[package] firewall:

- solve scoping issues when multiple values are used, thanks Daniel Dickinson
	- ignore src_port/dest_port for proto icmp rules, ignore icmp_type for non-icmp rules
	- properly handle icmp when proto is given in numerical form (1, 58)
	- support negated icmp types


git-svn-id: svn://svn.openwrt.org/openwrt/trunk@27500 3c298f89-4303-0410-b956-a3cf2f4a3e73
master
Jo-Philipp Wich 2011-07-06 22:10:46 +00:00
parent 31aac3c47e
commit aa43abb8d1
4 changed files with 26 additions and 30 deletions

View File

@ -9,7 +9,7 @@ include $(TOPDIR)/rules.mk
PKG_NAME:=firewall PKG_NAME:=firewall
PKG_VERSION:=2 PKG_VERSION:=2
PKG_RELEASE:=28 PKG_RELEASE:=29
include $(INCLUDE_DIR)/package.mk include $(INCLUDE_DIR)/package.mk

View File

@ -91,15 +91,15 @@ fw_load_redirect() {
fw_get_negation destports '--dport' "$destports" fw_get_negation destports '--dport' "$destports"
[ "$redirect_proto" == "tcpudp" ] && redirect_proto="tcp udp" [ "$redirect_proto" == "tcpudp" ] && redirect_proto="tcp udp"
for redirect_proto in $redirect_proto; do local pr; for pr in $redirect_proto; do
fw_get_negation redirect_proto '-p' "$redirect_proto" fw_get_negation pr '-p' "$pr"
for redirect_src_mac in ${redirect_src_mac:-""}; do local sm; for sm in ${redirect_src_mac:-""}; do
fw_get_negation redirect_src_mac '--mac-source' "$redirect_src_mac" fw_get_negation sm '--mac-source' "$sm"
fw add $mode n $natchain $redirect_target + \ fw add $mode n $natchain $redirect_target + \
{ $redirect_src_ip $redirect_dest_ip } { \ { $redirect_src_ip $redirect_dest_ip } { \
$srcaddr $srcdaddr $redirect_proto \ $srcaddr $srcdaddr $redirect_proto \
$srcports $srcdports \ $srcports $srcdports \
${redirect_src_mac:+-m mac $redirect_src_mac} \ ${sm:+-m mac $sm} \
$natopt $nataddr${natports:+:$natports} \ $natopt $nataddr${natports:+:$natports} \
$redirect_options \ $redirect_options \
} }

View File

@ -65,32 +65,28 @@ fw_load_rule() {
fw_get_negation src_spec '-s' "${rule_src_ip:+$rule_src_ip/$rule_src_ip_prefixlen}" fw_get_negation src_spec '-s' "${rule_src_ip:+$rule_src_ip/$rule_src_ip_prefixlen}"
fw_get_negation dest_spec '-d' "${rule_dest_ip:+$rule_dest_ip/$rule_dest_ip_prefixlen}" fw_get_negation dest_spec '-d' "${rule_dest_ip:+$rule_dest_ip/$rule_dest_ip_prefixlen}"
local rule_src_port_copy
local rule_dest_port_copy
[ "$rule_proto" == "tcpudp" ] && rule_proto="tcp udp" [ "$rule_proto" == "tcpudp" ] && rule_proto="tcp udp"
rule_src_port_copy="$rule_src_port" local pr; for pr in $rule_proto; do
rule_dest_port_copy="$rule_dest_port" fw_get_negation pr '-p' "$pr"
for rule_proto in $rule_proto; do local sp; for sp in ${rule_src_port:-""}; do
rule_src_port="$rule_src_port_copy" fw_get_port_range sp $sp
rule_dest_port="$rule_dest_port_copy" fw_get_negation sp '--sport' "$sp"
fw_get_negation rule_proto '-p' "$rule_proto" local dp; for dp in ${rule_dest_port:-""}; do
for rule_src_port in ${rule_src_port:-""}; do fw_get_port_range dp $dp
fw_get_port_range rule_src_port $rule_src_port fw_get_negation dp '--dport' "$dp"
fw_get_negation rule_src_port '--sport' "$rule_src_port" local sm; for sm in ${rule_src_mac:-""}; do
for rule_dest_port in ${rule_dest_port:-""}; do fw_get_negation sm '--mac-source' "$sm"
fw_get_port_range rule_dest_port $rule_dest_port local it; for it in ${rule_icmp_type:-""}; do
fw_get_negation rule_dest_port '--dport' "$rule_dest_port" fw_get_negation it '--icmp-type' "$it"
for rule_src_mac in ${rule_src_mac:-""}; do case "$pr" in
fw_get_negation rule_src_mac '--mac-source' "$rule_src_mac" *" icmp"|*" icmpv6"|*" 1"|*" 58") sp=""; dp="" ;;
for rule_icmp_type in ${rule_icmp_type:-""}; do *) it="" ;;
[ "$rule_proto" = "-p icmp" ] || rule_icmp_type="" esac
fw add $mode $table $chain $target + \ fw add $mode $table $chain $target + \
{ $rule_src_ip $rule_dest_ip } { \ { $rule_src_ip $rule_dest_ip } { \
$src_spec $dest_spec $rule_proto \ $src_spec $dest_spec \
$rule_src_port $rule_dest_port \ $pr $sp $dp $it \
${rule_src_mac:+-m mac $rule_src_mac} \ ${sm:+-m mac $sm} \
${rule_icmp_type:+--icmp-type $rule_icmp_type} \
${rule_limit:+-m limit --limit $rule_limit \ ${rule_limit:+-m limit --limit $rule_limit \
${rule_limit_burst:+--limit-burst $rule_limit_burst}} \ ${rule_limit_burst:+--limit-burst $rule_limit_burst}} \
$rule_extra \ $rule_extra \

View File

@ -166,7 +166,7 @@ fw__exec() { # <action> <family> <table> <chain> <target> <position> { <rules> }
while [ $# -gt 1 ]; do while [ $# -gt 1 ]; do
# special parameter handling # special parameter handling
case "$1:$2" in case "$1:$2" in
-p:icmp*|--protocol:icmp*) -p:icmp*|-p:1|-p:58|--protocol:icmp*|--protocol:1|--protocol:58)
[ "$app" = ip6tables ] && \ [ "$app" = ip6tables ] && \
cmdline="$cmdline -p icmpv6" || \ cmdline="$cmdline -p icmpv6" || \
cmdline="$cmdline -p icmp" cmdline="$cmdline -p icmp"