freedombone-utils-firewall 17KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # Firewall functions
  12. #
  13. # License
  14. # =======
  15. #
  16. # Copyright (C) 2014-2016 Bob Mottram <bob@robotics.uk.to>
  17. #
  18. # This program is free software: you can redistribute it and/or modify
  19. # it under the terms of the GNU Affero General Public License as published by
  20. # the Free Software Foundation, either version 3 of the License, or
  21. # (at your option) any later version.
  22. #
  23. # This program is distributed in the hope that it will be useful,
  24. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  25. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  26. # GNU Affero General Public License for more details.
  27. #
  28. # You should have received a copy of the GNU Affero General Public License
  29. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  30. function save_firewall_settings {
  31. iptables-save > /etc/firewall.conf
  32. ip6tables-save > /etc/firewall6.conf
  33. printf '#!/bin/sh\n' > /etc/network/if-up.d/iptables
  34. printf 'iptables-restore < /etc/firewall.conf\n' >> /etc/network/if-up.d/iptables
  35. printf 'ip6tables-restore < /etc/firewall6.conf\n' >> /etc/network/if-up.d/iptables
  36. chmod +x /etc/network/if-up.d/iptables
  37. }
  38. function enable_ipv6 {
  39. # endure that ipv6 is enabled and can route
  40. sed -i 's/net.ipv6.conf.all.disable_ipv6.*/net.ipv6.conf.all.disable_ipv6 = 0/g' /etc/sysctl.conf
  41. #sed -i "s/net.ipv6.conf.all.accept_redirects.*/net.ipv6.conf.all.accept_redirects = 1/g" /etc/sysctl.conf
  42. #sed -i "s/net.ipv6.conf.all.accept_source_route.*/net.ipv6.conf.all.accept_source_route = 1/g" /etc/sysctl.conf
  43. sed -i "s/net.ipv6.conf.all.forwarding.*/net.ipv6.conf.all.forwarding=1/g" /etc/sysctl.conf
  44. echo 1 > /proc/sys/net/ipv6/conf/all/forwarding
  45. }
  46. function configure_firewall {
  47. if grep -q "RELATED" /etc/firewall.conf; then
  48. # recreate the firewall to remove RELATED
  49. sed -i "/firewall/d" $COMPLETION_FILE
  50. fi
  51. if grep -Fxq "configure_firewall" $COMPLETION_FILE; then
  52. return
  53. fi
  54. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  55. # docker does its own firewalling
  56. return
  57. fi
  58. iptables -P INPUT ACCEPT
  59. ip6tables -P INPUT ACCEPT
  60. iptables -F
  61. ip6tables -F
  62. iptables -t nat -F
  63. ip6tables -t nat -F
  64. iptables -X
  65. ip6tables -X
  66. iptables -P INPUT DROP
  67. ip6tables -P INPUT DROP
  68. iptables -A INPUT -i lo -j ACCEPT
  69. iptables -A INPUT -m conntrack --ctstate ESTABLISHED -j ACCEPT
  70. # Make sure incoming tcp connections are SYN packets
  71. iptables -A INPUT -p tcp ! --syn -m state --state NEW -j DROP
  72. # Drop packets with incoming fragments
  73. iptables -A INPUT -f -j DROP
  74. # Drop bogons
  75. iptables -A INPUT -p tcp --tcp-flags ALL ALL -j DROP
  76. iptables -A INPUT -p tcp --tcp-flags ALL FIN,PSH,URG -j DROP
  77. iptables -A INPUT -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP
  78. # Incoming malformed NULL packets:
  79. iptables -A INPUT -p tcp --tcp-flags ALL NONE -j DROP
  80. echo 'configure_firewall' >> $COMPLETION_FILE
