new services

This commit is contained in:
Jörg Thalheim 2015-03-29 11:13:01 +00:00
parent a7d20af5ad
commit 7dbad8f884
9 changed files with 84 additions and 49 deletions

View File

@ -1,7 +1,9 @@
@def $subnet = 10.100.0.0/16;
@def $subnet = 192.168.66.0/24;
@def $bridge = br0;
@def $evenet = evenet;
@def $internet = "enp2s0";
@def $wanip = `ip a s enp2s0 | awk '{if($0 ~ "inet "){split($2,a,"/");print a[1]}}'`;
@def $public_ipv4 = `ip a s enp2s0 | awk '$0 ~ "inet " { split($2,a,"/"); print a[1] }'`;
@def $public_ipv6 = `ip a s enp2s0 | awk '$0 ~ "inet6 " && !($2 ~ /^fe80/) { split($2,a,"/"); print a[1] }'`;
include 'ferm.d/functions';
include `find ferm.d/services/*`;
@ -16,6 +18,10 @@ domain (ip ip6) {
table filter {
chain FORWARD {
interface $bridge protocol tcp dport smtp REJECT reject-with tcp-reset;
# dn42 -> is filtered in dn42 container
interface $evenet outerface $evenet ACCEPT;
interface $bridge outerface $internet ACCEPT;
}
chain (INPUT FORWARD) {
@ -23,8 +29,9 @@ domain (ip ip6) {
interface lo ACCEPT;
protocol icmp ACCEPT;
mod conntrack ctstate (RELATED ESTABLISHED) ACCEPT;
LOG log-prefix "iptables reject:";
protocol tcp REJECT reject-with tcp-reset;
protocol udp REJECT reject-with icmp-port-unreachable;
REJECT reject-with icmp-port-unreachable;
}
chain OUTPUT policy ACCEPT;

View File

@ -1,62 +1,61 @@
# Allow connections to public ports on the host
@def &allow_local($proto, $port) = {
domain (ip ip6) table filter chain INPUT protocol $proto dport $port ACCEPT;
domain (ip ip6) table filter chain INPUT protocol $proto dport $port ACCEPT;
}
# Defines a service residing in a given container
@def &def_service($service, $container, $proto, $port) = {
# look up IP addresses of the container
@def $ip4 = @resolve($container, A);
@def $ip6 = @resolve($container, AAAA);
# look up IP addresses of the container
@def $ip4 = @resolve($container, A);
@def $ip6 = @resolve($container, AAAA);
# chain to allow forwarding to the service
domain (ip ip6) table filter chain @cat("allow_", $service) daddr @ipfilter(($ip4 $ip6)) protocol $proto dport $port ACCEPT;
# chain to allow forwarding to the service
domain (ip ip6) table filter chain @cat("allow_", $service) daddr @ipfilter(($ip4 $ip6)) protocol $proto dport $port ACCEPT;
# chain to do the DNAT to change the address / port to the one of the container / service
domain ip table nat chain @cat("fwd_to_", $service) protocol $proto DNAT to "$ip4:$port";
domain ip6 table nat chain @cat("fwd_to_", $service) protocol $proto DNAT to "[$ip6]:$port";
# chain to do the DNAT to change the address / port to the one of the container / service
domain ip table nat chain @cat("fwd_to_", $service) protocol $proto DNAT to "$ip4:$port";
domain ip6 table nat chain @cat("fwd_to_", $service) protocol $proto DNAT to "[$ip6]:$port";
}
# Forwards a public port to the given service
@def &forward_to_service($service, $proto, $port) = {
domain (ip ip6) {
# allow forwarding to the service
table filter chain FORWARD jump @cat("allow_", $service);
domain (ip ip6) {
# allow forwarding to the service
table filter chain FORWARD jump @cat("allow_", $service);
table nat {
# change destination address / port to the one of the container / service
chain PREROUTING interface $internet protocol $proto dport $port jump @cat("fwd_to_", $service);
}
}
table nat {
# change destination address / port to the one of the container / service
chain PREROUTING interface $internet protocol $proto dport $port jump @cat("fwd_to_", $service);
}
}
}
# Allows connection from the given container to the specified service (which resides in another container)
@def &allow_service_for($service, $container) = {
@def $ip4 = @resolve($container, A);
@def $ip6 = @resolve($container, AAAA);
domain (ip ip6) table filter chain FORWARD saddr @ipfilter(($ip4 $ip6)) jump @cat("allow_", $service);
@def $ip4 = @resolve($container, A);
@def $ip6 = @resolve($container, AAAA);
domain (ip ip6) table filter chain FORWARD saddr @ipfilter(($ip4 $ip6)) jump @cat("allow_", $service);
}
# Allows connection a specific service to all containers
@def &allow_service_for_all($service) = {
domain (ip ip6) table filter chain FORWARD interface $bridge jump @cat("allow_", $service);
domain (ip ip6) table filter chain FORWARD interface $bridge jump @cat("allow_", $service);
}
# ----------------
# currently unused
@def &forward_to($container, $proto, $port) = {
# look up IP addresses of the container
@def $ip4 = @resolve($container, A);
@def $ip6 = @resolve($container, AAAA);
# look up IP addresses of the container
@def $ip4 = @resolve($container, A);
@def $ip6 = @resolve($container, AAAA);
domain (ip ip6) {
# allow forwarding to container
table filter chain FORWARD daddr @ipfilter(($ip4 $ip6)) protocol $proto dport $port ACCEPT;
domain (ip ip6) {
# allow forwarding to container
table filter chain FORWARD daddr @ipfilter(($ip4 $ip6)) protocol $proto dport $port ACCEPT;
# change destination address to the containers one
table nat chain PREROUTING interface $internet protocol $proto dport $port DNAT to @ipfilter($ip4 $ip6);
}
# change destination address to the containers one
table nat chain PREROUTING interface $internet protocol $proto dport $port DNAT to @ipfilter($ip4 $ip6);
}
}

