post_iptable_rules 2.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. #!/bin/bash
  2. source /usr/share/yunohost/helpers
  3. wifi_device=$(ynh_app_setting_get --app=$app --key=wifi_device)
  4. captive_portal=$(ynh_app_setting_get --app=$app --key=captive_portal)
  5. ip4_prefix=$(ynh_app_setting_get --app=$app --key=ip4_nat_prefix)
  6. ip6_prefix=$(ynh_app_setting_get --app=$app --key=ip6_net)
  7. iptables -w -N hotspot_fwd
  8. ip6tables -w -N hotspot_fwd
  9. if [[ "${captive_portal}" != "1" ]]
  10. then
  11. exit 0
  12. fi
  13. for iptables_cmd in iptables ip6tables;
  14. do
  15. if [[ "${iptables_cmd}" == "iptables" ]]; then
  16. prefix="${ip4_prefix}"
  17. ip="${ip4_prefix}.1"
  18. subnet="${ip4_prefix}.0/24"
  19. else
  20. prefix="${ip6_prefix}"
  21. ip="${ip6_prefix}1"
  22. subnet="${ip6_prefix}1/64"
  23. fi
  24. mac_addresses=$(grep "${prefix}" /etc/hostapd/$app/allowed.csv | cut -d, -f3)
  25. # Allow to request 4253 port
  26. $iptables_cmd -w -A INPUT -i "${wifi_device}" -m udp -p udp --dport 4253 -j ACCEPT
  27. # Drop all packets going on external internet
  28. $iptables_cmd -w -A hotspot_fwd -s "${subnet}" -j DROP
  29. # Force to use the fakeDNS
  30. $iptables_cmd -w -A PREROUTING -i "${wifi_device}" -s "${subnet}" -p udp --dport 53 -j DNAT --to-destination "${ip}:4253"
  31. # Make things working with DoH
  32. # Warning: this rules to ssupport DoH let info in nginx logs on which website the user try to access...
  33. # Only activating 80 and not 443 reduces a bit the issues.
  34. # A better approach could be to list all ips used by domains dedicated to captive portal detection.
  35. $iptables_cmd -w -A PREROUTING -i "${wifi_device}" -s "${subnet}" -p tcp --dport 80 -j DNAT --to-destination "${ip}:80"
  36. #$iptables_cmd -w -A PREROUTING -i "${wifi_device}" -s "${subnet}" -p tcp --dport 443 -j DNAT --to-destination "${ip}:443"
  37. # Maybe needed, maybe not (i din't need this when vpn is activated)
  38. #$iptables_cmd -t nat -A POSTROUTING -o "${wifi_device}" -j MASQUERADE
  39. # Allow specific mac adress to use external internet
  40. for mac in ${mac_addresses}; do
  41. $iptables_cmd -w -I hotspot_fwd 1 -s "${subnet}" -m mac --mac-source "${mac}" -j ACCEPT
  42. $iptables_cmd -t nat -w -I PREROUTING 1 -i "${wifi_device}" -s "${subnet}" -m mac --mac-source "${mac}" -j ACCEPT
  43. done
  44. $iptables_cmd -w -I FORWARD 1 -i "${wifi_device}" -j hotspot_fwd
  45. done
  46. exit 0