Skip to content
Toggle navigation
P
Projects
G
Groups
S
Snippets
Help
CIRCLE
/
cloud
This project
Loading...
Sign in
Toggle navigation
Go to a project
Project
Repository
Issues
94
Merge Requests
10
Pipelines
Wiki
Snippets
Members
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Commit
e26c3c37
authored
Sep 15, 2013
by
Őry Máté
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
firewall: random hotfixes by bd
parent
245a69f8
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
19 additions
and
3 deletions
+19
-3
firewall/fw.py
+16
-3
firewall/models.py
+1
-0
firewall/tasks.py
+2
-0
No files found.
firewall/fw.py
View file @
e26c3c37
...
@@ -139,7 +139,7 @@ class Firewall:
...
@@ -139,7 +139,7 @@ class Firewall:
self
.
iptables
(
'-N PUB_OUT'
)
self
.
iptables
(
'-N PUB_OUT'
)
self
.
iptables
(
'-A FORWARD -m set --match-set blacklist src,dst -j DROP'
)
self
.
iptables
(
'-A FORWARD -m set --match-set blacklist src,dst -j DROP'
)
self
.
iptables
(
'-A FORWARD -m state --state INVALID -g LOG_DROP'
)
#
self.iptables('-A FORWARD -m state --state INVALID -g LOG_DROP')
self
.
iptables
(
'-A FORWARD -m state --state ESTABLISHED,RELATED '
self
.
iptables
(
'-A FORWARD -m state --state ESTABLISHED,RELATED '
'-j ACCEPT'
)
'-j ACCEPT'
)
self
.
iptables
(
'-A FORWARD -p icmp --icmp-type echo-request '
self
.
iptables
(
'-A FORWARD -p icmp --icmp-type echo-request '
...
@@ -181,6 +181,8 @@ class Firewall:
...
@@ -181,6 +181,8 @@ class Firewall:
self
.
iptablesnat
(
':INPUT ACCEPT [0:0]'
)
self
.
iptablesnat
(
':INPUT ACCEPT [0:0]'
)
self
.
iptablesnat
(
':OUTPUT ACCEPT [1:708]'
)
self
.
iptablesnat
(
':OUTPUT ACCEPT [1:708]'
)
self
.
iptablesnat
(
':POSTROUTING ACCEPT [1:708]'
)
self
.
iptablesnat
(
':POSTROUTING ACCEPT [1:708]'
)
self
.
iptablesnat
(
'-A POSTROUTING -o pub -s 10.12.2.128/25 -j SNAT '
'--to-source 152.66.243.130'
)
# portforward
# portforward
for
host
in
self
.
hosts
.
exclude
(
pub_ipv4
=
None
):
for
host
in
self
.
hosts
.
exclude
(
pub_ipv4
=
None
):
...
@@ -212,10 +214,16 @@ class Firewall:
...
@@ -212,10 +214,16 @@ class Firewall:
# hard-wired rules
# hard-wired rules
self
.
iptablesnat
(
'-A POSTROUTING -s 10.5.0.0/16 -o vlan0003 -j SNAT '
self
.
iptablesnat
(
'-A POSTROUTING -s 10.5.0.0/16 -o vlan0003 -j SNAT '
'--to-source 10.3.255.254'
)
# man elerheto legyen
'--to-source 10.3.255.254'
)
# man elerheto legyen
self
.
iptablesnat
(
'-A POSTROUTING -o vlan0008 -j SNAT '
#
self.iptablesnat('-A POSTROUTING -o vlan0008 -j SNAT '
'--to-source 10.0.0.247'
)
# wolf network for printing
#
'--to-source 10.0.0.247') # wolf network for printing
self
.
iptablesnat
(
'-A POSTROUTING -s 10.3.0.0/16 -p udp --dport 53 -o vlan0002 -j SNAT '
self
.
iptablesnat
(
'-A POSTROUTING -s 10.3.0.0/16 -p udp --dport 53 -o vlan0002 -j SNAT '
'--to-source
%
s'
%
self
.
pub
.
ipv4
)
# kulonben nem megy a dns man-ban
'--to-source
%
s'
%
self
.
pub
.
ipv4
)
# kulonben nem megy a dns man-ban
self
.
iptablesnat
(
'-A PREROUTING -d 192.168.243.1/32 -j DNAT --to-destination 152.66.243.1'
)
self
.
iptablesnat
(
'-A PREROUTING -d 152.66.243.4/32 -j DNAT --to-destination 152.66.243.102'
)
self
.
iptablesnat
(
'-A PREROUTING -d 152.66.243.1/32 -p tcp --dport smtp -j DNAT --to-destination 152.66.243.102'
)
self
.
iptablesnat
(
'-A PREROUTING -d 152.66.243.1/32 -p tcp --dport smtps -j DNAT --to-destination 152.66.243.102'
)
self
.
iptablesnat
(
'-A PREROUTING -d 152.66.243.130/32 -p udp --dport 1194 -j DNAT --to-destination 10.12.255.253'
)
self
.
iptablesnat
(
'COMMIT'
)
self
.
iptablesnat
(
'COMMIT'
)
...
