defaults.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476
  1. /*
  2. * firewall3 - 3rd OpenWrt UCI firewall implementation
  3. *
  4. * Copyright (C) 2013 Jo-Philipp Wich <jo@mein.io>
  5. *
  6. * Permission to use, copy, modify, and/or distribute this software for any
  7. * purpose with or without fee is hereby granted, provided that the above
  8. * copyright notice and this permission notice appear in all copies.
  9. *
  10. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  11. * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  12. * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  13. * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  14. * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  15. * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  16. * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #include "defaults.h"
  19. #define C(f, tbl, def, fmt) \
  20. { FW3_FAMILY_##f, FW3_TABLE_##tbl, FW3_FLAG_##def, fmt }
  21. static const struct fw3_chain_spec default_chains[] = {
  22. C(ANY, FILTER, UNSPEC, "reject"),
  23. C(ANY, FILTER, CUSTOM_CHAINS, "input_rule"),
  24. C(ANY, FILTER, CUSTOM_CHAINS, "output_rule"),
  25. C(ANY, FILTER, CUSTOM_CHAINS, "forwarding_rule"),
  26. C(ANY, FILTER, SYN_FLOOD, "syn_flood"),
  27. C(V4, NAT, CUSTOM_CHAINS, "prerouting_rule"),
  28. C(V4, NAT, CUSTOM_CHAINS, "postrouting_rule"),
  29. { }
  30. };
  31. const struct fw3_option fw3_flag_opts[] = {
  32. FW3_OPT("input", target, defaults, policy_input),
  33. FW3_OPT("forward", target, defaults, policy_forward),
  34. FW3_OPT("output", target, defaults, policy_output),
  35. FW3_OPT("drop_invalid", bool, defaults, drop_invalid),
  36. FW3_OPT("tcp_reject_code", reject_code, defaults, tcp_reject_code),
  37. FW3_OPT("any_reject_code", reject_code, defaults, any_reject_code),
  38. FW3_OPT("syn_flood", bool, defaults, syn_flood),
  39. FW3_OPT("synflood_protect", bool, defaults, syn_flood),
  40. FW3_OPT("synflood_rate", limit, defaults, syn_flood_rate),
  41. FW3_OPT("synflood_burst", int, defaults, syn_flood_rate.burst),
  42. FW3_OPT("tcp_syncookies", bool, defaults, tcp_syncookies),
  43. FW3_OPT("tcp_ecn", int, defaults, tcp_ecn),
  44. FW3_OPT("tcp_window_scaling", bool, defaults, tcp_window_scaling),
  45. FW3_OPT("accept_redirects", bool, defaults, accept_redirects),
  46. FW3_OPT("accept_source_route", bool, defaults, accept_source_route),
  47. FW3_OPT("auto_helper", bool, defaults, auto_helper),
  48. FW3_OPT("custom_chains", bool, defaults, custom_chains),
  49. FW3_OPT("disable_ipv6", bool, defaults, disable_ipv6),
  50. FW3_OPT("flow_offloading", bool, defaults, flow_offloading),
  51. FW3_OPT("flow_offloading_hw", bool, defaults, flow_offloading_hw),
  52. FW3_OPT("__flags_v4", int, defaults, flags[0]),
  53. FW3_OPT("__flags_v6", int, defaults, flags[1]),
  54. { }
  55. };
  56. static void
  57. check_policy(struct uci_element *e, enum fw3_flag *pol, const char *name)
  58. {
  59. if (*pol == FW3_FLAG_UNSPEC)
  60. {
  61. warn_elem(e, "has no %s policy specified, defaulting to DROP", name);
  62. *pol = FW3_FLAG_DROP;
  63. }
  64. else if (*pol > FW3_FLAG_DROP)
  65. {
  66. warn_elem(e, "has invalid %s policy, defaulting to DROP", name);
  67. *pol = FW3_FLAG_DROP;
  68. }
  69. }
  70. static void
  71. check_offloading(struct uci_element *e, bool *offloading)
  72. {
  73. FILE *f;
  74. if (!*offloading)
  75. return;
  76. f = fopen("/sys/module/xt_FLOWOFFLOAD/refcnt", "r");
  77. if (f)
  78. {
  79. fclose(f);
  80. return;
  81. }
  82. warn_elem(e, "enables offloading but missing kernel support, disabling");
