat_reflection_out \
							-s $intnet -d $inthost \
							-p $p $intport \
							-m comment --comment "$INTERFACE" \
							-j SNAT --to-source ${intnet%%/*}

						iptables -t filter -A nat_reflection_fwd \
							-s $intnet -d $inthost \
							-p $p $intport \
							-m comment --comment "$INTERFACE" \
							-j ACCEPT
					;;
				esac
			done
		done
	}

	config_load firewall

	local is_masq_zone="$(find_networks "$ZONE" 1)"
	[ -n "$is_masq_zone" ] || exit 0

	local extip
	network_get_ipaddr extip "$INTERFACE" || exit 0

	config_foreach setup_fwd redirect
fi