post_iptables_rules 2.9 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. #!/bin/bash
  2. multissid=$(grep multissid /etc/yunohost/apps/hotspot/settings.yml | cut -d: -f2 | sed "s/[ ']//g")
  3. interface=$(grep wifi_device /etc/yunohost/apps/hotspot/settings.yml | cut -d: -f2 | sed "s/[ ']//g")
  4. IFS='|' read -a captive_portal <<< "$(grep captive_portal /etc/yunohost/apps/hotspot/settings.yml | grep -v captive_portal_url | cut -d: -f2 | sed "s/[ ']//g")"
  5. IFS='|' read -a ipv4 <<< "$(grep ip4_nat_prefix /etc/yunohost/apps/hotspot/settings.yml | cut -d: -f2 | sed "s/[ ']//g")"
  6. IFS='|' read -a ipv6 <<< "$(grep ip6_net /etc/yunohost/apps/hotspot/settings.yml | cut -d: -f2 | sed "s/[ ']//g")"
  7. iptables -w -N hotspot_fwd
  8. ip6tables -w -N hotspot_fwd
  9. for (( j=0; j<multissid; j++ ));
  10. do
  11. if [[ "${captive_portal[$j]}" != "1" ]]
  12. then
  13. continue
  14. fi
  15. for iptables_cmd in iptables ip6tables;
  16. do
  17. if [[ "${iptables_cmd}" == "iptables" ]]; then
  18. ipv4=${ipv4[$j]}
  19. if [[ "${ipv4}" == "" ]]
  20. then
  21. continue
  22. fi
  23. ip=$ipv4.1
  24. subnet=$ipv4.0/24
  25. mac_adresses=$(grep "$ipv4" /etc/hotspot/allowed.csv | cut -d, -f3)
  26. else
  27. ipv6=${ipv6[$j]}
  28. if [[ "${ipv6}" == "" ]]
  29. then
  30. continue
  31. fi
  32. ip=$ipv6::1
  33. subnet=$ipv6::1
  34. mac_adresses=$(grep "$ipv6" /etc/hotspot/allowed.csv | cut -d, -f3)
  35. fi
  36. # Allow to request 4253 port
  37. $iptables_cmd -w -A INPUT -i $interface -m udp -p udp --dport 4253 -j ACCEPT
  38. # Drop all packets going on external internet
  39. $iptables_cmd -w -A hotspot_fwd -s $subnet -j DROP
  40. # Force to use the fakeDNS
  41. $iptables_cmd -w -A PREROUTING -i $interface -s $subnet -p udp --dport 53 -j DNAT --to-destination $ip:4253
  42. # Make things working with DoH
  43. # Warning: this rules to ssupport DoH let info in nginx logs on which website the user try to access...
  44. # Only activating 80 and not 443 reduces a bit the issues.
  45. # A better approach could be to list all ips used by domains dedicated to captive portal detection.
  46. $iptables_cmd -w -A PREROUTING -i $interface -s $subnet -p tcp --dport 80 -j DNAT --to-destination $ip:80
  47. #$iptables_cmd -w -A PREROUTING -i $interface -s $subnet -p tcp --dport 443 -j DNAT --to-destination $ip:443
  48. # Maybe needed, maybe not (i din't need this when vpn is activated)
  49. #$iptables_cmd -t nat -A POSTROUTING -o $interface -j MASQUERADE
  50. # Allow specific mac adress to use external internet
  51. for mac in ${mac_adresses}; do
  52. $iptables_cmd -w -I hotspot_fwd 1 -s $subnet -m mac --mac-source $mac -j ACCEPT
  53. $iptables_cmd -t nat -w -I PREROUTING 1 -i $interface -s $subnet -m mac --mac-source $mac -j ACCEPT
  54. done
  55. $iptables_cmd -w -I FORWARD 1 -i $interface -j hotspot_fwd
  56. done
  57. done
  58. exit 0