blob: 60f1632f4551a2c2f8bea9959e36af3165a277b2 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
|
#!/sbin/openrc-run
# Copyright 2014-2017 Nicholas Vinson
# Copyright 1999-2020 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
extra_commands="clear list panic save"
extra_started_commands="reload"
depend() {
need localmount #434774
before net
}
_nftables() {
export NFTABLES_SAVE SAVE_OPTIONS
/usr/libexec/nftables/nftables.sh "${@}"
}
start_pre() {
checkkernel || return 1
checkconfig || return 1
return 0
}
clear() {
_nftables clear || return 1
return 0
}
list() {
_nftables list || return 1
return 0
}
panic() {
checkkernel || return 1
if service_started "${RC_SVCNAME}"; then
rc-service "${RC_SVCNAME}" stop
fi
ebegin "Dropping all packets"
clear
if nft create table ip filter >/dev/null 2>&1; then
nft -f /dev/stdin <<-EOF
table ip filter {
chain input {
type filter hook input priority 0;
drop
}
chain forward {
type filter hook forward priority 0;
drop
}
chain output {
type filter hook output priority 0;
drop
}
}
EOF
fi
if nft create table ip6 filter >/dev/null 2>&1; then
nft -f /dev/stdin <<-EOF
table ip6 filter {
chain input {
type filter hook input priority 0;
drop
}
chain forward {
type filter hook forward priority 0;
drop
}
chain output {
type filter hook output priority 0;
drop
}
}
EOF
fi
}
reload() {
checkkernel || return 1
ebegin "Flushing firewall"
clear
start
}
save() {
ebegin "Saving nftables state"
checkpath -q -d "$(dirname "${NFTABLES_SAVE}")"
checkpath -q -m 0600 -f "${NFTABLES_SAVE}"
export SAVE_OPTIONS
_nftables store "${NFTABLES_SAVE}"
return $?
}
start() {
ebegin "Loading nftables state and starting firewall"
clear
_nftables load "${NFTABLES_SAVE}"
eend ${?}
}
stop() {
if yesno "${SAVE_ON_STOP:-yes}"; then
save || return 1
fi
ebegin "Stopping firewall"
clear
eend ${?}
}
checkconfig() {
if [ ! -f "${NFTABLES_SAVE}" ]; then
eerror "Not starting nftables. First create some rules then run:"
eerror "rc-service nftables save"
return 1
fi
return 0
}
checkkernel() {
if ! nft list tables >/dev/null 2>&1; then
eerror "Your kernel lacks nftables support, please load"
eerror "appropriate modules and try again."
return 1
fi
return 0
}
|