Procházet zdrojové kódy

Tidying of firewall

Bob Mottram před 8 roky
rodič
revize
80ed13fba0

+ 4
- 10
src/freedombone-app-dlna Zobrazit soubor

@@ -87,13 +87,9 @@ function configure_firewall_for_dlna {
87 87
         # docker does its own firewalling
88 88
         return
89 89
     fi
90
-    iptables -A INPUT -p udp --dport 1900 -j ACCEPT
91
-    iptables -A INPUT -p tcp --dport 8200 -j ACCEPT
92
-    function_check save_firewall_settings
93
-    save_firewall_settings
94 90
 
95
-    OPEN_PORTS+=('DLNA     1900')
96
-    OPEN_PORTS+=('DLNA     8200')
91
+    firewall_add DLNA 1900 udp
92
+    firewall_add DLNA 8200 tcp
97 93
     mark_completed $FUNCNAME
98 94
 }
99 95
 
@@ -162,11 +158,9 @@ function remove_dlna {
162 158
     if [ -f /etc/minidlna.conf ]; then
163 159
         rm /etc/minidlna.conf
164 160
     fi
165
-    iptables -D INPUT -p udp --dport 1900 -j ACCEPT
166
-    iptables -D INPUT -p tcp --dport 8200 -j ACCEPT
167
-    function_check save_firewall_settings
168
-    save_firewall_settings
169 161
     remove_completion_param install_dlna
162
+    firewall_remove 1900 udp
163
+    firewall_remove 8200 tcp
170 164
 }
171 165
 
172 166
 function install_dlna_main {

+ 3
- 10
src/freedombone-app-ipfs Zobrazit soubor

@@ -164,9 +164,7 @@ function remove_ipfs_go {
164 164
     systemctl daemon-reload
165 165
     rm /etc/systemd/system/ipfs.service
166 166
     rm -rf $GOPATH/src/github.com/ipfs
167
-    iptables -D INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
168
-    function_check save_firewall_settings
169
-    save_firewall_settings
167
+    firewall_remove $IPFS_PORT tcp
170 168
     remove_completion_param install_ipfs
171 169
     remove_completion_param configure_firewall_for_ipfs
172 170
     sed -i '/ipfs/d' $COMPLETION_FILE
@@ -181,9 +179,7 @@ function remove_ipfs_js {
181 179
     npm uninstall ipfs --global
182 180
     npm uninstall ronin --global
183 181
 
184
-    iptables -D INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
185
-    function_check save_firewall_settings
186
-    save_firewall_settings
182
+    firewall_remove $IPFS_PORT tcp
187 183
     sed -i '/install_ipfs/d' $COMPLETION_FILE
188 184
     sed -i '/ipfs/d' $COMPLETION_FILE
189 185
     sed -i '/configure_firewall_for_ipfs/d' $COMPLETION_FILE
@@ -201,11 +197,8 @@ function configure_firewall_for_ipfs {
201 197
     if [[ $ONION_ONLY != "no" ]]; then
202 198
         return
203 199
     fi
204
-    iptables -A INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
205
-    function_check save_firewall_settings
206
-    save_firewall_settings
207 200
 
208
-    OPEN_PORTS+=("IPFS     $IPFS_PORT")
201
+    firewall_add IPFS $IPFS_PORT tcp
209 202
     mark_completed $FUNCNAME
210 203
 }
211 204
 

+ 4
- 3
src/freedombone-app-irc Zobrazit soubor

@@ -244,10 +244,12 @@ function remove_irc {
244 244
     if [ -d /etc/ngircd ]; then
245 245
         rm -rf /etc/ngircd
246 246
     fi
247
-    iptables -D INPUT -p tcp --dport ${IRC_PORT}  -j ACCEPT
247
+
248 248
     iptables -D INPUT -p tcp --dport 1024:65535 --sport ${IRC_PORT} -j ACCEPT
249 249
     function_check save_firewall_settings
250 250
     save_firewall_settings
251
+    firewall_remove ${IRC_PORT} tcp
252
+
251 253
     function_check remove_onion_service
252 254
     remove_onion_service irc ${IRC_ONION_PORT}
253 255
     remove_completion_param install_irc
@@ -269,12 +271,11 @@ function configure_firewall_for_irc {
269 271
     if [[ ${ONION_ONLY} != "no" ]]; then
270 272
         return
271 273
     fi
272
-    iptables -A INPUT -p tcp --dport ${IRC_PORT}  -j ACCEPT
273 274
     iptables -I INPUT -p tcp --dport 1024:65535 --sport ${IRC_PORT} -j ACCEPT
274 275
     function_check save_firewall_settings
275 276
     save_firewall_settings
276 277
 
