|
@@ -1505,8 +1505,8 @@ function mesh_cjdns {
|
1505
|
1505
|
fi
|
1506
|
1506
|
fi
|
1507
|
1507
|
|
1508
|
|
- ip6tables -A INPUT -i eth0 -p udp --dport $CJDNS_PORT -j ACCEPT
|
1509
|
|
- ip6tables -A INPUT -i eth0 -p tcp --dport $CJDNS_PORT -j ACCEPT
|
|
1508
|
+ ip6tables -A INPUT -p udp --dport $CJDNS_PORT -j ACCEPT
|
|
1509
|
+ ip6tables -A INPUT -p tcp --dport $CJDNS_PORT -j ACCEPT
|
1510
|
1510
|
save_firewall_settings
|
1511
|
1511
|
|
1512
|
1512
|
if ! grep -q "Mesh Networking (cjdns)" /home/$MY_USERNAME/README; then
|
|
@@ -5887,6 +5887,20 @@ function save_firewall_settings {
|
5887
|
5887
|
chmod +x /etc/network/if-up.d/iptables
|
5888
|
5888
|
}
|
5889
|
5889
|
|
|
5890
|
+function configure_firewall_ping {
|
|
5891
|
+ if grep -Fxq "configure_firewall_ping" $COMPLETION_FILE; then
|
|
5892
|
+ return
|
|
5893
|
+ fi
|
|
5894
|
+ # Only allow ping for mesh installs
|
|
5895
|
+ if [[ $SYSTEM_TYPE != "$VARIANT_MESH" ]]; then
|
|
5896
|
+ return
|
|
5897
|
+ fi
|
|
5898
|
+ iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
|
|
5899
|
+ iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
|
|
5900
|
+ save_firewall_settings
|
|
5901
|
+ echo 'configure_firewall_ping' >> $COMPLETION_FILE
|
|
5902
|
+}
|
|
5903
|
+
|
5890
|
5904
|
function configure_firewall_for_voip {
|
5891
|
5905
|
if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" || $SYSTEM_TYPE == "$VARIANT_MEDIA" || $SYSTEM_TYPE == "$VARIANT_DEVELOPER" ]]; then
|
5892
|
5906
|
return
|
|
@@ -5894,8 +5908,8 @@ function configure_firewall_for_voip {
|
5894
|
5908
|
if grep -Fxq "configure_firewall_for_voip" $COMPLETION_FILE; then
|
5895
|
5909
|
return
|
5896
|
5910
|
fi
|
5897
|
|
- iptables -A INPUT -i eth0 -p udp --dport $VOIP_PORT -j ACCEPT
|
5898
|
|
- iptables -A INPUT -i eth0 -p tcp --dport $VOIP_PORT -j ACCEPT
|
|
5911
|
+ iptables -A INPUT -p udp --dport $VOIP_PORT -j ACCEPT
|
|
5912
|
+ iptables -A INPUT -p tcp --dport $VOIP_PORT -j ACCEPT
|
5899
|
5913
|
save_firewall_settings
|
5900
|
5914
|
echo 'configure_firewall_for_voip' >> $COMPLETION_FILE
|
5901
|
5915
|
}
|
|
@@ -5967,8 +5981,8 @@ function configure_firewall_for_dlna {
|
5967
|
5981
|
if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
|
5968
|
5982
|
return
|
5969
|
5983
|
fi
|
5970
|
|
- iptables -A INPUT -i eth0 -p udp --dport 1900 -j ACCEPT
|
5971
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 8200 -j ACCEPT
|
|
5984
|
+ iptables -A INPUT -p udp --dport 1900 -j ACCEPT
|
|
5985
|
+ iptables -A INPUT -p tcp --dport 8200 -j ACCEPT
|
5972
|
5986
|
save_firewall_settings
|
5973
|
5987
|
echo 'configure_firewall_for_dlna' >> $COMPLETION_FILE
|
5974
|
5988
|
}
|
|
@@ -5981,7 +5995,7 @@ function configure_firewall_for_dns {
|
5981
|
5995
|
# docker does its own firewalling
|
5982
|
5996
|
return
|
5983
|
5997
|
fi
|
5984
|
|
- iptables -A INPUT -i eth0 -p udp -m udp --dport 1024:65535 --sport 53 -j ACCEPT
|
|
5998
|