@@ -346,6 +354,8 @@ def ipv6_to_arpa(ipv6):
...
@@ -346,6 +354,8 @@ def ipv6_to_arpa(ipv6):
octets
.
insert
(
0
,
int
(
part
[
3
],
16
))
octets
.
insert
(
0
,
int
(
part
[
3
],
16
))
return
'.'
.
join
([
'
%1
x'
%
x
for
x
in
octets
])
+
'.ip6.arpa'
return
'.'
.
join
([
'
%1
x'
%
x
for
x
in
octets
])
+
'.ip6.arpa'
def
txt_to_octal
(
txt
):
return
'
\\
'
+
'
\\
'
.
join
([
'
%03
o'
%
ord
(
x
)
for
x
in
txt
])
# =fqdn:ip:ttl A, PTR
# =fqdn:ip:ttl A, PTR
# &fqdn:ip:x:ttl NS
# &fqdn:ip:x:ttl NS
...
@@ -354,6 +364,7 @@ def ipv6_to_arpa(ipv6):
...
@@ -354,6 +364,7 @@ def ipv6_to_arpa(ipv6):
# ^ PTR
# ^ PTR
# C CNAME
# C CNAME
# : generic
# : generic
# 'fqdn:s:ttl TXT
def
dns
():
def
dns
():
vlans
=
models
.
Vlan
.
objects
.
all
()
vlans
=
models
.
Vlan
.
objects
.
all
()
...
@@ -405,6 +416,8 @@ def dns():
...
@@ -405,6 +416,8 @@ def dns():
'ttl'
:
d
[
'ttl'
]})
'ttl'
:
d
[
'ttl'
]})
elif
d
[
'type'
]
==
'PTR'
:
elif
d
[
'type'
]
==
'PTR'
:
DNS
.
append
(
"^
%
s:
%
s:
%
s"
%
(
d
[
'name'
],
d
[
'address'
],
d
[
'ttl'
]))
DNS
.
append
(
"^
%
s:
%
s:
%
s"
%
(
d
[
'name'
],
d
[
'address'
],
d
[
'ttl'
]))
elif
d
[
'type'
]
==
'TXT'
:
DNS
.
append
(
"'
%
s:
%
s:
%
s"
%
(
d
[
'name'
],
txt_to_octal
(
d
[
'description'
]),
d
[
'ttl'
]))
return
DNS
return
DNS
process
=
subprocess
.
Popen
([
'/usr/bin/ssh'
,
'tinydns@
%
s'
%
process
=
subprocess
.
Popen
([
'/usr/bin/ssh'
,
'tinydns@
%
s'
%
...
...
firewall/models.py
View file @
e26c3c37
...
@@ -393,6 +393,7 @@ class Record(models.Model):
...
@@ -393,6 +393,7 @@ class Record(models.Model):
return
{
'name'
:
name
,
return
{
'name'
:
name
,
'type'
:
self
.
type
,
'type'
:
self
.
type
,
'ttl'
:
self
.
ttl
,
'ttl'
:
self
.
ttl
,
'description'
:
self
.
description
,
'address'
:
address
}
'address'
:
address
}
class
Blacklist
(
models
.
Model
):
class
Blacklist
(
models
.
Model
):
...
...
firewall/tasks.py
View file @
e26c3c37
...
@@ -34,6 +34,7 @@ class Periodic(PeriodicTask):
...
@@ -34,6 +34,7 @@ class Periodic(PeriodicTask):
if
cache
.
get
(
'dhcp_lock'
):
if
cache
.
get
(
'dhcp_lock'
):
cache
.
delete
(
"dhcp_lock"
)
cache
.
delete
(
"dhcp_lock"
)
reload_dhcp_task
.
delay
(
dhcp
())
reload_dhcp_task
.
delay
(
dhcp
())
reload_dhcp_task
.
apply_async
((
dhcp
(),
),
queue
=
'dhcp2'
)
print
"dhcp ujratoltese kesz"
print
"dhcp ujratoltese kesz"
if
cache
.
get
(
'firewall_lock'
):
if
cache
.
get
(
'firewall_lock'
):
...
@@ -41,6 +42,7 @@ class Periodic(PeriodicTask):
...
@@ -41,6 +42,7 @@ class Periodic(PeriodicTask):
ipv4
=
Firewall
()
.
get
()
ipv4
=
Firewall
()
.
get
()
ipv6
=
Firewall
(
True
)
.
get
()
ipv6
=
Firewall
(
True
)
.
get
()
reload_firewall_task
.
delay
(
ipv4
,
ipv6
)
reload_firewall_task
.
delay
(
ipv4
,
ipv6
)
reload_firewall_task
.
apply_async
((
ipv4
,
ipv6
),
queue
=
'firewall2'
)
print
"firewall ujratoltese kesz"
print
"firewall ujratoltese kesz"
if
cache
.
get
(
'blacklist_lock'
):
if
cache
.
get
(
'blacklist_lock'
):
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment