mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-12-20 23:54:38 +01:00
27bc1b287e
while. This is only the script pieces, the glue for the build comes next. Submitted by: Mike Makonnen <makonnen@pacbell.net> Reviewed by: silence on -current and -hackers Prodded by: rwatson
71 lines
1.5 KiB
Bash
71 lines
1.5 KiB
Bash
#!/bin/sh
|
|
#
|
|
# $FreeBSD$
|
|
#
|
|
|
|
# PROVIDE: ipfw
|
|
# REQUIRE: ppp-user
|
|
# BEFORE: NETWORKING
|
|
# KEYWORD: FreeBSD
|
|
|
|
. /etc/rc.subr
|
|
|
|
name="ipfw"
|
|
rcvar="firewall_enable"
|
|
start_cmd="ipfw_start"
|
|
start_precmd="ipfw_precmd"
|
|
stop_cmd="${SYSCTL_W} net.inet.ip.fw.enable=0"
|
|
|
|
ipfw_precmd()
|
|
{
|
|
if ! ${SYSCTL} net.inet.ip.fw.enable > /dev/null 2>&1 ; then
|
|
if ! kldload ipfw ; then
|
|
warn unable to load firewall module.
|
|
return 1
|
|
fi
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
ipfw_start()
|
|
{
|
|
# set the firewall rules script if none was specified
|
|
[ -z "${firewall_script}" ] && firewall_script=/etc/rc.firewall
|
|
|
|
if [ -r "${firewall_script}" ]; then
|
|
. "${firewall_script}"
|
|
echo -n 'Firewall rules loaded, starting divert daemons:'
|
|
|
|
# Network Address Translation daemon
|
|
#
|
|
if checkyesno natd_enable ; then
|
|
if [ -n "${natd_interface}" ]; then
|
|
if echo ${natd_interface} | \
|
|
grep -q -E '^[0-9]+(\.[0-9]+){0,3}$'; then
|
|
natd_flags="$natd_flags -a ${natd_interface}"
|
|
else
|
|
natd_flags="$natd_flags -n ${natd_interface}"
|
|
fi
|
|
echo -n ' natd'
|
|
${natd_program:-/sbin/natd} ${natd_flags} ${natd_ifarg}
|
|
fi
|
|
fi
|
|
elif [ "`ipfw l 65535`" = "65535 deny ip from any to any" ]; then
|
|
echo 'Warning: kernel has firewall functionality, but' \
|
|
' firewall rules are not enabled.'
|
|
echo ' All ip services are disabled.'
|
|
fi
|
|
echo '.'
|
|
|
|
# Firewall logging
|
|
#
|
|
! checkyesno firewall_logging && return 0
|
|
|
|
echo 'Firewall logging=YES'
|
|
sysctl net.inet.ip.fw.verbose=1 >/dev/null
|
|
}
|
|
|
|
load_rc_config $name
|
|
run_rc_command "$1"
|