#!/sbin/openrc-run # Copyright 1999-2011 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 # $Header: /var/cvsroot/gentoo-x86/net-firewall/iptables/files/iptables-1.4.11.init,v 1.2 2011/12/04 10:15:59 swegener Exp $ description="IPv4/IPv6 packet filtering and NAT" description_save="Save firewall state" description_panic="Drop all packets" description_reload="Reload configuration" extra_commands="save panic" extra_started_commands="reload" iptables_name=${SVCNAME} if [ "${iptables_name}" != "iptables" -a "${iptables_name}" != "ip6tables" ] ; then iptables_name="iptables" fi iptables_bin="/sbin/${iptables_name}" case ${iptables_name} in iptables) iptables_proc="/proc/net/ip_tables_names" iptables_save=${IPTABLES_SAVE} sysctl_ipfwd=net.ipv4.ip_forward;; ip6tables) iptables_proc="/proc/net/ip6_tables_names" iptables_save=${IP6TABLES_SAVE} sysctl_ipfwd=net.ipv6.conf.all.forwarding;; esac depend() { before net after sysctl use logger provide firewall } set_table_policy() { local chains table=$1 policy=$2 case ${table} in nat) chains="PREROUTING POSTROUTING OUTPUT";; mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";; filter) chains="INPUT FORWARD OUTPUT";; *) chains="";; esac local chain for chain in ${chains} ; do ${iptables_bin} -t ${table} -P ${chain} ${policy} done } checkkernel() { if [ ! -e ${iptables_proc} ] ; then eerror "Your kernel lacks ${iptables_name} support, please load" eerror "appropriate modules and try again." return 1 fi return 0 } checkconfig() { if [ ! -f ${iptables_save} ] ; then eerror "Not starting ${iptables_name}. First create some rules then run:" eerror "/etc/init.d/${iptables_name} save" return 1 fi return 0 } start() { checkconfig || return 1 ebegin "Loading ${iptables_name} state and starting firewall" ${iptables_bin}-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}" eend $? if yesno "${IPFORWARD}"; then ebegin "Enabling forwarding" /sbin/sysctl -w ${sysctl_ipfwd}=1 > /dev/null eend $? fi } stop() { if yesno "${IPFORWARD}"; then ebegin "Disabling forwarding" /sbin/sysctl -w ${sysctl_ipfwd}=0 > /dev/null eend $? fi if yesno "${SAVE_ON_STOP}"; then save || return 1 fi checkkernel || return 1 ebegin "Stopping firewall" local a for a in $(cat ${iptables_proc}) ; do set_table_policy $a ACCEPT ${iptables_bin} -F -t $a ${iptables_bin} -X -t $a done eend $? } reload() { checkkernel || return 1 ebegin "Flushing firewall" local a for a in $(cat ${iptables_proc}) ; do ${iptables_bin} -F -t $a ${iptables_bin} -X -t $a done eend $? start } save() { ebegin "Saving ${iptables_name} state" touch "${iptables_save}" chmod 0600 "${iptables_save}" ${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}" eend $? } panic() { checkkernel || return 1 if service_started ${iptables_name}; then rc-service ${iptables_name} stop fi local a ebegin "Dropping all packets" for a in $(cat ${iptables_proc}) ; do ${iptables_bin} -F -t $a ${iptables_bin} -X -t $a set_table_policy $a DROP done eend $? }