From e30a21457ece9ab9934ec1262c0ffbc936e4d688 Mon Sep 17 00:00:00 2001 From: Thomas Lange Date: Thu, 21 Jan 2016 17:01:22 +0100 Subject: Initial commit --- Bash/iptables-whiteblacklisting.sh | 152 +++++++++++++++++++++++++++++++++++++ 1 file changed, 152 insertions(+) create mode 100755 Bash/iptables-whiteblacklisting.sh diff --git a/Bash/iptables-whiteblacklisting.sh b/Bash/iptables-whiteblacklisting.sh new file mode 100755 index 0000000..eab72ef --- /dev/null +++ b/Bash/iptables-whiteblacklisting.sh @@ -0,0 +1,152 @@ +#!/bin/bash +#%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%# +# IPTables port whitelisting-/blacklisting [Thomas Lange ] # +#%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%# +# # +# This script configures your firewall with whitelisting or blacklisting rules # +# and is compatible with IPv4 and IPv6. If you do not have IPv6 just uncomment # +# all lines which containing a "${IPTABLES_V6}". If you want to add additional # +# rules then you can do that at the end of the script. This makes sense if you # +# want allow or disallow internal network traffic from gateway or something. # +# # +#%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%# + +#=============================================================================== +# Set whitelisting or blacklisting mode +#=============================================================================== +MODE='WHITELISTING' # This can only be "WHITELISTING" or "BLACKLISTING" + +#=============================================================================== +# Whitelisting matching rules: : +#=============================================================================== +WHITELISTING=( + # SSH + 'tcp:2200' + + # HTTP + 'tcp:80' + 'tcp:443' + + # XMPP + 'tcp:5222' + 'tcp:5269' + + # TeamSpeak + 'udp:9987' + 'tcp:30033' + 'tcp:10011' + 'tcp:41144' + + # Sauerbraten + 'udp:28710' + 'udp:28711' + 'udp:28810' + 'udp:28811' +) + +#=============================================================================== +# Blacklisting matching rules: : +#=============================================================================== +BLACKLISTING=( + 'udp:28785' + 'udp:28786' +) + +#=============================================================================== +# Define IPTables commands for IPv4 and IPv6 +#=============================================================================== +IPTABLES_V4=`which iptables` +IPTABLES_V6=`which ip6tables` + +#=============================================================================== +# Wrapper function for IPTables with IPv4 and IPv6 +#=============================================================================== +IPTABLES() { + ${IPTABLES_V4} $@ # Executes the given arguments with IPTables for IPv4 + ${IPTABLES_V6} $@ # Executes the given arguments with IPTables for IPv6 +} + +#=============================================================================== +# Set whitelisting and blacklisting chain names +#=============================================================================== +WHITELIST_CHAIN='WHITELIST' +BLACKLIST_CHAIN='BLACKLIST' + +#=============================================================================== +# INPUT policy reset and flush +#=============================================================================== +IPTABLES --policy INPUT ACCEPT +IPTABLES --flush INPUT + +#=============================================================================== +# Ping requests over ICMP protocol are always accepted +#=============================================================================== +IPTABLES --append INPUT --protocol icmp --jump ACCEPT + +#=============================================================================== +# Local loopback connections are also always accepted +#=============================================================================== +IPTABLES --append INPUT -i lo --jump ACCEPT + +#=============================================================================== +# Accept all (already) related and established connections +#=============================================================================== +IPTABLES --append INPUT --match state --state RELATED,ESTABLISHED --jump ACCEPT + +#=============================================================================== +# Flush whitelisting and blacklisting chains if exists +#=============================================================================== +IPTABLES --flush "${WHITELIST_CHAIN}" &> /dev/null +IPTABLES --flush "${BLACKLIST_CHAIN}" &> /dev/null + +#=============================================================================== +# Delete references to whitelisting and blacklisting chains if exists +#=============================================================================== +IPTABLES --delete INPUT --jump "${WHITELIST_CHAIN}" &> /dev/null +IPTABLES --delete INPUT --jump "${BLACKLIST_CHAIN}" &> /dev/null + +#=============================================================================== +# Delete whitelisting and blacklisting chains if exists +#=============================================================================== +IPTABLES --delete-chain "${WHITELIST_CHAIN}" &> /dev/null +IPTABLES --delete-chain "${BLACKLIST_CHAIN}" &> /dev/null + +#=============================================================================== +# Create new whitelisting-/blacklisting chain +#=============================================================================== +if [ ${MODE} == 'WHITELISTING' ]; then IPTABLES --new-chain "${WHITELIST_CHAIN}"; fi +if [ ${MODE} == 'BLACKLISTING' ]; then IPTABLES --new-chain "${BLACKLIST_CHAIN}"; fi + +#=============================================================================== +# Create reference to the whitelisting-/blacklisting chain +#=============================================================================== +if [ ${MODE} == 'WHITELISTING' ]; then IPTABLES --table filter --append INPUT --jump "${WHITELIST_CHAIN}"; fi +if [ ${MODE} == 'BLACKLISTING' ]; then IPTABLES --table filter --append INPUT --jump "${BLACKLIST_CHAIN}"; fi + +#=============================================================================== +# Create IPTables matching rules for whitelisting +#=============================================================================== +if [ ${MODE} == 'WHITELISTING' ]; then + for rule in "${WHITELISTING[@]}"; do + IPTABLES --append "${WHITELIST_CHAIN}" --protocol "${rule%%:*}" --destination-port "${rule##*:}" --jump ACCEPT + done + + IPTABLES --policy INPUT DROP +fi + +#=============================================================================== +# Create IPTables matching rules for blacklisting +#=============================================================================== +if [ ${MODE} == 'BLACKLISTING' ]; then + for rule in "${BLACKLISTING[@]}"; do + IPTABLES --append "${BLACKLIST_CHAIN}" --protocol "${rule%%:*}" --destination-port "${rule##*:}" --jump REJECT + done + + IPTABLES --policy INPUT ACCEPT +fi + +#=============================================================================== +# ADDITIONAL RULES +#=============================================================================== +${IPTABLES_V4} --append INPUT --source 37.120.172.0/22 --jump ACCEPT +${IPTABLES_V6} --append INPUT --source fe80::/64 --jump ACCEPT \ No newline at end of file -- cgit v1.2.3