Home | History | Annotate | Line # | Download | only in libexec
      1   1.1  christos #!/bin/sh
      2   1.1  christos #echo "run $@" 1>&2
      3   1.1  christos #set -x
      4   1.1  christos # $1 command
      5   1.1  christos # $2 rulename
      6   1.1  christos # $3 protocol
      7   1.1  christos # $4 address
      8   1.1  christos # $5 mask
      9   1.1  christos # $6 port
     10   1.1  christos # $7 id
     11   1.1  christos 
     12   1.1  christos pf=
     13   1.1  christos if [ -f "/etc/ipfw-blocklist.rc" ]; then
     14   1.1  christos 	pf="ipfw"
     15   1.1  christos 	. /etc/ipfw-blocklist.rc
     16   1.1  christos 	ipfw_offset=${ipfw_offset:-2000}
     17   1.7  christos fi
     18   1.7  christos 
     19   1.7  christos if [ -z "$pf" ]; then
     20  1.10  christos 	for f in npf pf ipfilter ipfw; do
     21  1.10  christos 		if [ -x /etc/rc.d/$f ]; then
     22  1.10  christos 			if /etc/rc.d/$f status >/dev/null 2>&1; then
     23  1.10  christos 				pf="$f"
     24  1.10  christos 				break
     25  1.10  christos 			fi
     26  1.10  christos 		elif [ -f "/etc/$f.conf" ]; then
     27  1.10  christos 			# xxx assume a config file means it can be enabled --
     28  1.10  christos 			# and the first one wins!
     29   1.1  christos 			pf="$f"
     30   1.1  christos 			break
     31   1.1  christos 		fi
     32   1.1  christos 	done
     33   1.1  christos fi
     34   1.1  christos 
     35   1.2  christos if [ -z "$pf" -a -x "/sbin/iptables" ]; then
     36   1.2  christos 	pf="iptables"
     37   1.2  christos fi
     38   1.2  christos 
     39   1.1  christos if [ -z "$pf" ]; then
     40   1.1  christos 	echo "$0: Unsupported packet filter" 1>&2
     41   1.1  christos 	exit 1
     42   1.1  christos fi
     43   1.1  christos 
     44   1.2  christos flags=
     45   1.1  christos if [ -n "$3" ]; then
     46   1.2  christos 	raw_proto="$3"
     47   1.1  christos 	proto="proto $3"
     48   1.2  christos 	if [ $3 = "tcp" ]; then
     49   1.2  christos 		flags="flags S/SAFR"
     50   1.2  christos 	fi
     51   1.1  christos fi
     52   1.1  christos 
     53   1.1  christos if [ -n "$6" ]; then
     54   1.2  christos 	raw_port="$6"
     55   1.1  christos 	port="port $6"
     56   1.1  christos fi
     57   1.1  christos 
     58   1.1  christos addr="$4"
     59   1.1  christos mask="$5"
     60   1.1  christos case "$4" in
     61   1.1  christos ::ffff:*.*.*.*)
     62   1.1  christos 	if [ "$5" = 128 ]; then
     63   1.1  christos 		mask=32
     64   1.1  christos 		addr=${4#::ffff:}
     65   1.1  christos 	fi;;
     66   1.1  christos esac
     67   1.1  christos 
     68   1.1  christos case "$1" in
     69   1.1  christos add)
     70   1.1  christos 	case "$pf" in
     71  1.10  christos 	ipfilter)
     72   1.2  christos 		# N.B.:  If you reload /etc/ipf.conf then you need to stop and
     73  1.10  christos 		# restart blocklistd (and make sure blocklistd_flags="-r").
     74  1.10  christos 		# This should normally already be implemented in
     75  1.10  christos 		# /etc/rc.d/ipfilter, but if then not add the following lines to
     76  1.10  christos 		# the end of the ipfilter_reload() function:
     77  1.10  christos 		#
     78  1.10  christos 		#	if checkyesnox blocklistd; then
     79  1.10  christos 		#		/etc/rc.d/blocklistd restart
     80  1.10  christos 		#	fi
     81   1.2  christos 		#
     82   1.2  christos 		# XXX we assume the following rule is present in /etc/ipf.conf:
     83  1.10  christos 		# (should we check? -- it probably cannot be added dynamically)
     84   1.2  christos 		#
     85   1.2  christos 		#	block in proto tcp/udp from any to any head blocklistd
     86   1.2  christos 		#
     87   1.2  christos 		# where "blocklistd" is the default rulename (i.e. "$2")
     88   1.2  christos 		#
     89   1.2  christos 		# This rule can come before any rule that logs connections,
     90   1.2  christos 		# etc., and should be followed by final rules such as:
     91   1.2  christos 		#
     92   1.2  christos 		#	# log all as-yet unblocked incoming TCP connection
     93   1.2  christos 		#	# attempts
     94   1.2  christos 		#	log in proto tcp from any to any flags S/SAFR
     95   1.2  christos 		#	# last "pass" match wins for all non-blocked packets
     96   1.2  christos 		#	pass in all
     97   1.2  christos 		#	pass out all
     98   1.2  christos 		#
     99   1.2  christos 		# I.e. a "pass" rule which will be the final match and override
    100   1.2  christos 		# the "block".  This way the rules added by blocklistd will
    101   1.2  christos 		# actually block packets, and prevent logging of them as
    102   1.2  christos 		# connections, because they include the "quick" flag.
