c128371124
It is insecure to let this type of packets inside They can e.g. open ports on some other routers with UPnP, etc Signed-off-by: Dmitry Tunin <hanipouspilot@gmail.com>
154 lines
3.4 KiB
Bash
154 lines
3.4 KiB
Bash
#!/bin/sh /etc/rc.common
|
|
# Copyright (C) 2010-2014 OpenWrt.org
|
|
|
|
START=99
|
|
USE_PROCD=1
|
|
PROG=/usr/sbin/igmpproxy
|
|
CONFIGFILE=/var/etc/igmpproxy.conf
|
|
|
|
igmp_header() {
|
|
local quickleave verbose
|
|
config_get_bool quickleave "$1" quickleave 0
|
|
config_get verbose "$1" verbose 1
|
|
|
|
[ $verbose = "0" ] && logopts="-d"
|
|
[ $verbose = "2" ] && logopts="-v"
|
|
[ $verbose = "3" ] && logopts="-v -v"
|
|
|
|
mkdir -p /var/etc
|
|
rm -f /var/etc/igmpproxy.conf
|
|
[ $quickleave -gt 0 ] && echo "quickleave" >> /var/etc/igmpproxy.conf
|
|
|
|
[ -L /etc/igmpproxy.conf ] || ln -nsf /var/etc/igmpproxy.conf /etc/igmpproxy.conf
|
|
}
|
|
|
|
igmp_add_phyint() {
|
|
local network direction altnets device up
|
|
|
|
config_get network $1 network
|
|
config_get direction $1 direction
|
|
config_get altnets $1 altnet
|
|
|
|
local status="$(ubus -S call "network.interface.$network" status)"
|
|
[ -n "$status" ] || return
|
|
|
|
json_load "$status"
|
|
json_get_var device l3_device
|
|
json_get_var up up
|
|
|
|
[ -n "$device" -a "$up" = "1" ] || {
|
|
procd_append_param error "$network is not up"
|
|
return;
|
|
}
|
|
|
|
append netdevs "$device"
|
|
|
|
[[ "$direction" = "upstream" ]] && has_upstream=1
|
|
|
|
echo -e "\nphyint $device $direction ratelimit 0 threshold 1" >> /var/etc/igmpproxy.conf
|
|
|
|
if [ -n "$altnets" ]; then
|
|
local altnet
|
|
for altnet in $altnets; do
|
|
echo -e "\taltnet $altnet" >> /var/etc/igmpproxy.conf
|
|
done
|
|
fi
|
|
}
|
|
|
|
igmp_add_network() {
|
|
local network
|
|
|
|
config_get network $1 network
|
|
procd_add_interface_trigger "interface.*" $network /etc/init.d/igmpproxy reload
|
|
}
|
|
|
|
igmp_add_firewall_routing() {
|
|
config_get direction $1 direction
|
|
config_get zone $1 zone
|
|
|
|
[[ "$direction" = "downstream" && ! -z "$zone" ]] || return 0
|
|
|
|
# First drop SSDP packets then accept all other multicast
|
|
|
|
json_add_object ""
|
|
json_add_string type rule
|
|
json_add_string src "$upstream"
|
|
json_add_string dest "$zone"
|
|
json_add_string family ipv4
|
|
json_add_string proto udp
|
|
json_add_string dest_ip "239.255.255.250"
|
|
json_add_string target DROP
|
|
json_close_object
|
|
|
|
json_add_object ""
|
|
json_add_string type rule
|
|
json_add_string src "$upstream"
|
|
json_add_string dest "$zone"
|
|
json_add_string family ipv4
|
|
json_add_string proto udp
|
|
json_add_string dest_ip "224.0.0.0/4"
|
|
json_add_string target ACCEPT
|
|
json_close_object
|
|
}
|
|
|
|
igmp_add_firewall_network() {
|
|
config_get direction $1 direction
|
|
config_get zone $1 zone
|
|
|
|
[ ! -z "$zone" ] || return
|
|
|
|
json_add_object ""
|
|
json_add_string type rule
|
|
json_add_string src "$zone"
|
|
json_add_string family ipv4
|
|
json_add_string proto igmp
|
|
json_add_string target ACCEPT
|
|
json_close_object
|
|
|
|
[[ "$direction" = "upstream" ]] && {
|
|
upstream="$zone"
|
|
config_foreach igmp_add_firewall_routing phyint
|
|
}
|
|
}
|
|
|
|
service_triggers() {
|
|
procd_add_reload_trigger "igmpproxy"
|
|
config_foreach igmp_add_network phyint
|
|
}
|
|
|
|
start_service() {
|
|
has_upstream=
|
|
netdevs=
|
|
logopts=
|
|
config_load igmpproxy
|
|
|
|
config_foreach igmp_header igmpproxy
|
|
config_foreach igmp_add_phyint phyint
|
|
[ -n "$has_upstream" ] || return
|
|
|
|
procd_open_instance
|
|
procd_set_param command $PROG '-n'
|
|
[ -n "$logopts" ] && procd_append_param command $logopts
|
|
procd_append_param command $CONFIGFILE
|
|
procd_set_param file $CONFIGFILE
|
|
procd_set_param netdev $netdevs
|
|
procd_set_param respawn
|
|
|
|
procd_open_data
|
|
|
|
json_add_array firewall
|
|
config_foreach igmp_add_firewall_network phyint
|
|
json_close_array
|
|
|
|
procd_close_data
|
|
|
|
procd_close_instance
|
|
}
|
|
|
|
service_started() {
|
|
procd_set_config_changed firewall
|
|
}
|
|
|
|
stop_service() {
|
|
procd_set_config_changed firewall
|
|
}
|