Commit Graph

60 Commits (0a84f6a74e3e4edabf28ac15199f9b7e8ba6de19)

Author SHA1 Message Date
Jo-Philipp Wich c7ac1b5b0c firewall: do not produce 0.0.0.0/0 if a symbolic masq_src or masq_dest is given but does not resolve to an ip
SVN-Revision: 28628
2011-10-27 18:14:55 +00:00
Jo-Philipp Wich 204bf6e5fe firewall: prevent ip6tables -t nat rules (#10265)
SVN-Revision: 28535
2011-10-23 12:25:57 +00:00
Jo-Philipp Wich 69df551be3 firewall: fix another instance of unquoted "*"
SVN-Revision: 28529
2011-10-22 21:38:10 +00:00
Jo-Philipp Wich 9a61d9e513 firewall: fix possible expansion of "*" when rules with "option src *" are processed
SVN-Revision: 28527
2011-10-22 20:11:25 +00:00
Jo-Philipp Wich e0e73928da firewall: do not check for module availability, let iptables fail if a feature is not present (#7610)
SVN-Revision: 28525
2011-10-22 19:50:35 +00:00
Jo-Philipp Wich 995face56d firewall: make ESTABLISHED,RELATED rules match before INVALID, use conntrack instead of state match (#10038)
SVN-Revision: 28148
2011-09-01 20:37:22 +00:00
Jo-Philipp Wich f1e7045d30 firewall: further tune ICMPv6 default rules according to RFC4890 (#9893)
SVN-Revision: 27979
2011-08-14 00:33:29 +00:00
Jo-Philipp Wich 7a206885df firewall: prevent redundant rules if multiple ports and multiple icmp types are given in a rule block for both icmp and other protocols
SVN-Revision: 27792
2011-07-26 22:21:39 +00:00
Jo-Philipp Wich 90ac92e8be firewall: fix serious bug in state var handling (#9746)
SVN-Revision: 27711
2011-07-20 15:29:10 +00:00
Jo-Philipp Wich 78fa88ca81 firewall: rework state variable handling, use uci_toggle_state() where applicable and properly handle duplicates in add and del state helpers (#9152, #9710)
SVN-Revision: 27618
2011-07-15 15:03:57 +00:00
Jo-Philipp Wich a92ed1808c firewall: make sure that -m mac is used with --mac-source, follow up to r27508
SVN-Revision: 27519
2011-07-07 10:28:31 +00:00
Jo-Philipp Wich dd4934a943 firewall: - solve scoping issues when multiple values are used, thanks Daniel Dickinson - ignore src_port/dest_port for proto icmp rules, ignore icmp_type for non-icmp rules - properly handle icmp when proto is given in numerical form (1, 58) - support negated icmp types
SVN-Revision: 27500
2011-07-06 22:10:46 +00:00
Jo-Philipp Wich df14a48dc9 firewall: properly handle negated ports in nat reflection
SVN-Revision: 27334
2011-07-01 11:48:14 +00:00
Jo-Philipp Wich 68a1c8e1e3 firewall: - allow multiple ports, protocols, macs, icmp types per rule - implement "limit" and "limit_burst" options for rules - implement "extra" option to rules and redirects for passing arbritary flags to iptables - implement negations for "src_port", "dest_port", "src_dport", "src_mac", "proto" and "icmp_type" options - allow wildcard (*) "src" and "dest" options in rules to allow specifying "any" source or destination - validate symbolic icmp-type names against the selected iptables binary - properly handle forwarded ICMPv6 traffic in the default configuration
SVN-Revision: 27317
2011-06-30 01:31:23 +00:00
Jo-Philipp Wich c014101d73 firewall: allow symbolic names of interfaces and aliases in masq_src and masq_dest
SVN-Revision: 27196
2011-06-16 21:54:59 +00:00
Jo-Philipp Wich 2a386cee99 firewall: prevent excessive uci state data aggregation (#9152)
SVN-Revision: 26740
2011-04-20 11:49:09 +00:00
Jo-Philipp Wich af82471525 firewall: prevent duplicate values in interface state vars
SVN-Revision: 26382
2011-03-30 20:29:17 +00:00
Travis Kemen a2cd7b2883 Keep firewall.user during sysupgrades
SVN-Revision: 26241
2011-03-20 00:57:47 +00:00
Jo-Philipp Wich 13333a6742 firewall: move include sourcing into a subshell, this makes the firewall init immune against exit in the include scripts