+ iptables -A INPUT -p udp -m udp --dport 1024:65535 --sport 53 -j ACCEPT
|
5985
|
5999
|
save_firewall_settings
|
5986
|
6000
|
echo 'configure_firewall_for_dns' >> $COMPLETION_FILE
|
5987
|
6001
|
}
|
|
@@ -5997,9 +6011,9 @@ function configure_firewall_for_xmpp {
|
5997
|
6011
|
# docker does its own firewalling
|
5998
|
6012
|
return
|
5999
|
6013
|
fi
|
6000
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 5222:5223 -j ACCEPT
|
6001
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 5269 -j ACCEPT
|
6002
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 5280:5281 -j ACCEPT
|
|
6014
|
+ iptables -A INPUT -p tcp --dport 5222:5223 -j ACCEPT
|
|
6015
|
+ iptables -A INPUT -p tcp --dport 5269 -j ACCEPT
|
|
6016
|
+ iptables -A INPUT -p tcp --dport 5280:5281 -j ACCEPT
|
6003
|
6017
|
save_firewall_settings
|
6004
|
6018
|
echo 'configure_firewall_for_xmpp' >> $COMPLETION_FILE
|
6005
|
6019
|
}
|
|
@@ -6015,9 +6029,9 @@ function configure_firewall_for_irc {
|
6015
|
6029
|
# docker does its own firewalling
|
6016
|
6030
|
return
|
6017
|
6031
|
fi
|
6018
|
|
- iptables -A INPUT -i eth0 -p tcp --dport $IRC_PORT -j ACCEPT
|
6019
|
|
- iptables -I INPUT -i eth0 -p tcp --dport 1024:65535 --sport $IRC_PORT -j ACCEPT
|
6020
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 9999 -j ACCEPT
|
|
6032
|
+ iptables -A INPUT -p tcp --dport $IRC_PORT -j ACCEPT
|
|
6033
|
+ iptables -I INPUT -p tcp --dport 1024:65535 --sport $IRC_PORT -j ACCEPT
|
|
6034
|
+ iptables -A INPUT -p tcp --dport 9999 -j ACCEPT
|
6021
|
6035
|
save_firewall_settings
|
6022
|
6036
|
echo 'configure_firewall_for_irc' >> $COMPLETION_FILE
|
6023
|
6037
|
}
|
|
@@ -6043,8 +6057,8 @@ function configure_firewall_for_web_access {
|
6043
|
6057
|
# docker does its own firewalling
|
6044
|
6058
|
return
|
6045
|
6059
|
fi
|
6046
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 32768:61000 --sport 80 -j ACCEPT
|
6047
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 32768:61000 --sport 443 -j ACCEPT
|
|
6060
|
+ iptables -A INPUT -p tcp --dport 32768:61000 --sport 80 -j ACCEPT
|
|
6061
|
+ iptables -A INPUT -p tcp --dport 32768:61000 --sport 443 -j ACCEPT
|
6048
|
6062
|
save_firewall_settings
|
6049
|
6063
|
echo 'configure_firewall_for_web_access' >> $COMPLETION_FILE
|
6050
|
6064
|
}
|
|
@@ -6057,8 +6071,8 @@ function configure_firewall_for_web_server {
|
6057
|
6071
|
# docker does its own firewalling
|
6058
|
6072
|
return
|
6059
|
6073
|
fi
|
6060
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 80 -j ACCEPT
|
6061
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 443 -j ACCEPT
|
|
6074
|
+ iptables -A INPUT -p tcp --dport 80 -j ACCEPT
|
|
6075
|
+ iptables -A INPUT -p tcp --dport 443 -j ACCEPT
|
6062
|
6076
|
save_firewall_settings
|
6063
|
6077
|
echo 'configure_firewall_for_web_server' >> $COMPLETION_FILE
|
6064
|
6078
|
}
|
|
@@ -6071,7 +6085,7 @@ function configure_firewall_for_tox {
|
6071
|
6085
|
# docker does its own firewalling
|