  81. }
  82. function configure_firewall_ping {
  83. if grep -Fxq "configure_firewall_ping" $COMPLETION_FILE; then
  84. return
  85. fi
  86. # Only allow ping for mesh installs
  87. if [[ $SYSTEM_TYPE != "$VARIANT_MESH" ]]; then
  88. return
  89. fi
  90. iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
  91. iptables -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
  92. function_check save_firewall_settings
  93. save_firewall_settings
  94. echo 'configure_firewall_ping' >> $COMPLETION_FILE
  95. }
  96. function configure_firewall_for_voip {
  97. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" || $SYSTEM_TYPE == "$VARIANT_MEDIA" || $SYSTEM_TYPE == "$VARIANT_DEVELOPER" ]]; then
  98. return
  99. fi
  100. if grep -Fxq "configure_firewall_for_voip" $COMPLETION_FILE; then
  101. return
  102. fi
  103. if [[ $ONION_ONLY != "no" ]]; then
  104. return
  105. fi
  106. iptables -A INPUT -p udp --dport $VOIP_PORT -j ACCEPT
  107. iptables -A INPUT -p tcp --dport $VOIP_PORT -j ACCEPT
  108. function_check save_firewall_settings
  109. save_firewall_settings
  110. OPEN_PORTS+=("Mumble $VOIP_PORT")
  111. echo 'configure_firewall_for_voip' >> $COMPLETION_FILE
  112. }
  113. function configure_firewall_for_syncthing {
  114. if grep -Fxq "configure_firewall_for_syncthing" $COMPLETION_FILE; then
  115. return
  116. fi
  117. iptables -A INPUT -p udp --dport $SYNCTHING_PORT -j ACCEPT
  118. iptables -A INPUT -p tcp --dport $SYNCTHING_PORT -j ACCEPT
  119. function_check save_firewall_settings
  120. save_firewall_settings
  121. OPEN_PORTS+=("Syncthing $SYNCTHING_PORT")
  122. echo 'configure_firewall_for_syncthing' >> $COMPLETION_FILE
  123. }
  124. function configure_firewall_for_voip_turn {
  125. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" || $SYSTEM_TYPE == "$VARIANT_MEDIA" || $SYSTEM_TYPE == "$VARIANT_DEVELOPER" ]]; then
  126. return
  127. fi
  128. if grep -Fxq "configure_firewall_for_voip_turn" $COMPLETION_FILE; then
  129. return
  130. fi
  131. if [[ $ONION_ONLY != "no" ]]; then
  132. return
  133. fi
  134. iptables -A INPUT -p udp --dport $VOIP_TURN_PORT -j ACCEPT
  135. iptables -A INPUT -p tcp --dport $VOIP_TURN_PORT -j ACCEPT
  136. iptables -A INPUT -p tcp --dport $VOIP_TURN_TLS_PORT -j ACCEPT
  137. function_check save_firewall_settings
  138. save_firewall_settings
  139. OPEN_PORTS+=("TURN $VOIP_TURN_PORT")
  140. OPEN_PORTS+=("TURN TLS $VOIP_TURN_TLS_PORT")
  141. echo 'configure_firewall_for_voip_turn' >> $COMPLETION_FILE
  142. }
  143. function configure_firewall_for_sip4 {
  144. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" || $SYSTEM_TYPE == "$VARIANT_MEDIA" || $SYSTEM_TYPE == "$VARIANT_DEVELOPER" ]]; then
  145. return
  146. fi
  147. if grep -Fxq "configure_firewall_for_sip4" $COMPLETION_FILE; then
  148. return
  149. fi
  150. if [[ $ONION_ONLY != "no" ]]; then
  151. return
  152. fi
  153. iptables -A INPUT -p udp --dport $SIP_PORT -j ACCEPT
  154. iptables -A INPUT -p tcp --dport $SIP_PORT -j ACCEPT
  155. iptables -A INPUT -p udp --dport $SIP_TLS_PORT -j ACCEPT
  156. iptables -A INPUT -p tcp --dport $SIP_TLS_PORT -j ACCEPT
  157. function_check save_firewall_settings