View File

@ -1,6 +1,9 @@
&def_service(web, web, tcp, 80);
&def_service(webs, web, tcp, 443);
&allow_service_for_all(web);
&allow_service_for_all(webs);
&forward_to_service(web, tcp, 80);
&forward_to_service(webs, tcp, 443);
&allow_service_for(ldap, web);

View File

@ -1,6 +1,10 @@
# IKE negotiations
&def_service(ike, dn42, udp, 500);
&forward_to_service(ike, udp, 500);
# ESP encrypton and authentication
&def_service(esp, dn42, udp, 50);
&forward_to_service(esp, udp, 50);
@def $dn42_ip4 = @resolve(dn42, A);
@def $dn42_ip6 = @resolve(dn42, AAAA);
domain (ip ip6) table filter chain FORWARD proto udp dport 5001:5020 daddr @ipfilter(($dn42_ip4 $dn42_ip6)) interface $bridge ACCEPT;
domain (ip ip6) table nat chain PREROUTING interface $internet proto udp dport 5001:5020 DNAT to @ipfilter(($dn42_ip4 $dn42_ip6));
# tinc
&def_service(evenet, dn42, udp, 666);
&forward_to_service(evenet, udp, 666);
&def_service(evenet, dn42, tcp, 666);
&forward_to_service(evenet, tcp, 666);

View File

@ -1,10 +1,18 @@
&def_service(dns, dns, udp, 53);
&def_service(dns-pub, dns, udp, 5353);
&def_service(dnsweb, dns, tcp, 80);
&forward_to_service(dns-pub, udp, 53);
&def_service(dns2, dns, tcp, 53);
#&def_service(dns, dns1.evenet.dn42, udp, 53);
&forward_to_service(dns, udp, 53);
&forward_to_service(dns2, tcp, 53);
&allow_service_for_all(dns);
&allow_service_for_all(dns);
&allow_service_for(dnsweb, web);
&allow_service_for(postgres, dns);
&allow_service_for_all(dns2);
chain FORWARD interface $evenet mod pkttype pkt-type (broadcast multicast) ACCEPT;
# chain to allow forwarding to the service
domain ip table filter chain FORWARD {
@def $dns1_ip4 = @resolve(dns1.evenet.dn42, A);
@def $dns2_ip4 = @resolve(dns2.evenet.dn42, A);
@def $ns1_ip4 = @resolve(ns1.evenet.dn42, A);
@def $ns2_ip4 = @resolve(ns2.evenet.dn42, A);
daddr ($dns1_ip4 $dns2_ip4 $ns1_ip4 $ns2_ip4) protocol udp dport 53 ACCEPT;
}

View File

@ -1,3 +1,11 @@
@def $git_ip4 = @resolve(git, A);
@def $git_ip6 = @resolve(git, AAAA);
@def $web_ip4 = @resolve(web, A);
@def $web_ip6 = @resolve(web, AAAA);
# git.higgsboson.tk points to web
# therefore DNAT port ssh back to git
domain (ip ip6) table nat chain PREROUTING daddr @ipfilter(($web_ip4 $web_ip6)) proto tcp dport ssh DNAT to @ipfilter(($git_ip4 $git_ip6));
&def_service(git, git, tcp, 9000);
&allow_service_for(git, web);
&allow_service_for(postgres, git);

2
services/45-halfcode Normal file
View File

@ -0,0 +1,2 @@
&def_service(halfcode, halfcode, tcp, 9000);
&allow_service_for(halfcode, web);

2
services/45-phonefinder Normal file
View File

@ -0,0 +1,2 @@
&def_service(phonefinder, phonefinder, tcp, 9000);
&allow_service_for(phonefinder, web);

2
services/70-terraria Normal file
View File

@ -0,0 +1,2 @@
&def_service(terraria, terraria, tcp, 37757);
&forward_to_service(terraria, tcp, 37757);