2012-11-16 13:16:37 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
|
|
import os
|
|
|
|
import sys
|
2012-12-12 11:17:07 +01:00
|
|
|
try:
|
|
|
|
import yaml
|
|
|
|
except ImportError:
|
|
|
|
sys.stderr.write('Error: Yunohost CLI Require yaml lib\n')
|
|
|
|
sys.stderr.write('apt-get install python-yaml\n')
|
|
|
|
sys.exit(1)
|
2012-11-16 13:16:37 +01:00
|
|
|
|
2012-12-12 17:15:12 +01:00
|
|
|
|
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
def firewall_allow(protocol=None,port=None,ipv6=None):
|
|
|
|
if ipv6 == True:
|
2012-12-12 17:15:12 +01:00
|
|
|
ip = 'ipv6'
|
|
|
|
iptables="ip6tables"
|
|
|
|
else:
|
|
|
|
ip = 'ipv4'
|
|
|
|
iptables="iptables"
|
|
|
|
|
2012-12-12 11:17:07 +01:00
|
|
|
if protocol == "Both":
|
2012-12-13 10:29:53 +01:00
|
|
|
TCP_rule = iptables+" -A INPUT -p tcp -i eth0 --dport "+ port +" -j ACCEPT"
|
2012-12-12 17:15:12 +01:00
|
|
|
UDP_rule = iptables+" -A INPUT -p udp -i eth0 --dport "+ port +" -j ACCEPT"
|
2012-12-13 10:29:53 +01:00
|
|
|
|
|
|
|
update_yml(port,'tcp','a',ip)
|
|
|
|
update_yml(port,'udp','a',ip)
|
|
|
|
|
2012-12-12 17:15:12 +01:00
|
|
|
os.system(TCP_rule)
|
|
|
|
os.system(UDP_rule)
|
2012-12-12 11:17:07 +01:00
|
|
|
|
|
|
|
else:
|
2012-12-12 16:27:12 +01:00
|
|
|
rule = iptables+" -A INPUT -p "+ protocol +" -i eth0 --dport "+ port +" -j ACCEPT"
|
2012-12-13 10:29:53 +01:00
|
|
|
update_yml(port,protocol,'a',ip)
|
2012-12-12 16:27:12 +01:00
|
|
|
os.system(rule)
|
2012-12-12 11:17:07 +01:00
|
|
|
|
2012-12-12 17:15:12 +01:00
|
|
|
|
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
def firewall_disallow(protocol=None,port=None,ipv6=None):
|
2012-12-12 16:27:12 +01:00
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
if ipv6 == True:
|
2012-12-12 17:15:12 +01:00
|
|
|
ip = 'ipv6'
|
2012-12-12 17:53:08 +01:00
|
|
|
iptables="ip6tables"
|
2012-12-12 17:15:12 +01:00
|
|
|
else:
|
|
|
|
ip = 'ipv4'
|
2012-12-12 17:53:08 +01:00
|
|
|
iptables="ip6tables"
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2012-12-12 11:17:07 +01:00
|
|
|
if protocol == "Both":
|
2012-12-12 16:27:12 +01:00
|
|
|
TCP_rule = iptables+" -A INPUT -p tcp -i eth0 --dport "+ port +" -j REJECT"
|
|
|
|
UDP_rule = iptables+" -A INPUT -p udp -i eth0 --dport "+ port +" -j REJECT"
|
2012-12-13 10:29:53 +01:00
|
|
|
|
|
|
|
update_yml(port,'tcp','r',ip)
|
|
|
|
update_yml(port,'udp','r',ip)
|
|
|
|
|
2012-12-12 16:27:12 +01:00
|
|
|
os.system(TCP_rule)
|
|
|
|
os.system(UDP_rule)
|
2012-12-13 10:29:53 +01:00
|
|
|
|
2012-12-12 11:17:07 +01:00
|
|
|
else:
|
2012-12-12 16:27:12 +01:00
|
|
|
rule = iptables+" -A INPUT -p "+ protocol +" -i eth0 --dport "+ port +" -j REJECT"
|
2012-12-13 10:29:53 +01:00
|
|
|
update_yml(port,protocol,'r',ip)
|
2012-12-12 16:27:12 +01:00
|
|
|
os.system(rule)
|
2012-12-12 11:17:07 +01:00
|
|
|
|
2012-12-12 17:15:12 +01:00
|
|
|
|
|
|
|
|
2012-12-12 11:17:07 +01:00
|
|
|
def firewall_list():
|
|
|
|
'''
|
2012-12-12 17:15:12 +01:00
|
|
|
Parse and display firwall.yml
|
|
|
|
'''
|
2012-12-12 11:17:07 +01:00
|
|
|
with open ('firewall.yml') as f:
|
2012-12-12 17:15:12 +01:00
|
|
|
firewall = yaml.load(f)
|
2012-12-13 10:29:53 +01:00
|
|
|
return firewall
|
2012-12-12 17:15:12 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
2012-12-12 11:17:07 +01:00
|
|
|
def firewall_reload():
|
|
|
|
'''
|
2012-12-12 17:15:12 +01:00
|
|
|
Clear filter IPTABLE's table
|
|
|
|
Allow SSH
|
|
|
|
Parse firewall.yml extract the list of port allowed
|
|
|
|
Allow all port in the list
|
|
|
|
Prohibit the rest