  83. *offloading = false;
  84. }
  85. static void
  86. check_any_reject_code(struct uci_element *e, enum fw3_reject_code *any_reject_code)
  87. {
  88. if (*any_reject_code == FW3_REJECT_CODE_TCP_RESET) {
  89. warn_elem(e, "tcp-reset not valid for any_reject_code, defaulting to port-unreach");
  90. *any_reject_code = FW3_REJECT_CODE_PORT_UNREACH;
  91. }
  92. }
  93. static const char*
  94. get_reject_code(enum fw3_family family, enum fw3_reject_code reject_code)
  95. {
  96. switch (reject_code) {
  97. case FW3_REJECT_CODE_TCP_RESET:
  98. return "tcp-reset";
  99. case FW3_REJECT_CODE_PORT_UNREACH:
  100. return "port-unreach";
  101. case FW3_REJECT_CODE_ADM_PROHIBITED:
  102. return family == FW3_FAMILY_V6 ? "adm-prohibited": "admin-prohib";
  103. default:
  104. return "unknown";
  105. }
  106. }
  107. void
  108. fw3_load_defaults(struct fw3_state *state, struct uci_package *p)
  109. {
  110. struct uci_section *s;
  111. struct uci_element *e;
  112. struct fw3_defaults *defs = &state->defaults;
  113. bool seen = false;
  114. defs->tcp_reject_code = FW3_REJECT_CODE_TCP_RESET;
  115. defs->any_reject_code = FW3_REJECT_CODE_PORT_UNREACH;
  116. defs->syn_flood_rate.rate = 25;
  117. defs->syn_flood_rate.burst = 50;
  118. defs->tcp_syncookies = true;
  119. defs->tcp_window_scaling = true;
  120. defs->custom_chains = true;
  121. defs->auto_helper = true;
  122. uci_foreach_element(&p->sections, e)
  123. {
  124. s = uci_to_section(e);
  125. if (strcmp(s->type, "defaults"))
  126. continue;
  127. if (seen)
  128. {
  129. warn_elem(e, "ignoring duplicate section");
  130. continue;
  131. }
  132. if(!fw3_parse_options(&state->defaults, fw3_flag_opts, s))
  133. warn_elem(e, "has invalid options");
  134. check_policy(e, &defs->policy_input, "input");
  135. check_policy(e, &defs->policy_output, "output");
  136. check_policy(e, &defs->policy_forward, "forward");
  137. check_any_reject_code(e, &defs->any_reject_code);
  138. check_offloading(e, &defs->flow_offloading);
  139. }
  140. }
  141. void
  142. fw3_print_default_chains(struct fw3_ipt_handle *handle, struct fw3_state *state,
  143. bool reload)
  144. {
  145. struct fw3_defaults *defs = &state->defaults;
  146. const struct fw3_chain_spec *c;
  147. #define policy(t) \
  148. ((t == FW3_FLAG_REJECT) ? FW3_FLAG_DROP : t)
  149. if (handle->family == FW3_FAMILY_V6 && defs->disable_ipv6)
  150. return;
  151. if (handle->table == FW3_TABLE_FILTER)
  152. {
  153. fw3_ipt_set_policy(handle, "INPUT", policy(defs->policy_input));
  154. fw3_ipt_set_policy(handle, "OUTPUT", policy(defs->policy_output));
  155. fw3_ipt_set_policy(handle, "FORWARD", policy(defs->policy_forward));
  156. }
  157. if (defs->custom_chains)
  158. set(defs->flags, handle->family, FW3_FLAG_CUSTOM_CHAINS);
  159. if (defs->syn_flood)
  160. set(defs->flags, handle->family, FW3_FLAG_SYN_FLOOD);
  161. for (c = default_chains; c->format; c++)
  162. {
  163. /* don't touch user chains on selective stop */
  164. if (reload && c->flag == FW3_FLAG_CUSTOM_CHAINS)
  165. continue;
  166. if (!fw3_is_family(c, handle->family))
  167. continue;
  168. if (c->table != handle->table)
  169. continue;
  170. if (c->flag &&
  171. !fw3_hasbit(defs->flags[handle->family == FW3_FAMILY_V6], c->flag))
  172. continue;
  173. fw3_ipt_create_chain(handle, c->format);
  174. }
  175. set(defs->flags, handle->family, handle->table);
  176. }
  177. void
  178. fw3_print_default_head_rules(struct fw3_ipt_handle *handle,
  179. struct fw3_state *state, bool reload)
  180. {
  181. int i;
  182. struct fw3_defaults *defs = &state->defaults;
  183. struct fw3_device lodev = { .set = true };
  184. struct fw3_protocol tcp = { .protocol = 6 };
  185. struct fw3_ipt_rule *r;
  186. const char *chains[] = {
  187. "INPUT", "input",
  188. "OUTPUT", "output",
  189. "FORWARD", "forwarding",
  190. };
  191. switch (handle->table)
  192. {
  193. case FW3_TABLE_FILTER:
  194. sprintf(lodev.name, "lo");
  195. r = fw3_ipt_rule_create(handle, NULL, &lodev, NULL, NULL, NULL);
  196. fw3_ipt_rule_target(r, "ACCEPT");
  197. fw3_ipt_rule_append(r, "INPUT");
  198. r = fw3_ipt_rule_create(handle, NULL, NULL, &lodev, NULL, NULL);
  199. fw3_ipt_rule_target(r, "ACCEPT");
  200. fw3_ipt_rule_append(r, "OUTPUT");
  201. if (defs->custom_chains)
  202. {
  203. for (i = 0; i < ARRAY_SIZE(chains); i += 2)
  204. {
  205. r = fw3_ipt_rule_new(handle);
  206. fw3_ipt_rule_comment(r, "Custom %s rule chain", chains[i+1]);
  207. fw3_ipt_rule_target(r, "%s_rule", chains[i+1]);
  208. fw3_ipt_rule_append(r, chains[i]);
  209. }
  210. }
  211. if (defs->flow_offloading)
  212. {
  213. r = fw3_ipt_rule_new(handle);
  214. fw3_ipt_rule_comment(r, "Traffic offloading");
  215. fw3_ipt_rule_extra(r, "-m conntrack --ctstate RELATED,ESTABLISHED");
  216. fw3_ipt_rule_target(r, "FLOWOFFLOAD");
  217. if (defs->flow_offloading_hw)
  218. fw3_ipt_rule_addarg(r, false, "--hw", NULL);
  219. fw3_ipt_rule_append(r, "FORWARD");
  220. }
  221. for (i = 0; i < ARRAY_SIZE(chains); i += 2)
  222. {
  223. r = fw3_ipt_rule_new(handle);
  224. fw3_ipt_rule_extra(r, "-m conntrack --ctstate RELATED,ESTABLISHED");
  225. fw3_ipt_rule_target(r, "ACCEPT");
  226. fw3_ipt_rule_append(r, chains[i]);
  227. if (defs->drop_invalid)
  228. {
  229. r = fw3_ipt_rule_new(handle);
  230. fw3_ipt_rule_extra(r, "-m conntrack --ctstate INVALID");
  231. fw3_ipt_rule_target(r, "DROP");
  232. fw3_ipt_rule_append(r, chains[i]);
  233. }
  234. }
  235. if (defs->syn_flood)
  236. {
  237. r = fw3_ipt_rule_create(handle, &tcp, NULL, NULL, NULL, NULL);
  238. fw3_ipt_rule_extra(r, "--syn");
  239. fw3_ipt_rule_limit(r, &defs->syn_flood_rate);
  240. fw3_ipt_rule_target(r, "RETURN");
  241. fw3_ipt_rule_append(r, "syn_flood");
  242. r = fw3_ipt_rule_new(handle);
  243. fw3_ipt_rule_target(r, "DROP");
  244. fw3_ipt_rule_append(r, "syn_flood");
  245. r = fw3_ipt_rule_create(handle, &tcp, NULL, NULL, NULL, NULL);
  246. fw3_ipt_rule_extra(r, "--syn");
  247. fw3_ipt_rule_target(r, "syn_flood");
  248. fw3_ipt_rule_append(r, "INPUT");
  249. }
  250. r = fw3_ipt_rule_create(handle, &tcp, NULL, NULL, NULL, NULL);
  251. fw3_ipt_rule_target(r, "REJECT");
  252. fw3_ipt_rule_addarg(r, false, "--reject-with", get_reject_code(handle->family, defs->tcp_reject_code));
  253. fw3_ipt_rule_append(r, "reject");
  254. r = fw3_ipt_rule_new(handle);
  255. fw3_ipt_rule_target(r, "REJECT");
  256. fw3_ipt_rule_addarg(r, false, "--reject-with", get_reject_code(handle->family, defs->any_reject_code));
  257. fw3_ipt_rule_append(r, "reject");
  258. break;
  259. case FW3_TABLE_NAT:
  260. if (defs->custom_chains)
  261. {
  262. r = fw3_ipt_rule_new(handle);
  263. fw3_ipt_rule_comment(r, "Custom prerouting rule chain");
  264. fw3_ipt_rule_target(r, "prerouting_rule");
  265. fw3_ipt_rule_append(r, "PREROUTING");
  266. r = fw3_ipt_rule_new(handle);
  267. fw3_ipt_rule_comment(r, "Custom postrouting rule chain");
  268. fw3_ipt_rule_target(r, "postrouting_rule");
  269. fw3_ipt_rule_append(r, "POSTROUTING");
  270. }
  271. break;
  272. default:
  273. break;
  274. }
  275. }
  276. void