277
-    OPEN_PORTS+=("IRC      $IRC_PORT")
278
+    firewall_add IRC ${IRC_PORT} tcp
278 279
     echo 'configure_firewall_for_irc' >> ${COMPLETION_FILE}
279 280
 }
280 281
 

+ 2
- 10
src/freedombone-app-librevault Zobrazit soubor

@@ -109,11 +109,7 @@ function restore_remote_librevault {
109 109
 }
110 110
 
111 111
 function remove_librevault {
112
-    iptables -D INPUT -p udp --dport $LIBREVAULT_PORT -j ACCEPT
113
-    iptables -D INPUT -p tcp --dport $LIBREVAULT_PORT -j ACCEPT
114
-    function_check save_firewall_settings
115
-    save_firewall_settings
116
-
112
+    firewall_remove ${LIBREVAULT_PORT}
117 113
     systemctl stop librevault
118 114
     systemctl disable librevault
119 115
     rm /etc/systemd/system/librevault.service
@@ -125,11 +121,7 @@ function configure_firewall_for_librevault {
125 121
     if [[ $(is_completed $FUNCNAME) == "1" ]]; then
126 122
         return
127 123
     fi
128
-    iptables -A INPUT -p udp --dport $LIBREVAULT_PORT -j ACCEPT
129
-    iptables -A INPUT -p tcp --dport $LIBREVAULT_PORT -j ACCEPT
130
-    function_check save_firewall_settings
131
-    save_firewall_settings
132
-    OPEN_PORTS+=("Librevault $LIBREVAULT_PORT")
124
+    firewall_add Librevault ${LIBREVAULT_PORT}
133 125
     mark_completed $FUNCNAME
134 126
 }
135 127
 

+ 2
- 10
src/freedombone-app-mumble Zobrazit soubor

@@ -158,10 +158,7 @@ function restore_remote_mumble {
158 158
 function remove_mumble {
159 159
     apt-get -y remove --purge mumble-server
160 160
     if [[ $ONION_ONLY == "no" ]]; then
161
-        iptables -D INPUT -p udp --dport $MUMBLE_PORT -j ACCEPT
162
-        iptables -D INPUT -p tcp --dport $MUMBLE_PORT -j ACCEPT
163
-        function_check save_firewall_settings
164
-        save_firewall_settings
161
+        firewall_remove ${MUMBLE_PORT}
165 162
     fi
166 163
     if [ -f /etc/mumble-server.ini ]; then
167 164
         rm /etc/mumble-server.ini
@@ -189,12 +186,7 @@ function configure_firewall_for_mumble {
189 186
     if [[ $ONION_ONLY != "no" ]]; then
190 187
         return
191 188
     fi
192
-    iptables -A INPUT -p udp --dport $MUMBLE_PORT -j ACCEPT
193
-    iptables -A INPUT -p tcp --dport $MUMBLE_PORT -j ACCEPT
194
-    function_check save_firewall_settings
195
-    save_firewall_settings
196
-
197
-    OPEN_PORTS+=("Mumble   $MUMBLE_PORT")
189
+    firewall_add Mumble ${MUMBLE_PORT}
198 190
     mark_completed $FUNCNAME
199 191
 }
200 192
 