SVN-Revision: 25835
2011-03-02 19:20:29 +00:00
Jo-Philipp Wich 1ca64678bb firewall: fix rule generation for v4 or v6 only zones (#8955)
SVN-Revision: 25813
2011-03-01 18:04:14 +00:00
Jo-Philipp Wich 04b20727d8 firewall: fix wrong rule order if multiple protocols are used
SVN-Revision: 25179
2011-01-27 22:19:53 +00:00
Jo-Philipp Wich a43f5b5038 firewall: insert SNAT and DNAT rules according to the order of the configuration file (#8052)
SVN-Revision: 23318
2010-10-08 12:11:55 +00:00
Jo-Philipp Wich b0ca17ae6e firewall: mark /etc/firewall.user as conffile
SVN-Revision: 23231
2010-10-05 07:31:49 +00:00
Jo-Philipp Wich 7bf84dc4f8 firewall: also establish forward rules when setting up nat reflection, back out early if reflection is disabled
SVN-Revision: 23201
2010-10-03 18:11:59 +00:00
Jo-Philipp Wich 1cb2abca8e add maintainer information
SVN-Revision: 23159
2010-09-30 10:48:37 +00:00
Jo-Philipp Wich 6a335579b8 fireall: - support negations for src_ip, dest_ip, src_dip options in rules and redirects - add NOTRACK target to rule sections, allows to define fine grained notrack rules
SVN-Revision: 23141
2010-09-28 10:42:56 +00:00
Jo-Philipp Wich b07620df31 firewall: protect iptables invocations with locks in interface ops, it might run concurrently due to hotplug invocations on network restart
SVN-Revision: 23090
2010-09-19 15:01:47 +00:00
Jo-Philipp Wich f90328f26e firewall: make invalid redirects and duplicate zones non-fatal, print a notice and discard them
SVN-Revision: 23080
2010-09-16 11:47:35 +00:00
Jo-Philipp Wich 7557011cb1 firewall: run ifdown hotplug events synchronized, fixes a racecondition on "ifup iface" when ifdown and ifup events are delivered with a small dealy
SVN-Revision: 23064
2010-09-15 01:53:36 +00:00
Jo-Philipp Wich 1fe50da4bb firewall: deliver remove hotplug events for all active zones/networks when restarting the firewall
SVN-Revision: 23062
2010-09-14 23:11:12 +00:00
Jo-Philipp Wich f3dd8278bb firewall: - simplify masquerade rule setup - remove various subshell invocations - speedup fw() by not relying on xargs and pipes - rework SNAT support - attach to dest zone, use src_dip/src_dport as snat source
SVN-Revision: 23024
2010-09-11 20:04:34 +00:00
Jo-Philipp Wich eb79296cc1 firewall: introduce SNAT support for redirect sections
SVN-Revision: 22937
2010-09-05 19:03:17 +00:00
Jo-Philipp Wich baf4782be6 firewall: clean up description (#7875)
SVN-Revision: 22905
2010-09-04 17:39:00 +00:00
Jo-Philipp Wich ca5bf9e291 firewall: - handle NAT reflection in firewall hotplug, solves synchronizing issues on boot - introduce masq_src and masq_dest options to limit zone masq to specific ip ranges, supports multiple subnets and negation
SVN-Revision: 22888
2010-09-04 15:49:13 +00:00
Jo-Philipp Wich ee4dd61b10 firewall: - fix processing of rules with an ip family option - append interface rules at the end of internal zone chains, simplifies injecting user or addon rules - support simple file logging (option log + option log_limit per zone)
SVN-Revision: 22847
2010-08-31 01:54:08 +00:00
Jo-Philipp Wich d68e09200e firewall: add basic NAT reflection/NAT loopback support
SVN-Revision: 22441
2010-07-31 13:06:14 +00:00
Jo-Philipp Wich e62a9791ee firewall: allow redirecting only destination port (#7197)
SVN-Revision: 22227
2010-07-16 06:03:15 +00:00
Jo-Philipp Wich f8fa598bf4 firewall: - notrack support was broken in multiple ways, fix it - also consider a zone conntracked if any redirect references it (#7196)
SVN-Revision: 22215
2010-07-15 22:01:48 +00:00
Jo-Philipp Wich 07b571a239 firewall: Initial alias interface support. This allows to define zones covering alias interfaces and associated entries like rules and forwardings.
