#!/usr/bin/perl # index.cgi # Display current iptables firewall configuration from save file # unified for IPV4 and IPV6 require './firewall-lib.pl'; &ReadParse(); # Load the correct library $ipvx_version = &get_ipvx_version(); if ($ipvx_version == 6) { require './firewall6-lib.pl'; } else { require './firewall4-lib.pl'; } $subhead = $text{"index_title_v${ipvx}"}; if ($ipvx_save) { $subhead .= ", ".&text('index_editing', "$ipvx_save"); } &ui_print_header($subhead, $text{'index_title'}, undef, "intro", 1, 1, 0, &help_search_link("ip${ipvx}tables", "man", "doc")); # Check for iptables and iptables-restore commands if ($c = &missing_firewall_commands()) { print "

",&text('index_ecommand', "$c"),"

\n"; &ui_print_footer("/", $text{'index'}); exit; } # Check if the kernel supports iptables $out = &backquote_command("ip${ipvx}tables -n -t filter -L OUTPUT 2>&1"); if ($?) { print "

",&text('index_ekernel', "

$out
"),"

\n"; &ui_print_footer("/", $text{'index'}); exit; } # Check if the distro supports iptables if (!$config{"direct${ipvx}"} && defined(&check_iptables) && ($err = &check_iptables())) { print "

$err

\n"; &ui_print_footer("/", $text{'index'}); exit; } # Check if firewall is being started at boot if (!$config{"direct${ipvx}"} && &foreign_check("init")) { $init_support++; if (defined(&started_at_boot)) { $atboot = &started_at_boot(); } else { &foreign_require("init", "init-lib.pl"); $atboot = &init::action_status("webmin-ip${ipvx}tables") == 2; } } # Check if the save file exists. If not, check for any existing firewall # rules, and offer to create a save file from them @livetables = &get_iptables_save("ip${ipvx}tables-save 2>/dev/null |"); # Display warnings about active external firewalls! &external_firewall_message(\@livetables); if (!$config{"direct${ipvx}"} && $in{'reset'} && $access{'setup'}) { @tables = @livetables; foreach $t (@tables) { $rules++ if (@{$t->{'rules'}}); foreach $c (keys %{$t->{'defaults'}}) { $chains++ if ($t->{'defaults'}->{$c} ne 'ACCEPT'); } $hastable{$t->{'name'}}++; } foreach $t (@known_tables) { system("ip${ipvx}tables -t $t -n -L >/dev/null") if (!$hastable{$t}); } if (!$in{'reset'} && ($rules || $chains)) { # Offer to save the current rules print &ui_confirmation_form("convert.cgi", &text('index_existing', $rules, "$ipvx_save"), ( ['version'], [${ipvx_arg}] ), [ [ undef, $text{'index_saveex'} ] ], $init_support && !$atboot ? &ui_checkbox("atboot", 1, $text{'index_atboot'}, 0) : "", ); print &ui_table_start($text{'index_headerex'}, "width=100%", 2); $out = &backquote_command("ip${ipvx}tables-save 2>/dev/null"); print &ui_table_row(undef, "
".&html_escape($out)."
", 2); print &ui_table_end(); } else { # Offer to set up a firewall print &text($in{'reset'} ? 'index_rsetup' : 'index_setup', "$ipvx_save"),"

\n"; print &ui_form_start("setup${ipvx}.cgi"); print &ui_hidden("version", ${ipvx_arg}); print &ui_hidden("reset", $in{'reset'}); print "

\n"; print &ui_oneradio("auto", 0, $text{'index_auto0'}, 1),"

\n"; foreach $a (1 .. 5) { print &ui_oneradio("auto", $a, $text{'index_auto'.$a}, 0)." "; print &interface_choice("iface".$a),"

\n"; } print "

\n"; print &ui_submit($text{'index_auto'}),"

\n"; if ($init_support && !$atboot) { print &ui_checkbox("atboot", 1, $text{'index_atboot'}, 0); } print "