+ 2
- 7
src/freedombone-app-pihole Zobrazit soubor

@@ -207,13 +207,7 @@ function configure_firewall_for_pihole {
207 207
     if [[ $(is_completed $FUNCNAME) == "1" ]]; then
208 208
         return
209 209
     fi
210
-    #iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
211
-    iptables -A INPUT -p tcp -m tcp --dport 53 -j ACCEPT
212
-    iptables -A INPUT -p udp -m udp --dport 53 -j ACCEPT
213
-    function_check save_firewall_settings
214
-    save_firewall_settings
215
-
216
-    OPEN_PORTS+=('DNS      53')
210
+    firewall_add DNS 53
217 211
     mark_completed $FUNCNAME
218 212
 }
219 213
 
@@ -324,6 +318,7 @@ function remove_pihole {
324 318
         rm /etc/cron.d/pihole
325 319
     fi
326 320
 
321
+    firewall_remove 53
327 322
     userdel -r pihole
328 323
 }
329 324
 

+ 8
- 27
src/freedombone-app-sip Zobrazit soubor

@@ -158,16 +158,10 @@ function restore_remote_sip {
158 158
 }
159 159
 
160 160
 function remove_sip {
161
-    iptables -D INPUT -p udp --dport $TURN_PORT -j ACCEPT
162
-    iptables -D INPUT -p tcp --dport $TURN_PORT -j ACCEPT
163
-    iptables -D INPUT -p tcp --dport $TURN_TLS_PORT -j ACCEPT
164
-
165
-    iptables -D INPUT -p udp --dport $SIP_PORT -j ACCEPT
166
-    iptables -D INPUT -p tcp --dport $SIP_PORT -j ACCEPT
167
-    iptables -D INPUT -p udp --dport $SIP_TLS_PORT -j ACCEPT
168
-    iptables -D INPUT -p tcp --dport $SIP_TLS_PORT -j ACCEPT
169
-    function_check save_firewall_settings
170
-    save_firewall_settings
161
+    firewall_remove ${TURN_PORT}
162
+    firewall_remove ${TURN_TLS_PORT} tcp
163
+    firewall_remove ${SIP_PORT}
164
+    firewall_remove ${SIP_TLS_PORT}
171 165
 
172 166
     function_check remove_onion_service
173 167
     remove_onion_service sip ${SIP_PORT}
@@ -192,14 +186,8 @@ function configure_firewall_for_turn {
192 186
     if [[ $ONION_ONLY != "no" ]]; then
193 187
         return
194 188
     fi
195
-    iptables -A INPUT -p udp --dport $TURN_PORT -j ACCEPT
196
-    iptables -A INPUT -p tcp --dport $TURN_PORT -j ACCEPT
197
-    iptables -A INPUT -p tcp --dport $TURN_TLS_PORT -j ACCEPT
198
-    function_check save_firewall_settings
199
-    save_firewall_settings
200
-
201
-    OPEN_PORTS+=("TURN     $TURN_PORT")
202
-    OPEN_PORTS+=("TURN TLS $TURN_TLS_PORT")
189
+    firewall_add TURN ${TURN_PORT}
190
+    firewall_add "TURN TLS" ${TURN_TLS_PORT} tcp
203 191
     mark_completed $FUNCNAME
204 192
 }
205 193
 
@@ -211,15 +199,8 @@ function configure_firewall_for_sip4 {
211 199
     if [[ $ONION_ONLY != "no" ]]; then
212 200
         return
213 201
     fi
214
-    iptables -A INPUT -p udp --dport $SIP_PORT -j ACCEPT
215
-    iptables -A INPUT -p tcp --dport $SIP_PORT -j ACCEPT
216
-    iptables -A INPUT -p udp --dport $SIP_TLS_PORT -j ACCEPT
217
-    iptables -A INPUT -p tcp --dport $SIP_TLS_PORT -j ACCEPT
218
-    function_check save_firewall_settings
219
-    save_firewall_settings
220
-
221
-    OPEN_PORTS+=("SIP      $SIP_PORT")
222
-    OPEN_PORTS+=("SIP TLS  $SIP_TLS_PORT")
202
+    firewall_add SIP ${SIP_PORT}
203
+    firewall_add "SIP TLS" ${SIP_TLS_PORT}
223 204
     mark_completed $FUNCNAME
224 205
 }
225 206
 

