moulinette/yunohost_firewall.py

344 lines
8.5 KiB
Python
Raw Normal View History

2012-11-16 13:16:37 +01:00
# -*- coding: utf-8 -*-
2013-07-06 09:42:26 +02:00
""" License
Copyright (C) 2013 YunoHost
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published
by the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program; if not, see http://www.gnu.org/licenses
"""
""" yunohost_firewall.py
2013-07-06 10:17:16 +02:00
Manage firewall rules
2013-07-06 09:42:26 +02:00
"""
2012-11-16 13:16:37 +01:00
import os
import sys
2013-03-03 01:18:28 +01:00
try:
import miniupnpc
except ImportError:
sys.stderr.write('Error: Yunohost CLI Require miniupnpc lib\n')
sys.exit(1)
try:
import yaml
except ImportError:
sys.stderr.write('Error: Yunohost CLI Require yaml lib\n')
sys.stderr.write('apt-get install python-yaml\n')
sys.exit(1)
2012-12-18 00:28:03 +01:00
from yunohost import YunoHostError, win_msg
2012-11-16 13:16:37 +01:00
2012-12-12 17:15:12 +01:00
2013-03-09 13:01:54 +01:00
def firewall_allow(protocol=None, port=None, ipv6=None, upnp=False):
"""
2013-07-06 10:17:16 +02:00
Allow connection port/protocol
2012-12-18 00:40:13 +01:00
2013-07-06 10:17:16 +02:00
Keyword argument:
protocol -- Protocol associated with port
ipv6 -- ipv6
upnp -- upnp
2013-03-09 13:01:54 +01:00
port -- Port to open
2012-12-18 00:40:13 +01:00
"""
2013-03-09 13:01:54 +01:00
port = int(port)
if (upnp):
2013-04-13 12:21:49 +02:00
add_portmapping(protocol, upnp, ipv6,'a')
2013-03-09 13:01:54 +01:00
if 0 < port < 65536:
2012-12-18 00:40:13 +01:00
if protocol == "Both":
2013-03-09 13:01:54 +01:00
update_yml(port, 'TCP', 'a', ipv6)
update_yml(port, 'UDP', 'a', ipv6)
2012-12-18 00:40:13 +01:00
else:
2013-03-09 13:01:54 +01:00
update_yml(port, protocol, 'a', ipv6)
2012-12-18 00:40:13 +01:00
win_msg(_("Port successfully openned"))
else:
2013-03-09 13:01:54 +01:00
raise YunoHostError(22, _("Port not between 1 and 65535 : ")+ str(port))
2012-12-18 00:28:03 +01:00
2013-02-11 14:13:36 +01:00
return firewall_reload(upnp)
2013-03-09 13:01:54 +01:00
def firewall_disallow(protocol=None, port=None, ipv6=None, upnp=False):
"""
2013-07-06 10:17:16 +02:00
Disallow connection
2012-12-18 00:40:13 +01:00
2013-07-06 10:17:16 +02:00
Keyword argument:
protocol -- Protocol associated with port
ipv6 -- ipv6
upnp -- upnp
2013-03-09 13:01:54 +01:00
port -- Port to open
2012-12-18 00:40:13 +01:00
"""
2013-03-09 13:01:54 +01:00
port = int(port)
if protocol == "Both":
update_yml(port, 'TCP', 'r', ipv6)
update_yml(port, 'UDP', 'r', ipv6)
else:
2013-03-09 13:01:54 +01:00
update_yml(port, protocol, 'r', ipv6)
2012-12-13 11:25:47 +01:00
win_msg(_("Port successfully closed"))
2012-12-18 00:40:13 +01:00
2013-02-11 14:13:36 +01:00
return firewall_reload(upnp)
2013-03-09 13:01:54 +01:00
def firewall_list():
"""
2013-07-06 10:17:16 +02:00
List all firewall rules
2012-12-18 00:40:13 +01:00
"""
with open ('firewall.yml') as f:
2012-12-12 17:15:12 +01:00
firewall = yaml.load(f)
return firewall
def firewall_reload(upnp=False):
2013-07-06 09:53:43 +02:00
"""
2013-07-06 10:17:16 +02:00
Reload all firewall rules
2012-12-18 00:28:03 +01:00
2013-07-06 10:17:16 +02:00
Keyword argument:
upnp -- upnp
2012-12-18 00:28:03 +01:00
2013-07-06 09:53:43 +02:00
"""
2013-03-09 13:01:54 +01:00
with open('firewall.yml', 'r') as f:
firewall = yaml.load(f)
2012-12-12 17:15:12 +01:00
os.system ("iptables -P INPUT ACCEPT")
os.system ("iptables -F")
os.system ("iptables -X")
2013-04-10 12:19:23 +02:00
os.system ("iptables -A INPUT -m state --state ESTABLISHED -j ACCEPT")
2013-03-09 13:01:54 +01:00
if 22 not in firewall['ipv4']['TCP']:
2013-03-09 13:01:54 +01:00
update_yml(22, 'TCP', 'a', False)
2012-12-12 17:53:08 +01:00
2013-04-13 12:21:49 +02:00
if(os.path.exists("/proc/net/if_inet6")):
os.system ("ip6tables -P INPUT ACCEPT")
os.system ("ip6tables -F")
os.system ("ip6tables -X")
os.system ("ip6tables -A INPUT -m state --state ESTABLISHED -j ACCEPT")
2013-03-09 13:01:54 +01:00
if 22 not in firewall['ipv6']['TCP']:
update_yml(22, 'TCP', 'a', False)
2012-12-18 00:40:13 +01:00
2013-04-13 12:21:49 +02:00
if upnp:
remove_portmapping()
2013-07-06 09:53:43 +02:00
2013-04-13 12:21:49 +02:00
add_portmapping('TCP', upnp, False,'r');
add_portmapping('UDP', upnp, False,'r');
2013-07-06 09:53:43 +02:00
2013-04-13 12:21:49 +02:00
if(os.path.exists("/proc/net/if_inet6")):
add_portmapping('TCP', upnp, True,'r');
add_portmapping('UDP', upnp, True,'r');
2012-12-12 17:15:12 +01:00
2013-04-10 15:56:55 +02:00
os.system ("iptables -A INPUT -i lo -j ACCEPT")
os.system ("iptables -A INPUT -p icmp -j ACCEPT")
2012-12-12 17:15:12 +01:00
os.system ("iptables -P INPUT DROP")
2013-07-06 09:53:43 +02:00
2013-04-13 12:21:49 +02:00
if(os.path.exists("/proc/net/if_inet6")):
os.system ("ip6tables -A INPUT -i lo -j ACCEPT")
os.system ("ip6tables -A INPUT -p icmp -j ACCEPT")
os.system ("ip6tables -P INPUT DROP")
2012-12-18 00:40:13 +01:00
2013-04-13 12:21:49 +02:00
os.system("service fail2ban restart")
2012-12-13 11:25:47 +01:00
win_msg(_("Firewall successfully reloaded"))
2012-12-18 22:23:17 +01:00
2013-03-05 14:06:15 +01:00
return firewall_list()
2012-12-12 17:15:12 +01:00
2013-03-09 13:01:54 +01:00
def update_yml(port=None, protocol=None, mode=None, ipv6=None):
2012-12-18 00:40:13 +01:00
"""
Update firewall.yml
Keyword arguments:
protocol -- Protocol used
2012-12-18 00:40:13 +01:00
port -- Port to open
mode -- a=append r=remove
2012-12-18 00:40:13 +01:00
ipv6 -- Boolean ipv6
Return
None
"""
2013-03-09 13:01:54 +01:00
if ipv6: ip = 'ipv6'
else: ip = 'ipv4'
2012-12-18 00:28:03 +01:00
2013-03-09 13:01:54 +01:00
with open('firewall.yml', 'r') as f:
firewall = yaml.load(f)
2012-12-18 00:28:03 +01:00
if mode == 'a':
2012-12-18 00:28:03 +01:00
if port not in firewall[ip][protocol]:
firewall[ip][protocol].append(port)
else:
2013-03-09 13:01:54 +01:00
raise YunoHostError(22,_("Port already openned :")+ str(port))
2012-12-18 00:28:03 +01:00
else:
2012-12-18 00:28:03 +01:00
if port in firewall[ip][protocol]:
firewall[ip][protocol].remove(port)
2012-12-12 17:27:26 +01:00
else:
2013-03-09 13:01:54 +01:00
raise YunoHostError(22,_("Port already closed :")+ str(port))
2012-12-18 00:28:03 +01:00
firewall[ip][protocol].sort()
2012-12-12 17:15:12 +01:00
os.system("mv firewall.yml firewall.yml.old")
2012-12-18 22:23:17 +01:00
2013-03-09 13:01:54 +01:00
with open('firewall.yml', 'w') as f:
yaml.dump(firewall, f)
2013-04-13 12:21:49 +02:00
def add_portmapping(protocol=None, upnp=False, ipv6=None,mode=None,):
2013-03-09 13:01:54 +01:00
"""
2013-02-11 14:13:36 +01:00
Send a port mapping rules to igd device
Keyword arguments:
protocol -- Protocol used
2013-04-13 12:21:49 +02:00
upnp -- Boolean upnp
ipv6 -- Boolean ipv6
mode -- Add a rule (a) or reload all rules (r)
2013-02-11 14:13:36 +01:00
Return
None
"""
2013-04-10 13:46:41 +02:00
if ipv6:
os.system ("ip6tables -P INPUT ACCEPT")
else:
os.system ("iptables -P INPUT ACCEPT")
2013-04-13 12:21:49 +02:00
if upnp and mode=='a':
remove_portmapping()
2013-07-06 09:53:43 +02:00
2013-03-09 13:01:54 +01:00
if ipv6: ip = 'ipv6'
else: ip = 'ipv4'
with open('firewall.yml', 'r') as f:
firewall = yaml.load(f)
