Ver código fonte

Allow icmp for mesh variant

Bob Mottram 9 anos atrás
pai
commit
142a41319a
1 arquivos alterados com 46 adições e 25 exclusões
  1. 46
    25
      src/freedombone

+ 46
- 25
src/freedombone Ver arquivo

@@ -1505,8 +1505,8 @@ function mesh_cjdns {
1505 1505
       fi
1506 1506
   fi
1507 1507
 
1508
-  ip6tables -A INPUT -i eth0 -p udp --dport $CJDNS_PORT -j ACCEPT
1509
-  ip6tables -A INPUT -i eth0 -p tcp --dport $CJDNS_PORT -j ACCEPT
1508
+  ip6tables -A INPUT -p udp --dport $CJDNS_PORT -j ACCEPT
1509
+  ip6tables -A INPUT -p tcp --dport $CJDNS_PORT -j ACCEPT
1510 1510
   save_firewall_settings
1511 1511
 
1512 1512
   if ! grep -q "Mesh Networking (cjdns)" /home/$MY_USERNAME/README; then
@@ -5887,6 +5887,20 @@ function save_firewall_settings {
5887 5887
   chmod +x /etc/network/if-up.d/iptables
5888 5888
 }
5889 5889
 
5890
+function configure_firewall_ping {
5891
+  if grep -Fxq "configure_firewall_ping" $COMPLETION_FILE; then
5892
+      return
5893
+  fi
5894
+  # Only allow ping for mesh installs
5895
+  if [[ $SYSTEM_TYPE != "$VARIANT_MESH" ]]; then
5896
+      return
5897
+  fi
5898
+  iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
5899
+  iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
5900
+  save_firewall_settings
5901
+  echo 'configure_firewall_ping' >> $COMPLETION_FILE
5902
+}
5903
+
5890 5904
 function configure_firewall_for_voip {
5891 5905
   if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" || $SYSTEM_TYPE == "$VARIANT_MEDIA" || $SYSTEM_TYPE == "$VARIANT_DEVELOPER" ]]; then
5892 5906
       return
@@ -5894,8 +5908,8 @@ function configure_firewall_for_voip {
5894 5908
   if grep -Fxq "configure_firewall_for_voip" $COMPLETION_FILE; then
5895 5909
       return
5896 5910
   fi
5897
-  iptables -A INPUT -i eth0 -p udp --dport $VOIP_PORT -j ACCEPT
5898
-  iptables -A INPUT -i eth0 -p tcp --dport $VOIP_PORT -j ACCEPT
5911
+  iptables -A INPUT -p udp --dport $VOIP_PORT -j ACCEPT
5912
+  iptables -A INPUT -p tcp --dport $VOIP_PORT -j ACCEPT
5899 5913
   save_firewall_settings
5900 5914
   echo 'configure_firewall_for_voip' >> $COMPLETION_FILE
5901 5915
 }
@@ -5967,8 +5981,8 @@ function configure_firewall_for_dlna {
5967 5981
   if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
5968 5982
       return
5969 5983
   fi
5970
-  iptables -A INPUT -i eth0 -p udp --dport 1900 -j ACCEPT
5971
-  iptables -A INPUT -i eth0 -p tcp --dport 8200 -j ACCEPT
5984
+  iptables -A INPUT -p udp --dport 1900 -j ACCEPT
5985
+  iptables -A INPUT -p tcp --dport 8200 -j ACCEPT
5972 5986
   save_firewall_settings
5973 5987
   echo 'configure_firewall_for_dlna' >> $COMPLETION_FILE
5974 5988
 }
@@ -5981,7 +5995,7 @@ function configure_firewall_for_dns {
5981 5995
       # docker does its own firewalling
5982 5996
       return
5983 5997
   fi
5984
-  iptables -A INPUT -i eth0 -p udp -m udp --dport 1024:65535 --sport 53 -j ACCEPT
5998
+  iptables -A INPUT -p udp -m udp --dport 1024:65535 --sport 53 -j ACCEPT
5985 5999
   save_firewall_settings
5986 6000
   echo 'configure_firewall_for_dns' >> $COMPLETION_FILE
5987 6001
 }
@@ -5997,9 +6011,9 @@ function configure_firewall_for_xmpp {
5997 6011
       # docker does its own firewalling
5998 6012
       return
5999 6013
   fi
6000
-  iptables -A INPUT -i eth0 -p tcp --dport 5222:5223 -j ACCEPT
6001
-  iptables -A INPUT -i eth0 -p tcp --dport 5269 -j ACCEPT
6002
-  iptables -A INPUT -i eth0 -p tcp --dport 5280:5281 -j ACCEPT
6014
+  iptables -A INPUT -p tcp --dport 5222:5223 -j ACCEPT
6015
+  iptables -A INPUT -p tcp --dport 5269 -j ACCEPT
6016
+  iptables -A INPUT -p tcp --dport 5280:5281 -j ACCEPT
6003 6017
   save_firewall_settings
6004 6018
   echo 'configure_firewall_for_xmpp' >> $COMPLETION_FILE
6005 6019
 }
@@ -6015,9 +6029,9 @@ function configure_firewall_for_irc {
6015 6029
       # docker does its own firewalling
6016 6030
       return
6017 6031
   fi
6018
-  iptables -A INPUT -i eth0 -p tcp --dport $IRC_PORT  -j ACCEPT
6019
-  iptables -I INPUT -i eth0 -p tcp --dport 1024:65535 --sport $IRC_PORT -j ACCEPT
6020
-  iptables -A INPUT -i eth0 -p tcp --dport 9999 -j ACCEPT
6032
+  iptables -A INPUT -p tcp --dport $IRC_PORT  -j ACCEPT
6033
+  iptables -I INPUT -p tcp --dport 1024:65535 --sport $IRC_PORT -j ACCEPT
6034
+  iptables -A INPUT -p tcp --dport 9999 -j ACCEPT
6021 6035
   save_firewall_settings
6022 6036
   echo 'configure_firewall_for_irc' >> $COMPLETION_FILE
6023 6037
 }
@@ -6043,8 +6057,8 @@ function configure_firewall_for_web_access {
6043 6057
       # docker does its own firewalling
6044 6058
       return
6045 6059
   fi
6046
-  iptables -A INPUT -i eth0 -p tcp --dport 32768:61000 --sport 80 -j ACCEPT
6047
-  iptables -A INPUT -i eth0 -p tcp --dport 32768:61000 --sport 443 -j ACCEPT
6060
+  iptables -A INPUT -p tcp --dport 32768:61000 --sport 80 -j ACCEPT
6061
+  iptables -A INPUT -p tcp --dport 32768:61000 --sport 443 -j ACCEPT
6048 6062
   save_firewall_settings
6049 6063
   echo 'configure_firewall_for_web_access' >> $COMPLETION_FILE
6050 6064
 }
@@ -6057,8 +6071,8 @@ function configure_firewall_for_web_server {
6057 6071
       # docker does its own firewalling
6058 6072
       return
6059 6073
   fi
6060
-  iptables -A INPUT -i eth0 -p tcp --dport 80 -j ACCEPT
6061
-  iptables -A INPUT -i eth0 -p tcp --dport 443 -j ACCEPT
6074
+  iptables -A INPUT -p tcp --dport 80 -j ACCEPT
6075
+  iptables -A INPUT -p tcp --dport 443 -j ACCEPT
6062 6076
   save_firewall_settings
6063 6077
   echo 'configure_firewall_for_web_server' >> $COMPLETION_FILE
6064 6078
 }
@@ -6071,7 +6085,7 @@ function configure_firewall_for_tox {
6071 6085
       # docker does its own firewalling
6072 6086
       return
6073 6087
   fi
6074
-  iptables -A INPUT -i eth0 -p tcp --dport $TOX_PORT -j ACCEPT
6088
+  iptables -A INPUT -p tcp --dport $TOX_PORT -j ACCEPT
6075 6089
   save_firewall_settings
6076 6090
   echo 'configure_firewall_for_tox' >> $COMPLETION_FILE
6077 6091
 }
@@ -6084,8 +6098,8 @@ function configure_firewall_for_ssh {
6084 6098
       # docker does its own firewalling
6085 6099
       return
6086 6100
   fi
6087
-  iptables -A INPUT -i eth0 -p tcp --dport 22 -j ACCEPT
6088
-  iptables -A INPUT -i eth0 -p tcp --dport $SSH_PORT -j ACCEPT
6101
+  iptables -A INPUT -p tcp --dport 22 -j ACCEPT
6102
+  iptables -A INPUT -p tcp --dport $SSH_PORT -j ACCEPT
6089 6103
   save_firewall_settings
6090 6104
   echo 'configure_firewall_for_ssh' >> $COMPLETION_FILE
6091 6105
 }
@@ -6098,7 +6112,7 @@ function configure_firewall_for_git {
6098 6112
       # docker does its own firewalling
6099 6113
       return
6100 6114
   fi
6101
-  iptables -A INPUT -i eth0 -p tcp --dport 9418 -j ACCEPT
6115
+  iptables -A INPUT -p tcp --dport 9418 -j ACCEPT
6102 6116
   save_firewall_settings
6103 6117
   echo 'configure_firewall_for_git' >> $COMPLETION_FILE
6104 6118
 }
@@ -6114,10 +6128,10 @@ function configure_firewall_for_email {
6114 6128
       # docker does its own firewalling
6115 6129
       return
6116 6130
   fi
6117
-  iptables -A INPUT -i eth0 -p tcp --dport 25 -j ACCEPT
6118
-  iptables -A INPUT -i eth0 -p tcp --dport 587 -j ACCEPT
6119
-  iptables -A INPUT -i eth0 -p tcp --dport 465 -j ACCEPT
6120
-  iptables -A INPUT -i eth0 -p tcp --dport 993 -j ACCEPT
6131
+  iptables -A INPUT -p tcp --dport 25 -j ACCEPT
6132
+  iptables -A INPUT -p tcp --dport 587 -j ACCEPT
6133
+  iptables -A INPUT -p tcp --dport 465 -j ACCEPT
6134
+  iptables -A INPUT -p tcp --dport 993 -j ACCEPT
6121 6135
   save_firewall_settings
6122 6136
   echo 'configure_firewall_for_email' >> $COMPLETION_FILE
6123 6137
 }
@@ -9883,8 +9897,14 @@ function intrusion_detection {
9883 9897
   fi
9884 9898
   # Avoid logging the changed database
9885 9899
   sed -i 's|$(TWETC)/tw.pol.*||g' /etc/tripwire/twpol.txt
9900
+  # recreate the configuration
9886 9901
   echo '
9887 9902
 
9903
+' | twadmin --create-cfgfile -S /etc/tripwire/site.key /etc/tripwire/twcfg.txt
9904
+  # reset
9905
+  echo '
9906
+
9907
+
9888 9908
 
9889 9909
 ' | reset-tripwire
9890 9910
 
@@ -10241,6 +10261,7 @@ check_domains
10241 10261
 install_not_on_BBB
10242 10262
 remove_default_user
10243 10263
 configure_firewall
10264
+configure_firewall_ping
10244 10265
 configure_firewall_for_ssh
10245 10266
 configure_firewall_for_dns
10246 10267
 configure_firewall_for_ftp