    103   1.2  christos 		#
    104  1.10  christos 		# N.b.:  $port is not included/used in rules -- abusers are cut
    105  1.10  christos 		# off completely from all services!
    106   1.2  christos 		#
    107   1.2  christos 		# Note RST packets are not returned for blocked SYN packets of
    108   1.2  christos 		# active attacks, so the port will not appear to be closed.
    109   1.2  christos 		# This will probably give away the fact that a firewall has been
    110   1.2  christos 		# triggered to block connections, but it prevents generating
    111   1.2  christos 		# extra outbound traffic, and it may also slow down the attacker
    112   1.2  christos 		# somewhat.
    113   1.2  christos 		#
    114   1.2  christos 		# Note also that we don't block all packets, just new attempts
    115   1.2  christos 		# to open connections (see $flags above).  This allows us to do
    116   1.2  christos 		# counterespionage against the attacker (or continue to make use
    117   1.2  christos 		# of any other services that might be on the same subnet as the
    118  1.10  christos 		# supposed attacker).  However it does not kill any active
    119  1.10  christos 		# connections -- we rely on the reporting daemon to do its own
    120  1.10  christos 		# protection and cleanup.
    121   1.2  christos 		#
    122  1.10  christos 		# N.B.:  The rule generated here must exactly match the
    123  1.10  christos 		# corresponding rule generated for the "rem" command below!
    124   1.2  christos 		#
    125   1.2  christos 		echo block in log quick $proto \
    126   1.9  christos 		    from $addr/$mask to any $flags group $2 | \
    127   1.2  christos 		    /sbin/ipf -A -f - >/dev/null 2>&1 && echo OK
    128   1.1  christos 		;;
    129   1.2  christos 
    130   1.1  christos 	ipfw)
    131   1.1  christos 		# use $ipfw_offset+$port for rule number
    132   1.1  christos 		rule=$(($ipfw_offset + $6))
    133   1.1  christos 		tname="port$6"
    134   1.1  christos 		/sbin/ipfw table $tname create type addr 2>/dev/null
    135   1.1  christos 		/sbin/ipfw -q table $tname add "$addr/$mask"
    136   1.1  christos 		# if rule number $rule does not already exist, create it
    137   1.1  christos 		/sbin/ipfw show $rule >/dev/null 2>&1 || \
    138   1.1  christos 			/sbin/ipfw add $rule drop $3 from \
    139   1.1  christos 			table"("$tname")" to any dst-port $6 >/dev/null && \
    140   1.1  christos 			echo OK
    141   1.1  christos 		;;
    142   1.2  christos 
    143   1.2  christos 	iptables)
    144   1.2  christos 		if ! /sbin/iptables --list "$2" >/dev/null 2>&1; then
    145   1.2  christos 			/sbin/iptables --new-chain "$2"
    146   1.2  christos 		fi
    147   1.2  christos 		/sbin/iptables --append INPUT --proto "$raw_proto" \
    148   1.2  christos 		    --dport "$raw_port" --jump "$2"
    149   1.2  christos 		/sbin/iptables --append "$2" --proto "$raw_proto" \
    150   1.2  christos 		    --source "$addr/$mask" --dport "$raw_port" --jump DROP
    151   1.2  christos 		echo OK
    152   1.2  christos 		;;
    153   1.2  christos 
    154   1.1  christos 	npf)
    155   1.1  christos 		/sbin/npfctl rule "$2" add block in final $proto from \
    156   1.1  christos 		    "$addr/$mask" to any $port
    157   1.1  christos 		;;
    158   1.2  christos 
    159   1.1  christos 	pf)
    160   1.1  christos 		# if the filtering rule does not exist, create it
    161   1.1  christos 		/sbin/pfctl -a "$2/$6" -sr 2>/dev/null | \
    162   1.1  christos 		    grep -q "<port$6>" || \
    163   1.1  christos 		    echo "block in quick $proto from <port$6> to any $port" | \
    164   1.1  christos 		    /sbin/pfctl -a "$2/$6" -f -
    165   1.1  christos 		# insert $ip/$mask into per-protocol/port anchored table
    166   1.4  christos 		/sbin/pfctl -qa "$2/$6" -t "port$6" -T add "$addr/$mask" && \
    167   1.5  christos 		    /sbin/pfctl -qk "$addr" && echo OK
    168   1.1  christos 		;;
    169   1.2  christos 
    170   1.1  christos 	esac
    171   1.1  christos 	;;
    172   1.1  christos rem)
    173   1.1  christos 	case "$pf" in
    174  1.10  christos 	ipfilter)
    175  1.10  christos 		# N.B.:  The rule generated here must exactly match the
    176  1.10  christos 		# corresponding rule generated for the "add" command above!