for i,port in enumerate (firewall[ip][protocol]):
2013-04-10 13:46:41 +02:00
if ipv6:
os.system ("ip6tables -A INPUT -p "+ protocol +" -i eth0 --dport "+ str(port) +" -j ACCEPT")
else:
os.system ("iptables -A INPUT -p "+ protocol +" -i eth0 --dport "+ str(port) +" -j ACCEPT")
if upnp:
2013-04-13 12:21:49 +02:00
upnpc = miniupnpc.UPnP()
upnpc.discoverdelay = 200
nbigd = upnpc.discover()
if nbigd:
upnpc.selectigd()
upnpc.addportmapping(port, protocol, upnpc.lanaddr, port, 'yunohost firewall : port %u' % port, '')
2013-02-11 14:13:36 +01:00
2013-03-09 12:21:14 +01:00
os.system ("iptables -P INPUT DROP")
2013-03-11 23:07:16 +01:00
2013-04-13 12:21:49 +02:00
def remove_portmapping():
"""
Remove all portmapping rules in the igd device
Keyword arguments:
None
Return
None
"""
upnp = miniupnpc.UPnP()
upnp.discoverdelay = 200
nbigd = upnp.discover()
if nbigd:
try:
upnp.selectigd()
except:
firewall_reload(False)
raise YunoHostError(167,_("No upnp devices found"))
else:
firewall_reload(False)
raise YunoHostError(22,_("Can't connect to the igd device"))
# list the redirections :
for i in xrange(100):
p = upnp.getgenericportmapping(i)
if p is None: break
upnp.deleteportmapping(p[0], p[1])
2013-07-06 09:53:43 +02:00
2013-03-11 23:07:16 +01:00
def firewall_installupnp():
"""
Add upnp cron
2013-07-06 10:17:16 +02:00
2013-03-11 23:07:16 +01:00
"""
2013-07-06 09:53:43 +02:00
2013-04-09 22:25:43 +02:00
with open('firewall.yml', 'r') as f:
firewall = yaml.load(f)
firewall['UPNP']=True;
2013-03-11 23:07:16 +01:00
os.system("touch /etc/cron.d/yunohost-firewall")
os.system("echo '*/50 * * * * root yunohost firewall reload -u>>/dev/null'>/etc/cron.d/yunohost-firewall")
2013-03-13 13:32:40 +01:00
win_msg(_("UPNP cron installed"))
2013-03-13 09:34:29 +01:00
2013-04-09 22:25:43 +02:00
os.system("mv firewall.yml firewall.yml.old")
with open('firewall.yml', 'w') as f:
yaml.dump(firewall, f)
2013-03-11 23:07:16 +01:00
def firewall_removeupnp():
2013-03-15 14:28:52 +01:00
"""
Remove upnp cron
2013-07-06 10:17:16 +02:00
2013-03-15 14:28:52 +01:00
"""
2013-04-09 22:25:43 +02:00
with open('firewall.yml', 'r') as f:
firewall = yaml.load(f)
firewall['UPNP']=False;
2013-03-15 14:28:52 +01:00
2013-03-13 13:32:40 +01:00
try:
os.remove("/etc/cron.d/yunohost-firewall")
except:
raise YunoHostError(167,_("UPNP cron was not installed!"))
2013-04-09 22:25:43 +02:00
2013-03-13 13:32:40 +01:00
win_msg(_("UPNP cron removed"))
2013-03-15 14:18:30 +01:00
2013-04-09 22:25:43 +02:00
os.system("mv firewall.yml firewall.yml.old")
with open('firewall.yml', 'w') as f:
yaml.dump(firewall, f)
2013-04-09 22:34:33 +02:00
def firewall_checkupnp():
2013-04-09 22:25:43 +02:00
"""
2013-07-06 10:17:16 +02:00
check if UPNP is install or not (0 yes 1 no)
2013-04-09 22:25:43 +02:00
"""
with open('firewall.yml', 'r') as f:
firewall = yaml.load(f)
2013-07-06 09:53:43 +02:00
2013-04-09 22:25:43 +02:00
if firewall['UPNP']:
win_msg(_("UPNP is activated"))
else:
raise YunoHostError(167,_("UPNP not activated!"))
2013-03-15 14:18:30 +01:00
def firewall_stop():
2013-03-15 14:28:52 +01:00
"""
2013-07-06 10:17:16 +02:00
Stop iptables and ip6tables
2013-03-15 14:28:52 +01:00
"""
2013-03-15 14:18:30 +01:00
os.system ("iptables -P INPUT ACCEPT")
os.system ("iptables -F")
os.system ("iptables -X")
2013-07-06 09:53:43 +02:00
2013-03-15 14:18:30 +01:00
os.system ("ip6tables -P INPUT ACCEPT")
os.system ("ip6tables -F")
os.system ("ip6tables -X")
2013-04-09 22:25:43 +02:00
if(os.path.exists("/etc/cron.d/yunohost-firewall")):
firewall_removeupnp()
2013-03-15 14:20:12 +01:00