SVN-Revision: 21653
2010-06-01 21:58:48 +00:00
Jo-Philipp Wich e25fbfccdf firewall: fix support for netranges in redirect and rule sections
SVN-Revision: 21640
2010-05-30 23:49:47 +00:00
Jo-Philipp Wich 40ad9defcc firewall: - fix ip6tables rules when icmp_type option is set - add "family" option to zones, forwardings, redirects and rules to selectively apply rules to iptables and/or ip6tables
SVN-Revision: 21508
2010-05-19 21:35:23 +00:00
Jo-Philipp Wich c6fdffd932 firewall (#7355) - partially revert r21486, start firewall on init again - skip iface hotplug events if base fw is not up yet - get ifname and up state with uci_get_state() in iface setup since the values gathered by scan_interfaces() may be outdated when iface coldplugging happens (observed with pptp) - ignore up state when bringing down interfaces because ifdown reverts state vars before dispatching the iface event - bump package revision
SVN-Revision: 21502
2010-05-19 00:50:14 +00:00
Jo-Philipp Wich de15765a37 firewall: - defer firewall start until the first interface is brought up by hotplug, fixes race conditions on slow devices - create a file lock during firewall start and wait for it in hotplug events, prevents race conditions between start and addif - start firewall actions in background from hotplug handler since the firewall itself fires further hotplug events which results in a deadlock if not forked off - get loaded state direcly from the uci binary since updated value is not recognized by config_get after uci_set_state - bump package revision to r2
SVN-Revision: 21486
2010-05-17 12:47:14 +00:00
Jo-Philipp Wich c284cb51c0 firewall: - replace uci firewall with a modular dual stack implementation developed by Malte S. Stretz - bump version to 2
SVN-Revision: 21286
2010-05-01 18:22:01 +00:00
Jo-Philipp Wich 6eae630652 firewall: fix a race condition preventing interfaces from being added to the firewall on boot
SVN-Revision: 19232
2010-01-19 23:02:11 +00:00
Felix Fietkau 9e99581621 adjust dependencies of firewall and qos-scripts, so that these packages are visible even when iptables is not selected
SVN-Revision: 18714
2009-12-09 13:36:39 +00:00
Jo-Philipp Wich 6cb040903b firewall: initialize dest_port with src_dport if omitted in redirect sections to narrow down corresponding forward rules to the actual target ports - thanks Niels Boehm! (#6249)
SVN-Revision: 18617
2009-12-01 22:31:10 +00:00
Nicolas Thill b3d3e5d752 firewall: fix MSS issue affection RELATED new connections (closes: #5173)
SVN-Revision: 17762
2009-09-27 13:57:09 +00:00
Jo-Philipp Wich 715285dd43 firewall: properly dispatch delif events if the network has a different name then the corresponding zone
SVN-Revision: 17580
2009-09-14 14:47:43 +00:00
Andy Boyett a5f80019ef bump some revisions and update copyrights
SVN-Revision: 17554
2009-09-10 10:07:04 +00:00