hook_post-iptable-rules 2.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576
  1. #!/bin/bash
  2. host6=$(dig AAAA +short <TPL:SERVER_NAME> | grep -v '\.$')
  3. host4=$(dig A +short <TPL:SERVER_NAME> | grep -v '\.$')
  4. # IPv6
  5. sudo ip6tables -w -N vpnclient_in
  6. sudo ip6tables -w -N vpnclient_out
  7. sudo ip6tables -w -N vpnclient_fwd
  8. sudo ip6tables -w -A vpnclient_in -p icmpv6 -j ACCEPT
  9. sudo ip6tables -w -A vpnclient_in -s fd00::/8,fe80::/10 -j ACCEPT
  10. sudo ip6tables -w -A vpnclient_in -p tcp --dport 22 -j ACCEPT
  11. sudo ip6tables -w -A vpnclient_in -p tcp --dport 443 -j ACCEPT
  12. sudo ip6tables -w -A vpnclient_in -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  13. sudo ip6tables -w -A vpnclient_in -j DROP
  14. if [ ! -z "${host6}" ]; then
  15. for i in ${host6}; do
  16. sudo ip6tables -w -A vpnclient_out -d "${i}" -p <TPL:PROTO> --dport <TPL:SERVER_PORT> -j ACCEPT
  17. done
  18. fi
  19. for i in <TPL:DNS0> <TPL:DNS1>; do
  20. if [[ "${i}" =~ : ]]; then
  21. sudo ip6tables -w -A vpnclient_out -p udp -d "${i}" --dport 53 -j ACCEPT
  22. fi
  23. done
  24. sudo ip6tables -w -A vpnclient_out -d fd00::/8,fe80::/10 -j ACCEPT
  25. sudo ip6tables -w -A vpnclient_out -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  26. sudo ip6tables -w -A vpnclient_out -j DROP
  27. sudo ip6tables -w -A vpnclient_fwd -j DROP
  28. sudo ip6tables -w -I INPUT 1 -i <TPL:WIRED_DEVICE> -j vpnclient_in
  29. sudo ip6tables -w -I OUTPUT 1 -o <TPL:WIRED_DEVICE> -j vpnclient_out
  30. sudo ip6tables -w -I FORWARD 1 -o <TPL:WIRED_DEVICE> -j vpnclient_fwd
  31. # IPv4
  32. sudo iptables -w -N vpnclient_in
  33. sudo iptables -w -N vpnclient_out
  34. sudo iptables -w -N vpnclient_fwd
  35. sudo iptables -w -A vpnclient_in -p icmp -j ACCEPT
  36. sudo iptables -w -A vpnclient_in -s 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,169.254.0.0/16 -j ACCEPT
  37. sudo iptables -w -A vpnclient_in -p tcp --dport 22 -j ACCEPT
  38. sudo iptables -w -A vpnclient_in -p tcp --dport 443 -j ACCEPT
  39. sudo iptables -w -A vpnclient_in -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  40. sudo iptables -w -A vpnclient_in -j DROP
  41. if [ ! -z "${host4}" ]; then
  42. for i in ${host4}; do
  43. sudo iptables -w -A vpnclient_out -d "${i}" -p <TPL:PROTO> --dport <TPL:SERVER_PORT> -j ACCEPT
  44. done
  45. fi
  46. for i in <TPL:DNS0> <TPL:DNS1>; do
  47. if [[ "${i}" =~ \. ]]; then
  48. sudo iptables -w -A vpnclient_out -p udp -d "${i}" --dport 53 -j ACCEPT
  49. fi
  50. done
  51. sudo iptables -w -A vpnclient_out -d 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,169.254.0.0/16 -j ACCEPT
  52. sudo iptables -w -A vpnclient_out -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  53. sudo iptables -w -A vpnclient_out -j DROP
  54. sudo iptables -w -A vpnclient_fwd -j DROP
  55. sudo iptables -w -I INPUT 1 -i <TPL:WIRED_DEVICE> -j vpnclient_in
  56. sudo iptables -w -I OUTPUT 1 -o <TPL:WIRED_DEVICE> -j vpnclient_out
  57. sudo iptables -w -I FORWARD 1 -o <TPL:WIRED_DEVICE> -j vpnclient_fwd
  58. exit 0