summaryrefslogtreecommitdiffstats
path: root/roles/common/files/etc/network/if-pre-up.d/iptables
blob: 644211f14f095a51168fe3c4b3a7e6966429230b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
#!/bin/bash
#
# A pre-up hook to auto-(re)load the iptables rulesets whenever the
# network is brought up. If the action fails, an alert message is passed
# to syslogd.
#
# Copyright 2013 Guilhem Moulin <guilhem@fripost.org>
#
# Licensed under the GNU GPL version 3 or higher.
#

set -uo pipefail
PATH=/usr/sbin:/usr/bin:/sbin:/bin

# NOTE: syslog starts after networking during the boot process, messages
# won't be logged at boot time.
log="/usr/bin/logger -st firewall"

# Ignore the loopback interface; run the script for ifup only.
[ "$IFACE" != lo -a "$MODE" = start ] || exit 0

# We support only IPv4 and IPv6.
[ "$ADDRFAM" = inet -o "$ADDRFAM" = inet6 ] || exit 0

$log -p user.info -- "Loading $ADDRFAM firewall on interface $IFACE."

case "$ADDRFAM" in
    inet) iptr=/sbin/iptables-restore;  rules=rules.v4;;
    inet6)iptr=/sbin/ip6tables-restore; rules=rules.v6;;
esac
rules="/etc/iptables/$rules"

$iptr < $rules 2>&1 | $log -p user.err
rv=$?

[ $rv -gt 0 ] && $log -p user.alert \
    "WARN: Failed to load iptables rulesets; the machine may be unprotected!"
exit $rv