6072
|
6086
|
return
|
6073
|
6087
|
fi
|
6074
|
|
- iptables -A INPUT -i eth0 -p tcp --dport $TOX_PORT -j ACCEPT
|
|
6088
|
+ iptables -A INPUT -p tcp --dport $TOX_PORT -j ACCEPT
|
6075
|
6089
|
save_firewall_settings
|
6076
|
6090
|
echo 'configure_firewall_for_tox' >> $COMPLETION_FILE
|
6077
|
6091
|
}
|
|
@@ -6084,8 +6098,8 @@ function configure_firewall_for_ssh {
|
6084
|
6098
|
# docker does its own firewalling
|
6085
|
6099
|
return
|
6086
|
6100
|
fi
|
6087
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 22 -j ACCEPT
|
6088
|
|
- iptables -A INPUT -i eth0 -p tcp --dport $SSH_PORT -j ACCEPT
|
|
6101
|
+ iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
|
6102
|
+ iptables -A INPUT -p tcp --dport $SSH_PORT -j ACCEPT
|
6089
|
6103
|
save_firewall_settings
|
6090
|
6104
|
echo 'configure_firewall_for_ssh' >> $COMPLETION_FILE
|
6091
|
6105
|
}
|
|
@@ -6098,7 +6112,7 @@ function configure_firewall_for_git {
|
6098
|
6112
|
# docker does its own firewalling
|
6099
|
6113
|
return
|
6100
|
6114
|
fi
|
6101
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 9418 -j ACCEPT
|
|
6115
|
+ iptables -A INPUT -p tcp --dport 9418 -j ACCEPT
|
6102
|
6116
|
save_firewall_settings
|
6103
|
6117
|
echo 'configure_firewall_for_git' >> $COMPLETION_FILE
|
6104
|
6118
|
}
|
|
@@ -6114,10 +6128,10 @@ function configure_firewall_for_email {
|
6114
|
6128
|
# docker does its own firewalling
|
6115
|
6129
|
return
|
6116
|
6130
|
fi
|
6117
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 25 -j ACCEPT
|
6118
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 587 -j ACCEPT
|
6119
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 465 -j ACCEPT
|
6120
|
|
- iptables -A INPUT -i eth0 -p tcp --dport 993 -j ACCEPT
|
|
6131
|
+ iptables -A INPUT -p tcp --dport 25 -j ACCEPT
|
|
6132
|
+ iptables -A INPUT -p tcp --dport 587 -j ACCEPT
|
|
6133
|
+ iptables -A INPUT -p tcp --dport 465 -j ACCEPT
|
|
6134
|
+ iptables -A INPUT -p tcp --dport 993 -j ACCEPT
|
6121
|
6135
|
save_firewall_settings
|
6122
|
6136
|
echo 'configure_firewall_for_email' >> $COMPLETION_FILE
|
6123
|
6137
|
}
|
|
@@ -9883,8 +9897,14 @@ function intrusion_detection {
|
9883
|
9897
|
fi
|
9884
|
9898
|
# Avoid logging the changed database
|
9885
|
9899
|
sed -i 's|$(TWETC)/tw.pol.*||g' /etc/tripwire/twpol.txt
|
|
9900
|
+ # recreate the configuration
|
9886
|
9901
|
echo '
|
9887
|
9902
|
|
|
9903
|
+' | twadmin --create-cfgfile -S /etc/tripwire/site.key /etc/tripwire/twcfg.txt
|
|
9904
|
+ # reset
|
|
9905
|
+ echo '
|
|
9906
|
+
|
|
9907
|
+
|
9888
|
9908
|
|
9889
|
9909
|
' | reset-tripwire
|
9890
|
9910
|
|
|
@@ -10241,6 +10261,7 @@ check_domains
|
10241
|
10261
|
install_not_on_BBB
|
10242
|
10262
|
remove_default_user
|
10243
|
10263
|
configure_firewall
|
|
10264
|
+configure_firewall_ping
|
10244
|
10265
|
configure_firewall_for_ssh
|
10245
|
10266
|
configure_firewall_for_dns
|
10246
|
10267
|
configure_firewall_for_ftp
|