  158. save_firewall_settings
  159. OPEN_PORTS+=("SIP $SIP_PORT")
  160. OPEN_PORTS+=("SIP TLS $SIP_TLS_PORT")
  161. echo 'configure_firewall_for_sip4' >> $COMPLETION_FILE
  162. }
  163. function configure_firewall_for_ipfs {
  164. if [[ $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CHAT" ]]; then
  165. return
  166. fi
  167. if grep -Fxq "configure_firewall_for_ipfs" $COMPLETION_FILE; then
  168. return
  169. fi
  170. if [[ $ONION_ONLY != "no" ]]; then
  171. return
  172. fi
  173. iptables -A INPUT -p tcp --dport $IPFS_PORT -j ACCEPT
  174. function_check save_firewall_settings
  175. save_firewall_settings
  176. OPEN_PORTS+=("IPFS $IPFS_PORT")
  177. echo 'configure_firewall_for_ipfs' >> $COMPLETION_FILE
  178. }
  179. function configure_firewall_for_avahi {
  180. if grep -Fxq "configure_firewall_for_avahi" $COMPLETION_FILE; then
  181. return
  182. fi
  183. iptables -A INPUT -p tcp --dport 548 -j ACCEPT
  184. iptables -A INPUT -p udp --dport 548 -j ACCEPT
  185. iptables -A INPUT -p tcp --dport 5353 -j ACCEPT
  186. iptables -A INPUT -p udp --dport 5353 -j ACCEPT
  187. iptables -A INPUT -p tcp --dport 5354 -j ACCEPT
  188. iptables -A INPUT -p udp --dport 5354 -j ACCEPT
  189. function_check save_firewall_settings
  190. save_firewall_settings
  191. echo 'configure_firewall_for_avahi' >> $COMPLETION_FILE
  192. }
  193. function configure_firewall_for_cjdns {
  194. if grep -Fxq "configure_firewall_for_cjdns" $COMPLETION_FILE; then
  195. return
  196. fi
  197. if [[ $ENABLE_CJDNS != "yes" ]]; then
  198. return
  199. fi
  200. ip6tables -t nat -A POSTROUTING -o tun0 -j MASQUERADE
  201. ip6tables -A FORWARD -i tun0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  202. function_check save_firewall_settings
  203. save_firewall_settings
  204. echo 'configure_firewall_for_cjdns' >> $COMPLETION_FILE
  205. }
  206. function configure_firewall_for_batman {
  207. if grep -Fxq "configure_firewall_for_batman" $COMPLETION_FILE; then
  208. return
  209. fi
  210. if [[ $ENABLE_BATMAN != "yes" ]]; then
  211. return
  212. fi
  213. function_check save_firewall_settings
  214. save_firewall_settings
  215. echo 'configure_firewall_for_batman' >> $COMPLETION_FILE
  216. }
  217. function configure_firewall_for_babel {
  218. if grep -Fxq "configure_firewall_for_babel" $COMPLETION_FILE; then
  219. return
  220. fi
  221. if [[ $ENABLE_BABEL != "yes" ]]; then
  222. return
  223. fi
  224. iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport $BABEL_PORT -j ACCEPT
  225. function_check save_firewall_settings
  226. save_firewall_settings
  227. OPEN_PORTS+=("Babel $BABEL_PORT")
  228. echo 'configure_firewall_for_babel' >> $COMPLETION_FILE
  229. }
  230. function configure_firewall_for_zeronet {
  231. if grep -Fxq "configure_firewall_for_zeronet" $COMPLETION_FILE; then
  232. return
  233. fi
  234. if [[ $SYSTEM_TYPE != "$VARIANT_MESH" ]]; then
  235. return
  236. fi
  237. iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport $ZERONET_PORT -j ACCEPT
  238. iptables -A INPUT -i $WIFI_INTERFACE -p tcp --dport $ZERONET_PORT -j ACCEPT
  239. iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport $TRACKER_PORT -j ACCEPT