  277. fw3_print_default_tail_rules(struct fw3_ipt_handle *handle,
  278. struct fw3_state *state, bool reload)
  279. {
  280. struct fw3_defaults *defs = &state->defaults;
  281. struct fw3_ipt_rule *r;
  282. if (handle->table != FW3_TABLE_FILTER)
  283. return;
  284. if (defs->policy_input == FW3_FLAG_REJECT)
  285. {
  286. r = fw3_ipt_rule_new(handle);
  287. if (!r)
  288. return;
  289. fw3_ipt_rule_target(r, "reject");
  290. fw3_ipt_rule_append(r, "INPUT");
  291. }
  292. if (defs->policy_output == FW3_FLAG_REJECT)
  293. {
  294. r = fw3_ipt_rule_new(handle);
  295. if (!r)
  296. return;
  297. fw3_ipt_rule_target(r, "reject");
  298. fw3_ipt_rule_append(r, "OUTPUT");
  299. }
  300. if (defs->policy_forward == FW3_FLAG_REJECT)
  301. {
  302. r = fw3_ipt_rule_new(handle);
  303. if (!r)
  304. return;
  305. fw3_ipt_rule_target(r, "reject");
  306. fw3_ipt_rule_append(r, "FORWARD");
  307. }
  308. }
  309. static void
  310. set_default(const char *name, int set)
  311. {
  312. FILE *f;
  313. char path[sizeof("/proc/sys/net/ipv4/tcp_window_scaling\0")];
  314. snprintf(path, sizeof(path), "/proc/sys/net/ipv4/tcp_%s", name);
  315. info(" * Set tcp_%s to %s", name, set ? "on" : "off", name);
  316. if (!(f = fopen(path, "w")))
  317. {
  318. info(" ! Unable to write value: %s", strerror(errno));
  319. return;
  320. }
  321. fprintf(f, "%u\n", set);
  322. fclose(f);
  323. }
  324. void
  325. fw3_set_defaults(struct fw3_state *state)
  326. {
  327. set_default("ecn", state->defaults.tcp_ecn);
  328. set_default("syncookies", state->defaults.tcp_syncookies);
  329. set_default("window_scaling", state->defaults.tcp_window_scaling);
  330. }
  331. void
  332. fw3_flush_rules(struct fw3_ipt_handle *handle, struct fw3_state *state,
  333. bool reload)
  334. {
  335. enum fw3_flag policy = reload ? FW3_FLAG_DROP : FW3_FLAG_ACCEPT;
  336. struct fw3_defaults *defs = &state->defaults;
  337. const struct fw3_chain_spec *c;
  338. if (!has(defs->flags, handle->family, handle->table))
  339. return;
  340. if (handle->table == FW3_TABLE_FILTER)
  341. {
  342. fw3_ipt_set_policy(handle, "INPUT", policy);
  343. fw3_ipt_set_policy(handle, "OUTPUT", policy);
  344. fw3_ipt_set_policy(handle, "FORWARD", policy);
  345. }
  346. fw3_ipt_delete_id_rules(handle, "INPUT");
  347. fw3_ipt_delete_id_rules(handle, "OUTPUT");
  348. fw3_ipt_delete_id_rules(handle, "FORWARD");
  349. fw3_ipt_delete_id_rules(handle, "PREROUTING");
  350. fw3_ipt_delete_id_rules(handle, "POSTROUTING");
  351. for (c = default_chains; c->format; c++)
  352. {
  353. /* don't touch user chains on selective stop */
  354. if (reload && c->flag == FW3_FLAG_CUSTOM_CHAINS)
  355. continue;
  356. if (!fw3_is_family(c, handle->family))
  357. continue;
  358. if (c->table != handle->table)
  359. continue;
  360. if (c->flag && !has(defs->flags, handle->family, c->flag))
  361. continue;
  362. fw3_ipt_flush_chain(handle, c->format);
  363. /* keep certain basic chains that do not depend on any settings to
  364. avoid purging unrelated user rules pointing to them */
  365. if (reload && !c->flag)
  366. continue;
  367. fw3_ipt_delete_chain(handle, c->format);
  368. }
  369. del(defs->flags, handle->family, handle->table);
  370. }
  371. void
  372. fw3_flush_all(struct fw3_ipt_handle *handle)
  373. {
  374. if (handle->table == FW3_TABLE_FILTER)
  375. {
  376. fw3_ipt_set_policy(handle, "INPUT", FW3_FLAG_ACCEPT);
  377. fw3_ipt_set_policy(handle, "OUTPUT", FW3_FLAG_ACCEPT);
  378. fw3_ipt_set_policy(handle, "FORWARD", FW3_FLAG_ACCEPT);
  379. }
  380. fw3_ipt_flush(handle);
  381. }