1 Testing zone helper assignments
5 include("./root/usr/share/firewall4/main.uc", {
6 getenv: function(varname) {
16 -- File fs/open~_sys_class_net_zone1_flags.txt --
20 -- File fs/open~_sys_class_net_zone2_flags.txt --
24 -- File fs/open~_sys_class_net_zone3_flags.txt --
28 -- File fs/open~_sys_class_net_zone4_flags.txt --
32 -- File fs/open~_sys_class_net_zone5_flags.txt --
36 -- File uci/firewall.json --
40 ".description": "Setting masq to true for a zone with a helper should emit a helper chain for the zone with the configured helper",
47 ".description": "Setting masq6 to true for a zone with a helper should emit a helper chain for the zone with the configured helper",
54 ".description": "Disabling both masq and masq6 for a zone with a helper should emit a helper chain for the zone with the configured helper",
62 ".description": "Disabling both masq and masq6 for a zone with a helper should configure default helper assignment",
69 ".description": "Specifying an invalid helper should write a warning to stderr",
94 define test1_devices = { "zone1" }
95 define test2_devices = { "zone2" }
96 define test3_devices = { "zone3" }
97 define test4_devices = { "zone4" }
103 include "/etc/nftables.d/*.nft"
111 type filter hook input priority filter; policy drop;
113 iifname "lo" accept comment "!fw4: Accept traffic from loopback"
115 ct state established,related accept comment "!fw4: Allow inbound established and related flows"
116 iifname "zone1" jump input_test1 comment "!fw4: Handle test1 IPv4/IPv6 input traffic"
117 iifname "zone2" jump input_test2 comment "!fw4: Handle test2 IPv4/IPv6 input traffic"
118 iifname "zone3" jump input_test3 comment "!fw4: Handle test3 IPv4/IPv6 input traffic"
119 iifname "zone4" jump input_test4 comment "!fw4: Handle test4 IPv4/IPv6 input traffic"
123 type filter hook forward priority filter; policy drop;
125 ct state established,related accept comment "!fw4: Allow forwarded established and related flows"
126 iifname "zone1" jump forward_test1 comment "!fw4: Handle test1 IPv4/IPv6 forward traffic"
127 iifname "zone2" jump forward_test2 comment "!fw4: Handle test2 IPv4/IPv6 forward traffic"
128 iifname "zone3" jump forward_test3 comment "!fw4: Handle test3 IPv4/IPv6 forward traffic"
129 iifname "zone4" jump forward_test4 comment "!fw4: Handle test4 IPv4/IPv6 forward traffic"
133 type filter hook output priority filter; policy drop;
135 oifname "lo" accept comment "!fw4: Accept traffic towards loopback"
137 ct state established,related accept comment "!fw4: Allow outbound established and related flows"
138 oifname "zone1" jump output_test1 comment "!fw4: Handle test1 IPv4/IPv6 output traffic"
139 oifname "zone2" jump output_test2 comment "!fw4: Handle test2 IPv4/IPv6 output traffic"
140 oifname "zone3" jump output_test3 comment "!fw4: Handle test3 IPv4/IPv6 output traffic"
141 oifname "zone4" jump output_test4 comment "!fw4: Handle test4 IPv4/IPv6 output traffic"
144 chain handle_reject {
145 meta l4proto tcp reject with tcp reset comment "!fw4: Reject TCP traffic"
146 reject with icmpx type port-unreachable comment "!fw4: Reject any other traffic"
157 chain forward_test1 {
161 chain drop_from_test1 {
162 iifname "zone1" counter drop comment "!fw4: drop test1 IPv4/IPv6 traffic"
165 chain drop_to_test1 {
166 oifname "zone1" counter drop comment "!fw4: drop test1 IPv4/IPv6 traffic"
177 chain forward_test2 {
181 chain drop_from_test2 {
182 iifname "zone2" counter drop comment "!fw4: drop test2 IPv4/IPv6 traffic"
185 chain drop_to_test2 {
186 oifname "zone2" counter drop comment "!fw4: drop test2 IPv4/IPv6 traffic"
197 chain forward_test3 {
201 chain drop_from_test3 {
202 iifname "zone3" counter drop comment "!fw4: drop test3 IPv4/IPv6 traffic"
205 chain drop_to_test3 {
206 oifname "zone3" counter drop comment "!fw4: drop test3 IPv4/IPv6 traffic"