  240. iptables -A INPUT -i $WIFI_INTERFACE -p tcp --dport $TRACKER_PORT -j ACCEPT
  241. iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport 1900 -j ACCEPT
  242. function_check save_firewall_settings
  243. save_firewall_settings
  244. OPEN_PORTS+=("ZeroNet $ZERONET_PORT")
  245. OPEN_PORTS+=("Tracker $TRACKER_PORT")
  246. echo 'configure_firewall_for_zeronet' >> $COMPLETION_FILE
  247. }
  248. function configure_firewall_for_dlna {
  249. if grep -Fxq "configure_firewall_for_dlna" $COMPLETION_FILE; then
  250. return
  251. fi
  252. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  253. # docker does its own firewalling
  254. return
  255. fi
  256. if [[ $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_MAILBOX" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" ]]; then
  257. return
  258. fi
  259. iptables -A INPUT -p udp --dport 1900 -j ACCEPT
  260. iptables -A INPUT -p tcp --dport 8200 -j ACCEPT
  261. function_check save_firewall_settings
  262. save_firewall_settings
  263. OPEN_PORTS+=('DLNA 1900')
  264. OPEN_PORTS+=('DLNA 8200')
  265. echo 'configure_firewall_for_dlna' >> $COMPLETION_FILE
  266. }
  267. function configure_firewall_for_dns {
  268. if grep -Fxq "configure_firewall_for_dns" $COMPLETION_FILE; then
  269. return
  270. fi
  271. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  272. # docker does its own firewalling
  273. return
  274. fi
  275. iptables -A INPUT -p udp -m udp --dport 1024:65535 --sport 53 -j ACCEPT
  276. function_check save_firewall_settings
  277. save_firewall_settings
  278. echo 'configure_firewall_for_dns' >> $COMPLETION_FILE
  279. }
  280. function configure_firewall_for_xmpp {
  281. if [ ! -d /etc/prosody ]; then
  282. return
  283. fi
  284. if grep -Fxq "configure_firewall_for_xmpp" $COMPLETION_FILE; then
  285. return
  286. fi
  287. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  288. # docker does its own firewalling
  289. return
  290. fi
  291. if [[ $ONION_ONLY != "no" ]]; then
  292. return
  293. fi
  294. iptables -A INPUT -p tcp --dport 5222:5223 -j ACCEPT
  295. iptables -A INPUT -p tcp --dport 5269 -j ACCEPT
  296. iptables -A INPUT -p tcp --dport 5280:5281 -j ACCEPT
  297. function_check save_firewall_settings
  298. save_firewall_settings
  299. OPEN_PORTS+=('XMPP 5222-5223')
  300. OPEN_PORTS+=('XMPP 5269')
  301. OPEN_PORTS+=('XMPP 5280-5281')
  302. echo 'configure_firewall_for_xmpp' >> $COMPLETION_FILE
  303. }
  304. function configure_firewall_for_irc {
  305. if [ ! -d /etc/ngircd ]; then
  306. return
  307. fi
  308. if grep -Fxq "configure_firewall_for_irc" $COMPLETION_FILE; then
  309. return
  310. fi
  311. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  312. # docker does its own firewalling
  313. return
  314. fi
  315. if [[ $ONION_ONLY != "no" ]]; then
  316. return
  317. fi
  318. iptables -A INPUT -p tcp --dport $IRC_PORT -j ACCEPT
  319. iptables -I INPUT -p tcp --dport 1024:65535 --sport $IRC_PORT -j ACCEPT
  320. function_check save_firewall_settings
  321. save_firewall_settings
  322. OPEN_PORTS+=("IRC $IRC_PORT")
  323. echo 'configure_firewall_for_irc' >> $COMPLETION_FILE
  324. }
  325. function configure_firewall_for_web_access {