|
|
|
|
'''
|
|
|
|
with open('firewall.yml','r') as f:
|
2012-12-12 16:27:12 +01:00
|
|
|
firewall = yaml.load(f)
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2012-12-12 16:27:12 +01:00
|
|
|
os.system ("iptables -P INPUT ACCEPT")
|
2012-12-12 11:17:07 +01:00
|
|
|
os.system ("iptables -F")
|
|
|
|
os.system ("iptables -X")
|
|
|
|
os.system ("iptables -A INPUT -p tcp -i eth0 --dport 22 -j ACCEPT")
|
2012-12-13 10:29:53 +01:00
|
|
|
update_yml('22','TCP','a',False)
|
2012-12-12 17:53:08 +01:00
|
|
|
|
2012-12-12 17:15:12 +01:00
|
|
|
|
|
|
|
os.system ("ip6tables -P INPUT ACCEPT")
|
2012-12-12 16:27:12 +01:00
|
|
|
os.system ("ip6tables -F")
|
|
|
|
os.system ("ip6tables -X")
|
|
|
|
os.system ("ip6tables -A INPUT -p tcp -i eth0 --dport 22 -j ACCEPT")
|
2012-12-13 10:29:53 +01:00
|
|
|
update_yml('22','TCP','a',True)
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
for i,port in enumerate (firewall['ipv4']['TCP']):
|
2012-12-12 11:50:07 +01:00
|
|
|
os.system ("iptables -A INPUT -p tcp -i eth0 --dport "+ str(port) +" -j ACCEPT")
|
2012-12-12 19:20:09 +01:00
|
|
|
print("Port "+str(port)+" on protocol TCP with ipv4 Open")
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
for i,port in enumerate (firewall['ipv4']['UDP']):
|
2012-12-12 11:50:07 +01:00
|
|
|
os.system ("iptables -A INPUT -p udp -i eth0 --dport "+ str(port) +" -j ACCEPT")
|
2012-12-12 19:20:09 +01:00
|
|
|
print("Port "+str(port)+" on protocol UDP with ipv4 Open")
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
for i,port in enumerate (firewall['ipv6']['TCP']):
|
2012-12-12 16:27:12 +01:00
|
|
|
os.system ("ip6tables -A INPUT -p tcp -i eth0 --dport "+ str(port) +" -j ACCEPT")
|
2012-12-12 19:20:09 +01:00
|
|
|
print("Port "+str(port)+" on protocol TCP with ipv6 Open")
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
for i,port in enumerate (firewall['ipv6']['UDP']):
|
2012-12-12 16:27:12 +01:00
|
|
|
os.system ("ip6tables -A INPUT -p udp -i eth0 --dport "+ str(port) +" -j ACCEPT")
|
2012-12-12 19:20:09 +01:00
|
|
|
print("Port "+str(port)+" on protocol UDP with ipv6 Open")
|
2012-12-12 17:15:12 +01:00
|
|
|
|
|
|
|
os.system ("iptables -P INPUT DROP")
|
|
|
|
os.system ("ip6tables -P INPUT DROP")
|
|
|
|
|
|
|
|
|
|
|
|
|
2012-12-13 10:29:53 +01:00
|
|
|
def update_yml(port=None,protocol=None,mode=None,ip=None):
|
2012-12-12 11:17:07 +01:00
|
|
|
'''
|
2012-12-12 17:15:12 +01:00
|
|
|
Append port in firewall.yml
|
|
|
|
'''
|
2012-12-13 10:29:53 +01:00
|
|
|
|
2012-12-12 11:17:07 +01:00
|
|
|
with open('firewall.yml','r') as f:
|
|
|
|
firewall = yaml.load(f)
|
2012-12-13 10:29:53 +01:00
|
|
|
if mode == 'a':
|
|
|
|
if int(port) not in firewall[ip][protocol]:
|
|
|
|
firewall[ip][protocol].append(int(port))
|
|
|
|
print("Port "+port+" on protocol "+protocol+" with "+ip+" Open")
|
|
|
|
else:
|
|
|
|
print("Port already open")
|
|
|
|
else:
|
|
|
|
if int(port) in firewall[ip][protocol]:
|
|
|
|
firewall[ip][protocol].remove(int(port))
|
|
|
|
print("Port "+port+" on protocol "+protocol+" with "+ip+" Close")
|
2012-12-12 17:27:26 +01:00
|
|
|
else:
|
2012-12-13 10:29:53 +01:00
|
|
|
print("Port already close")
|
2012-12-12 17:27:26 +01:00
|
|
|
firewall[ip][protocol].sort()
|
2012-12-12 17:15:12 +01:00
|
|
|
|
2012-12-12 11:17:07 +01:00
|
|
|
os.system("mv firewall.yml firewall.yml.old")
|
|
|
|
with open('firewall.yml','w') as f:
|
|
|
|
yaml.dump(firewall,f)
|
2012-12-13 10:29:53 +01:00
|
|
|
|
2012-12-12 11:17:07 +01:00
|
|
|
|
|
|
|
|
2012-12-12 16:27:12 +01:00
|
|
|
|