    177  1.10  christos 		#
    178   1.2  christos 		echo block in log quick $proto \
    179   1.9  christos 		    from $addr/$mask to any $flags group $2 | \
    180   1.2  christos 		    /sbin/ipf -A -r -f - >/dev/null 2>&1 && echo OK
    181   1.1  christos 		;;
    182   1.2  christos 
    183   1.1  christos 	ipfw)
    184   1.1  christos 		/sbin/ipfw table "port$6" delete "$addr/$mask" 2>/dev/null && \
    185   1.1  christos 		    echo OK
    186   1.1  christos 		;;
    187   1.2  christos 
    188   1.2  christos 	iptables)
    189   1.2  christos 		if /sbin/iptables --list "$2" >/dev/null 2>&1; then
    190   1.2  christos 			/sbin/iptables --delete "$2" --proto "$raw_proto" \
    191   1.2  christos 			    --source "$addr/$mask" --dport "$raw_port" \
    192   1.2  christos 			    --jump DROP
    193   1.2  christos 		fi
    194   1.2  christos 		echo OK
    195   1.2  christos 		;;
    196   1.2  christos 
    197   1.1  christos 	npf)
    198   1.1  christos 		/sbin/npfctl rule "$2" rem-id "$7"
    199   1.1  christos 		;;
    200   1.2  christos 
    201   1.1  christos 	pf)
    202   1.4  christos 		/sbin/pfctl -qa "$2/$6" -t "port$6" -T delete "$addr/$mask" && \
    203   1.1  christos 		    echo OK
    204   1.1  christos 		;;
    205   1.2  christos 
    206   1.1  christos 	esac
    207   1.1  christos 	;;
    208   1.1  christos flush)
    209   1.1  christos 	case "$pf" in
    210  1.10  christos 	ipfilter)
    211   1.2  christos 		#
    212  1.10  christos 		# N.B. WARNING:  This is obviously not reentrant!
    213   1.2  christos 		#
    214  1.10  christos 		# First we flush all the rules from the inactive set, then we
    215  1.10  christos 		# reload the ones that do not belong to the group "$2", and
    216  1.10  christos 		# finally we swap the active and inactive rule sets.
    217   1.2  christos 		#
    218   1.2  christos 		/sbin/ipf -I -F a
    219  1.10  christos 		#
    220  1.10  christos 		# "ipf -I -F a" also flushes active accounting rules!
    221  1.10  christos 		#
    222  1.10  christos 		# Note that accounting rule groups are unique to accounting
    223  1.10  christos 		# rules and have nothing to do with filter rules, though of
    224  1.10  christos 		# course theoretically one could use the same group name for
    225  1.10  christos 		# them too.
    226  1.10  christos 		#
    227  1.10  christos 		# In theory anyone using any such accounting rules should have a
    228  1.10  christos 		# wrapper /etc/rc.conf.d/blocklistd script (and corresponding
    229  1.10  christos 		# /etc/rc.conf.d/ipfilter script) that will record and
    230  1.10  christos 		# consolidate the values accumulated by such accounting rules
    231  1.10  christos 		# before they are flushed, since otherwise their counts will be
    232  1.10  christos 		# lost forever.
    233  1.10  christos 		#
    234   1.2  christos 		/usr/sbin/ipfstat -io | fgrep -v "group $2" | \
    235   1.2  christos 		    /sbin/ipf -I -f - >/dev/null 2>&1
    236  1.10  christos 		#
    237  1.10  christos 		# This MUST be done last and separately as "-s" is executed
    238   1.2  christos 		# _while_ the command arguments are being processed!
    239  1.10  christos 		#
    240   1.2  christos 		/sbin/ipf -s && echo OK
    241   1.1  christos 		;;
    242   1.2  christos 
    243   1.1  christos 	ipfw)
    244   1.1  christos 		/sbin/ipfw table "port$6" flush 2>/dev/null && echo OK
    245   1.1  christos 		;;
    246   1.2  christos 
    247   1.2  christos 	iptables)
    248   1.2  christos 		if /sbin/iptables --list "$2" >/dev/null 2>&1; then
    249   1.2  christos 			/sbin/iptables --flush "$2"
    250   1.2  christos 		fi
    251   1.2  christos 		echo OK
    252   1.2  christos 		;;
    253   1.2  christos 
    254   1.1  christos 	npf)
    255   1.1  christos 		/sbin/npfctl rule "$2" flush
    256   1.1  christos 		;;
    257   1.2  christos 
    258   1.1  christos 	pf)
    259   1.4  christos 		# dynamically determine which anchors exist
    260   1.8  christos 		for anchor in $(/sbin/pfctl -a "$2" -s Anchors 2> /dev/null); do
    261   1.9  christos 			/sbin/pfctl -a "$anchor" -t "port${anchor##*/}" -T flush
    262   1.9  christos 			/sbin/pfctl -a "$anchor" -F rules
    263   1.4  christos 		done
    264   1.4  christos 		echo OK
    265   1.1  christos 		;;
    266   1.1  christos 	esac
    267   1.1  christos 	;;
    268   1.1  christos *)
    269   1.1  christos 	echo "$0: Unknown command '$1'" 1>&2
    270   1.1  christos 	exit 1
    271   1.1  christos 	;;
    272   1.1  christos esac
    273