  326. if grep -Fxq "configure_firewall_for_web_access" $COMPLETION_FILE; then
  327. return
  328. fi
  329. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  330. # docker does its own firewalling
  331. return
  332. fi
  333. if [[ $ONION_ONLY != "no" ]]; then
  334. return
  335. fi
  336. iptables -A INPUT -p tcp --dport 32768:61000 --sport 80 -j ACCEPT
  337. iptables -A INPUT -p tcp --dport 32768:61000 --sport 443 -j ACCEPT
  338. function_check save_firewall_settings
  339. save_firewall_settings
  340. echo 'configure_firewall_for_web_access' >> $COMPLETION_FILE
  341. }
  342. function configure_firewall_for_web_server {
  343. if grep -Fxq "configure_firewall_for_web_server" $COMPLETION_FILE; then
  344. return
  345. fi
  346. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  347. # docker does its own firewalling
  348. return
  349. fi
  350. if [[ $ONION_ONLY != "no" ]]; then
  351. return
  352. fi
  353. iptables -A INPUT -p tcp --dport 80 -j ACCEPT
  354. iptables -A INPUT -p tcp --dport 443 -j ACCEPT
  355. function_check save_firewall_settings
  356. save_firewall_settings
  357. OPEN_PORTS+=('HTTP 80')
  358. OPEN_PORTS+=('HTTPS 443')
  359. echo 'configure_firewall_for_web_server' >> $COMPLETION_FILE
  360. }
  361. function configure_firewall_for_tox {
  362. if grep -Fxq "configure_firewall_for_tox" $COMPLETION_FILE; then
  363. return
  364. fi
  365. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  366. # docker does its own firewalling
  367. return
  368. fi
  369. if [[ $ONION_ONLY != "no" ]]; then
  370. return
  371. fi
  372. iptables -A INPUT -p tcp --dport $TOX_PORT -j ACCEPT
  373. function_check save_firewall_settings
  374. save_firewall_settings
  375. OPEN_PORTS+=("Tox $TOX_PORT")
  376. echo 'configure_firewall_for_tox' >> $COMPLETION_FILE
  377. }
  378. function configure_firewall_for_ssh {
  379. if grep -Fxq "configure_firewall_for_ssh" $COMPLETION_FILE; then
  380. return
  381. fi
  382. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  383. # docker does its own firewalling
  384. return
  385. fi
  386. iptables -A INPUT -p tcp --dport 22 -j ACCEPT
  387. iptables -A INPUT -p tcp --dport $SSH_PORT -j ACCEPT
  388. function_check save_firewall_settings
  389. save_firewall_settings
  390. OPEN_PORTS+=("SSH $SSH_PORT")
  391. echo 'configure_firewall_for_ssh' >> $COMPLETION_FILE
  392. }
  393. function configure_firewall_for_git {
  394. if grep -Fxq "configure_firewall_for_git" $COMPLETION_FILE; then
  395. return
  396. fi
  397. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  398. # docker does its own firewalling
  399. return
  400. fi
  401. if [[ $ONION_ONLY != "no" ]]; then
  402. return
  403. fi
  404. iptables -A INPUT -p tcp --dport 9418 -j ACCEPT
  405. function_check save_firewall_settings
  406. save_firewall_settings
  407. OPEN_PORTS+=("Git 9418")
  408. echo 'configure_firewall_for_git' >> $COMPLETION_FILE
  409. }
  410. function configure_firewall_for_email {
  411. if [[ $SYSTEM_TYPE == "$VARIANT_WRITER" || $SYSTEM_TYPE == "$VARIANT_CLOUD" || $SYSTEM_TYPE == "$VARIANT_CHAT" || $SYSTEM_TYPE == "$VARIANT_SOCIAL" || $SYSTEM_TYPE == "$VARIANT_MEDIA" || $SYSTEM_TYPE == "$VARIANT_DEVELOPER" || $SYSTEM_TYPE == "$VARIANT_MESH" || $SYSTEM_TYPE == "$VARIANT_NONMAILBOX" ]]; then