217 chain forward_test4 {
221 chain drop_from_test4 {
222 iifname "zone4" counter drop comment "!fw4: drop test4 IPv4/IPv6 traffic"
225 chain drop_to_test4 {
226 oifname "zone4" counter drop comment "!fw4: drop test4 IPv4/IPv6 traffic"
235 type nat hook prerouting priority dstnat; policy accept;
239 type nat hook postrouting priority srcnat; policy accept;
240 oifname "zone1" jump srcnat_test1 comment "!fw4: Handle test1 IPv4/IPv6 srcnat traffic"
241 oifname "zone2" jump srcnat_test2 comment "!fw4: Handle test2 IPv4/IPv6 srcnat traffic"
245 meta nfproto ipv4 masquerade comment "!fw4: Masquerade IPv4 test1 traffic"
249 meta nfproto ipv6 masquerade comment "!fw4: Masquerade IPv6 test2 traffic"
254 # Raw rules (notrack & helper)
257 chain raw_prerouting {
258 type filter hook prerouting priority raw; policy accept;
259 iifname "zone1" jump helper_test1 comment "!fw4: test1 IPv4/IPv6 CT helper assignment"
260 iifname "zone2" jump helper_test2 comment "!fw4: test2 IPv4/IPv6 CT helper assignment"
261 iifname "zone3" jump helper_test3 comment "!fw4: test3 IPv4/IPv6 CT helper assignment"
262 iifname "zone4" jump helper_test4 comment "!fw4: test4 IPv4/IPv6 CT helper assignment"
266 type filter hook output priority raw; policy accept;
270 type "amanda" protocol udp;
274 type "ftp" protocol tcp;
278 type "RAS" protocol udp;
282 type "Q.931" protocol tcp;
286 type "irc" protocol tcp;
289 ct helper netbios-ns {
290 type "netbios-ns" protocol udp;
294 type "pptp" protocol tcp;
298 type "sane" protocol tcp;
302 type "sip" protocol udp;
306 type "snmp" protocol udp;
310 type "tftp" protocol udp;
314 type "rtsp" protocol tcp;
318 meta l4proto udp udp dport 69 ct helper set "tftp" comment "!fw4: TFTP connection tracking"
322 meta l4proto udp udp dport 69 ct helper set "tftp" comment "!fw4: TFTP connection tracking"
326 meta l4proto udp udp dport 69 ct helper set "tftp" comment "!fw4: TFTP connection tracking"
330 meta l4proto udp udp dport 10080 ct helper set "amanda" comment "!fw4: Amanda backup and archiving proto"
331 meta l4proto tcp tcp dport 21 ct helper set "ftp" comment "!fw4: FTP passive connection tracking"
332 meta l4proto udp udp dport 1719 ct helper set "RAS" comment "!fw4: RAS proto tracking"
333 meta l4proto tcp tcp dport 1720 ct helper set "Q.931" comment "!fw4: Q.931 proto tracking"
334 meta nfproto ipv4 meta l4proto tcp tcp dport 6667 ct helper set "irc" comment "!fw4: IRC DCC connection tracking"
335 meta nfproto ipv4 meta l4proto udp udp dport 137 ct helper set "netbios-ns" comment "!fw4: NetBIOS name service broadcast tracking"
336 meta nfproto ipv4 meta l4proto tcp tcp dport 1723 ct helper set "pptp" comment "!fw4: PPTP VPN connection tracking"
337 meta l4proto tcp tcp dport 6566 ct helper set "sane" comment "!fw4: SANE scanner connection tracking"
338 meta l4proto udp udp dport 5060 ct helper set "sip" comment "!fw4: SIP VoIP connection tracking"
339 meta nfproto ipv4 meta l4proto udp udp dport 161 ct helper set "snmp" comment "!fw4: SNMP monitoring connection tracking"
340 meta l4proto udp udp dport 69 ct helper set "tftp" comment "!fw4: TFTP connection tracking"
341 meta nfproto ipv4 meta l4proto tcp tcp dport 554 ct helper set "rtsp" comment "!fw4: RTSP connection tracking"
349 chain mangle_prerouting {
350 type filter hook prerouting priority mangle; policy accept;
353 chain mangle_postrouting {
354 type filter hook postrouting priority mangle; policy accept;
358 type filter hook input priority mangle; policy accept;
361 chain mangle_output {
362 type route hook output priority mangle; policy accept;
365 chain mangle_forward {
366 type filter hook forward priority mangle; policy accept;
372 [!] Section @zone[4] (test5) option 'helper' specifies invalid value 'foo'
373 [!] Section @zone[4] (test5) skipped due to invalid options