+ 2
- 11
src/freedombone-app-syncthing Zobrazit soubor

@@ -462,11 +462,7 @@ function restore_remote_syncthing {
462 462
 }
463 463
 
464 464
 function remove_syncthing {
465
-    iptables -D INPUT -p udp --dport $SYNCTHING_PORT -j ACCEPT
466
-    iptables -D INPUT -p tcp --dport $SYNCTHING_PORT -j ACCEPT
467
-    function_check save_firewall_settings
468
-    save_firewall_settings
469
-
465
+    firewall_remove ${SYNCTHING_PORT}
470 466
     systemctl stop syncthing
471 467
     systemctl disable syncthing
472 468
     apt-get -y remove --purge syncthing
@@ -482,12 +478,7 @@ function configure_firewall_for_syncthing {
482 478
         return
483 479
     fi
484 480
 
485
-    iptables -A INPUT -p udp --dport $SYNCTHING_PORT -j ACCEPT
486
-    iptables -A INPUT -p tcp --dport $SYNCTHING_PORT -j ACCEPT
487
-    function_check save_firewall_settings
488
-    save_firewall_settings
489
-
490
-    OPEN_PORTS+=("Syncthing $SYNCTHING_PORT")
481
+    firewall_add Syncthing ${SYNCTHING_PORT}
491 482
     mark_completed $FUNCNAME
492 483
 }
493 484
 

+ 2
- 9
src/freedombone-app-tahoelafs Zobrazit soubor

@@ -186,10 +186,7 @@ function restore_remote_tahoelafs {
186 186
 }
187 187
 
188 188
 function remove_tahoelafs {
189
-    iptables -D INPUT -p udp --dport $TAHOELAFS_PORT -j ACCEPT
190
-    iptables -D INPUT -p tcp --dport $TAHOELAFS_PORT -j ACCEPT
191
-    function_check save_firewall_settings
192
-    save_firewall_settings
189
+    firewall_remove ${TAHOELAFS_PORT}
193 190
 
194 191
     for d in /home/*/ ; do
195 192
         USERNAME=$(echo "$d" | awk -F '/' '{print $3}')
@@ -209,11 +206,7 @@ function configure_firewall_for_tahoelafs {
209 206
     if [[ $(is_completed $FUNCNAME) == "1" ]]; then
210 207
         return
211 208
     fi
212
-    iptables -A INPUT -p udp --dport $TAHOELAFS_PORT -j ACCEPT
213
-    iptables -A INPUT -p tcp --dport $TAHOELAFS_PORT -j ACCEPT
214
-    function_check save_firewall_settings
215
-    save_firewall_settings
216
-    OPEN_PORTS+=("Tahoe-LAFS $TAHOELAFS_PORT")
209
+    firewall_add Tahoe-LAFS ${TAHOELAFS_PORT}
217 210
     mark_completed $FUNCNAME
218 211
 }
219 212
 

+ 2
- 10
src/freedombone-app-tox Zobrazit soubor

@@ -242,10 +242,7 @@ function restore_remote_tox {
242 242
 }
243 243
 
244 244
 function remove_tox_node {
245
-    iptables -D INPUT -p tcp --dport $TOX_PORT -j ACCEPT
246
-    iptables -D INPUT -p udp --dport $TOX_PORT -j ACCEPT
247
-    function_check save_firewall_settings
248
-    save_firewall_settings
245
+    firewall_remove ${TOX_PORT}
249 246
 
250 247
     function_check remove_onion_service
251 248
     remove_onion_service tox ${TOX_PORT}
@@ -307,12 +304,7 @@ function configure_firewall_for_tox {
307 304
         exit 32856
308 305
     fi
309 306
 
310
-    iptables -A INPUT -p tcp --dport $TOX_PORT -j ACCEPT
311
-    iptables -A INPUT -p udp --dport $TOX_PORT -j ACCEPT
312
-    function_check save_firewall_settings
313
-    save_firewall_settings
314
-
315
-    OPEN_PORTS+=("Tox      $TOX_PORT")
307
+    firewall_add Tox ${TOX_PORT}
316 308
     mark_completed $FUNCNAME
317 309
 }
318 310
 

+ 10
- 14
src/freedombone-app-xmpp Zobrazit soubor

@@ -251,15 +251,11 @@ function configure_firewall_for_xmpp {
251 251
     if [[ $ONION_ONLY != "no" ]]; then
252 252
         return
253 253
     fi
254
-    iptables -A INPUT -p tcp --dport 5222:5223 -j ACCEPT
255
-    iptables -A INPUT -p tcp --dport 5269 -j ACCEPT
256
-    iptables -A INPUT -p tcp --dport 5280:5281 -j ACCEPT
257
-    function_check save_firewall_settings
258
-    save_firewall_settings
259
-
260
-    OPEN_PORTS+=('XMPP     5222-5223')
261
-    OPEN_PORTS+=('XMPP     5269')
262
-    OPEN_PORTS+=('XMPP     5280-5281')
254
+    firewall_add XMPP 5222 tcp
255
+    firewall_add XMPP 5223 tcp
256
+    firewall_add XMPP 5269 tcp
257
+    firewall_add XMPP 5280 tcp
258
+    firewall_add XMPP 5281 tcp
263 259
     mark_completed $FUNCNAME
264 260
 }
265 261
 
@@ -271,11 +267,11 @@ function remove_xmpp_client {
271 267
 
272 268
 function remove_xmpp {
273 269
     remove_xmpp_client
274
-    iptables -D INPUT -p tcp --dport 5222:5223 -j ACCEPT
275
-    iptables -D INPUT -p tcp --dport 5269 -j ACCEPT
276
-    iptables -D INPUT -p tcp --dport 5280:5281 -j ACCEPT
277
-    function_check save_firewall_settings
278
-    save_firewall_settings
270
+    firewall_remove 5222 tcp
271
+    firewall_remove 5223 tcp
272
+    firewall_remove 5269 tcp
273
+    firewall_remove 5280 tcp
274
+    firewall_remove 5281 tcp
279 275
 
280 276
     function_check remove_onion_service
281 277
     remove_onion_service xmpp 5222 5223 5269

+ 8
- 17
src/freedombone-app-zeronet Zobrazit soubor

@@ -126,13 +126,11 @@ function remove_zeronet {
126 126
     remove_zeronet_blog
127 127
     remove_zeronet_mail
128 128
     remove_zeronet_forum
129
-    iptables -D INPUT -i $WIFI_INTERFACE -p udp --dport $ZERONET_PORT -j ACCEPT
130
-    iptables -D INPUT -i $WIFI_INTERFACE -p tcp --dport $ZERONET_PORT -j ACCEPT
131
-    iptables -D INPUT -i $WIFI_INTERFACE -p udp --dport $TRACKER_PORT -j ACCEPT
132
-    iptables -D INPUT -i $WIFI_INTERFACE -p tcp --dport $TRACKER_PORT -j ACCEPT
133
-    iptables -D INPUT -i $WIFI_INTERFACE -p udp --dport 1900 -j ACCEPT
134
-    function_check save_firewall_settings
135
-    save_firewall_settings
129
+
130
+    firewall_remove ${ZERONET_PORT}
131
+    firewall_remove ${TRACKER_PORT}
132
+    firewall_remove 1900 udp
133
+
136 134
     ${PROJECT_NAME}-mesh-install -f zeronet --remove yes
137 135
     remove_completion_param install_zeronet
138 136
     remove_completion_param configure_firewall_for_zeronet
@@ -143,16 +141,9 @@ function configure_firewall_for_zeronet {
143 141
     if [[ $(is_completed $FUNCNAME) == "1" ]]; then
144 142
         return
145 143
     fi
146
-    iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport $ZERONET_PORT -j ACCEPT
147
-    iptables -A INPUT -i $WIFI_INTERFACE -p tcp --dport $ZERONET_PORT -j ACCEPT
148
-    iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport $TRACKER_PORT -j ACCEPT
149
-    iptables -A INPUT -i $WIFI_INTERFACE -p tcp --dport $TRACKER_PORT -j ACCEPT
150
-    iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport 1900 -j ACCEPT
151
-    function_check save_firewall_settings
152
-    save_firewall_settings
153
-
154
-    OPEN_PORTS+=("ZeroNet  $ZERONET_PORT")
155
-    OPEN_PORTS+=("Tracker  $TRACKER_PORT")
144
+    firewall_add ZeroNet ${ZERONET_PORT}
145
+    firewall_add Tracker ${TRACKER_PORT}
146
+    firewall_add Tracker 1900 udp
156 147
     mark_completed $FUNCNAME
157 148
 }
158 149
 

+ 5
- 11
src/freedombone-base-email Zobrazit soubor

@@ -93,17 +93,11 @@ function configure_firewall_for_email {
93 93
     if [[ $ONION_ONLY != "no" ]]; then
94 94
         return
95 95
     fi
96
-    iptables -A INPUT -p tcp --dport 25 -j ACCEPT
97
-    iptables -A INPUT -p tcp --dport 587 -j ACCEPT
98
-    iptables -A INPUT -p tcp --dport 465 -j ACCEPT
99
-    iptables -A INPUT -p tcp --dport 993 -j ACCEPT
100
-    function_check save_firewall_settings
101
-    save_firewall_settings
102
-
103
-    OPEN_PORTS+=('Email    25')
104
-    OPEN_PORTS+=('Email    587')
105
-    OPEN_PORTS+=('Email    465')
106
-    OPEN_PORTS+=('Email    993')
96
+
97
+    firewall_add Email 25 tcp
98
+    firewall_add Email 587 tcp
99
+    firewall_add Email 465 tcp
100
+    firewall_add Imap 993 tcp
107 101
     mark_completed $FUNCNAME
108 102
 }
109 103
 

+ 0
- 6
src/freedombone-utils-final Zobrazit soubor

@@ -28,8 +28,6 @@
28 28
 # You should have received a copy of the GNU Affero General Public License
29 29
 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
30 30
 
31
-OPEN_PORTS=()
32
-
33 31
 function install_final {
34 32
     if [[ $(is_completed $FUNCNAME) == "1" ]]; then
35 33
         return
@@ -50,10 +48,6 @@ function install_final {
50 48
 
51 49
     Ensure that these ports are forwarded from your internet router
52 50
 "
53
-    for p in "${OPEN_PORTS[@]}"
54
-    do
55
-        echo "  $p"
56
-    done
57 51
     echo ''
58 52
 
59 53
     if [ -f "/home/$MY_USERNAME/README" ]; then

+ 58
- 20
src/freedombone-utils-firewall Zobrazit soubor

@@ -28,6 +28,8 @@
28 28
 # You should have received a copy of the GNU Affero General Public License
29 29
 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
30 30
 
31
+FIREWALL_CONFIG=$HOME/firewall.cfg
32
+
31 33
 function save_firewall_settings {
32 34
     iptables-save > /etc/firewall.conf
33 35
     ip6tables-save > /etc/firewall6.conf
@@ -156,11 +158,8 @@ function configure_firewall_for_web_access {
156 158
     if [[ $ONION_ONLY != "no" ]]; then
157 159
         return
158 160
     fi
159
-    iptables -A INPUT -p tcp --dport 32768:61000 --sport 80 -j ACCEPT
160
-    iptables -A INPUT -p tcp --dport 32768:61000 --sport 443 -j ACCEPT
161
-    function_check save_firewall_settings
162
-    save_firewall_settings
163
-
161
+    firewall_remove 80 tcp
162
+    firewall_remove 443 tcp
164 163
     mark_completed $FUNCNAME
165 164
 }
166 165
 
@@ -175,13 +174,9 @@ function configure_firewall_for_web_server {
175 174
     if [[ $ONION_ONLY != "no" ]]; then
176 175
         return
177 176
     fi
178
-    iptables -A INPUT -p tcp --dport 80 -j ACCEPT
179
-    iptables -A INPUT -p tcp --dport 443 -j ACCEPT
180
-    function_check save_firewall_settings
181
-    save_firewall_settings
182 177
 
183
-    OPEN_PORTS+=('HTTP     80')
184
-    OPEN_PORTS+=('HTTPS    443')
178
+    firewall_add HTTP 80 tcp
179
+    firewall_add HTTPS 443 tcp
185 180
     mark_completed $FUNCNAME
186 181
 }
187 182
 
@@ -193,12 +188,9 @@ function configure_firewall_for_ssh {
193 188
         # docker does its own firewalling
194 189
         return
195 190
     fi
196
-    iptables -A INPUT -p tcp --dport 22 -j ACCEPT
197
-    iptables -A INPUT -p tcp --dport $SSH_PORT -j ACCEPT
198
-    function_check save_firewall_settings
199
-    save_firewall_settings
200 191
 
201
-    OPEN_PORTS+=("SSH      $SSH_PORT")
192
+    firewall_add SSH 22 tcp
193
+    firewall_add SSH ${SSH_PORT} tcp
202 194
     mark_completed $FUNCNAME
203 195
 }
204 196
 
@@ -213,11 +205,8 @@ function configure_firewall_for_git {
213 205
     if [[ $ONION_ONLY != "no" ]]; then
214 206
         return
215 207
     fi
216
-    iptables -A INPUT -p tcp --dport 9418 -j ACCEPT
217
-    function_check save_firewall_settings
218
-    save_firewall_settings
219 208
 
220
-    OPEN_PORTS+=("Git      9418")
209
+    firewall_add Git 9418 tcp
221 210
     mark_completed $FUNCNAME
222 211
 }
223 212
 
@@ -314,3 +303,52 @@ function mesh_firewall {
314 303
     echo 'WantedBy=multi-user.target' >> $FIREWALL_FILENAME
315 304
     chroot "$rootdir" systemctl enable meshfirewall
316 305
 }
306
+
307
+function firewall_add {
308
+    firewall_name="$1"
309
+    firewall_port=$2
310
+    firewall_protocol="$3"
311
+
312
+    if ! grep -q "${firewall_name}=${firewall_port}" $FIREWALL_CONFIG; then
313
+        echo "${firewall_name}=${firewall_port}" >> $FIREWALL_CONFIG
314
+        if [ ! ${firewall_protocol} ]; then
315
+            iptables -A INPUT -p udp --dport ${firewall_port} -j ACCEPT
316
+            iptables -A INPUT -p tcp --dport ${firewall_port} -j ACCEPT
317
+        else
318
+            if [[ "${firewall_protocol}" == *"udp"* ]]; then
319
+                iptables -A INPUT -p udp --dport ${firewall_port} -j ACCEPT
320
+            fi
321
+            if [[ "${firewall_protocol}" == *"tcp"* ]]; then
322
+                iptables -A INPUT -p tcp --dport ${firewall_port} -j ACCEPT
323
+            fi
324
+        fi
325
+        save_firewall_settings
326
+    fi
327
+}
328
+
329
+function firewall_remove {
330
+    firewall_port=$1
331
+    firewall_protocol="$2"
332
+
333
+    if [ ! -f $FIREWALL_CONFIG ]; then
334
+        return
335
+    fi
336
+
337
+    if grep -q "=${firewall_port}" $FIREWALL_CONFIG; then
338
+        if [ ! ${firewall_protocol} ]; then
339
+            iptables -D INPUT -p udp --dport ${firewall_port} -j ACCEPT
340
+            iptables -D INPUT -p tcp --dport ${firewall_port} -j ACCEPT
341
+        else
342
+            if [[ "${firewall_protocol}" == *"udp"* ]]; then
343
+                iptables -D INPUT -p udp --dport ${firewall_port} -j ACCEPT
344
+            fi
345
+            if [[ "${firewall_protocol}" == *"tcp"* ]]; then
346
+                iptables -D INPUT -p tcp --dport ${firewall_port} -j ACCEPT
347
+            fi
348
+        fi
349
+        sed -i "/=${firewall_port}/d" $FIREWALL_CONFIG
350
+        save_firewall_settings
351
+    fi
352
+}
353
+
354
+# NOTE: deliberately no exit 0