  412. return
  413. fi
  414. if grep -Fxq "configure_firewall_for_email" $COMPLETION_FILE; then
  415. return
  416. fi
  417. if [[ $INSTALLED_WITHIN_DOCKER == "yes" ]]; then
  418. # docker does its own firewalling
  419. return
  420. fi
  421. if [[ $ONION_ONLY != "no" ]]; then
  422. return
  423. fi
  424. iptables -A INPUT -p tcp --dport 25 -j ACCEPT
  425. iptables -A INPUT -p tcp --dport 587 -j ACCEPT
  426. iptables -A INPUT -p tcp --dport 465 -j ACCEPT
  427. iptables -A INPUT -p tcp --dport 993 -j ACCEPT
  428. function_check save_firewall_settings
  429. save_firewall_settings
  430. OPEN_PORTS+=('Email 25')
  431. OPEN_PORTS+=('Email 587')
  432. OPEN_PORTS+=('Email 465')
  433. OPEN_PORTS+=('Email 993')
  434. echo 'configure_firewall_for_email' >> $COMPLETION_FILE
  435. }
  436. function configure_internet_protocol {
  437. if grep -Fxq "configure_internet_protocol" $COMPLETION_FILE; then
  438. return
  439. fi
  440. if [[ $SYSTEM_TYPE == "$VARIANT_MESH" ]]; then
  441. return
  442. fi
  443. sed -i "s/#net.ipv4.tcp_syncookies=1/net.ipv4.tcp_syncookies=1/g" /etc/sysctl.conf
  444. sed -i "s/#net.ipv4.conf.all.accept_redirects = 0/net.ipv4.conf.all.accept_redirects = 0/g" /etc/sysctl.conf
  445. sed -i "s/#net.ipv6.conf.all.accept_redirects = 0/net.ipv6.conf.all.accept_redirects = 0/g" /etc/sysctl.conf
  446. sed -i "s/#net.ipv4.conf.all.send_redirects = 0/net.ipv4.conf.all.send_redirects = 0/g" /etc/sysctl.conf
  447. sed -i "s/#net.ipv4.conf.all.accept_source_route = 0/net.ipv4.conf.all.accept_source_route = 0/g" /etc/sysctl.conf
  448. sed -i "s/#net.ipv6.conf.all.accept_source_route = 0/net.ipv6.conf.all.accept_source_route = 0/g" /etc/sysctl.conf
  449. sed -i "s/#net.ipv4.conf.default.rp_filter=1/net.ipv4.conf.default.rp_filter=1/g" /etc/sysctl.conf
  450. sed -i "s/#net.ipv4.conf.all.rp_filter=1/net.ipv4.conf.all.rp_filter=1/g" /etc/sysctl.conf
  451. sed -i "s/#net.ipv4.ip_forward=1/net.ipv4.ip_forward=0/g" /etc/sysctl.conf
  452. sed -i "s/#net.ipv6.conf.all.forwarding=1/net.ipv6.conf.all.forwarding=0/g" /etc/sysctl.conf
  453. if ! grep -q "ignore pings" /etc/sysctl.conf; then
  454. echo '# ignore pings' >> /etc/sysctl.conf
  455. echo 'net.ipv4.icmp_echo_ignore_all = 1' >> /etc/sysctl.conf
  456. echo 'net.ipv6.icmp_echo_ignore_all = 1' >> /etc/sysctl.conf
  457. fi
  458. if ! grep -q "disable ipv6" /etc/sysctl.conf; then
  459. echo '# disable ipv6' >> /etc/sysctl.conf
  460. echo 'net.ipv6.conf.all.disable_ipv6 = 1' >> /etc/sysctl.conf
  461. fi
  462. if ! grep -q "net.ipv4.tcp_synack_retries" /etc/sysctl.conf; then
  463. echo 'net.ipv4.tcp_synack_retries = 2' >> /etc/sysctl.conf
  464. echo 'net.ipv4.tcp_syn_retries = 1' >> /etc/sysctl.conf
  465. fi
  466. if ! grep -q "keepalive" /etc/sysctl.conf; then
  467. echo '# keepalive' >> /etc/sysctl.conf
  468. echo 'net.ipv4.tcp_keepalive_probes = 9' >> /etc/sysctl.conf
  469. echo 'net.ipv4.tcp_keepalive_intvl = 75' >> /etc/sysctl.conf
  470. echo 'net.ipv4.tcp_keepalive_time = 7200' >> /etc/sysctl.conf
  471. fi
  472. echo 'configure_internet_protocol' >> $COMPLETION_FILE
  473. }