\n"; print &ui_form_end(); } } else { $form = 0; @tables = &get_iptables_save(); if (!$config{"direct${ipvx}"}) { # Verify that all known tables exist, and if not add them to the # save file foreach $t (@tables) { $hastable{$t->{'name'}}++; } foreach $t (@known_tables) { if (!$hastable{$t}) { local ($missing) = &get_iptables_save( "ip${ipvx}tables-save --table $t 2>/dev/null |"); if ($missing) { delete($missing->{'line'}); &save_table($missing); } $need_reload++; } } @tables = &get_iptables_save() if ($need_reload); } # Check if the current config is valid if (!$config{"direct${ipvx}"}) { my $err = &validate_iptables_config(); if ($err) { print "",&text('index_evalid', &html_escape($err)),"

\n"; } } # Work out the default table if (!defined($in{'table'})) { foreach $t (@tables) { if (@{$t->{'rules'}} && &can_edit_table($t->{'name'})) { $in{'table'} = $t->{'index'}; last; } } } if (!defined($in{'table'})) { foreach $t (@tables) { if (&can_edit_table($t->{'name'})) { $in{'table'} = $t->{'index'}; last; } } } $table = $tables[$in{'table'}]; # Allow selection of a table print "\n"; print "\n"; $form++; if ($access{'newchain'}) { # Show form to create a chain print "\n"; $form++; } print "
\n"; print "
\n"; print "\n"; print &ui_hidden("version", ${ipvx_arg}); print "
\n"; print "
\n"; print "
\n"; print &ui_hidden("table", $in{'table'}); print &ui_hidden("version", ${ipvx_arg}); print "\n"; print "
\n"; print "
\n"; # Display a table of rules for each chain CHAIN: foreach $c (sort by_string_for_iptables keys %{$table->{'defaults'}}) { print &ui_hr(); @rules = grep { lc($_->{'chain'}) eq lc($c) } @{$table->{'rules'}}; print "",$text{"index_chain_".lc($c)} || &text('index_chain', "$c"),"
\n"; # check if chain is filtered out if ($config{'filter_chain'}) { foreach $filter (split(',', $config{'filter_chain'})) { if($c =~ /^$filter$/) { # not managed by firewall, do not display or modify print "".$text{'index_filter_chain'}."
\n"; next CHAIN; } } } print "

\n"; print &ui_hidden("version", ${ipvx_arg}); print &ui_hidden("table", $in{'table'}); print &ui_hidden("chain", $c); my $pp = $config{'perpage'}; if (@rules > $pp) { # Need to show arrows $s = int($in{'start'}); $e = $in{'start'} + $pp - 1; $e = @rules-1 if ($e >= @rules); print &ui_page_flipper( &text('index_position', $s+1, $e+1, scalar(@rules)), undef, undef, $s ? "?start=".($s - $pp) : "", $e < @rules-1 ? "?start=".($s + $pp) : ""); } else { # Can show them all $s = 0; $e = @rules - 1; } @rules = @rules[$s..$e]; if (@rules) { @links = ( &select_all_link("d", $form), &select_invert_link("d", $form) ); print &ui_links_row(\@links); # Generate the header local (@hcols, @tds); push(@hcols, "", $text{'index_action'}); push(@tds, "width=5", "width=10% nowrap", "width=70%", "nowrap", "nowrap"); if ($config{'view_condition'}) { push(@hcols, $text{'index_desc'}); push(@tds, "nowrap"); } if ($config{'view_comment'}) { push(@hcols, $text{'index_comm'}); push(@tds, ""); } push(@hcols, $text{'index_move'}, $text{'index_add'}); push(@tds, "width=32", "width=32"); print &ui_columns_start(\@hcols, 100, 0, \@tds); # Generate a row for each rule foreach $r (@rules) { $edit = &can_jump($r); local @cols; local $act = $text{"index_jump_".lc($r->{'j'}->[1])} || &text('index_jump', $r->{'j'}->[1]); # check if chain jump TO is filtered out local $chain_filtered; if ($config{'filter_chain'}) { foreach $filter (split(',', $config{'filter_chain'})) { if($r->{'j'}->[1] =~ /^$filter$/) { $chain_filtered=&text('index_filter_chain'); $act=$act."
$chain_filtered"; } } } # chain to jump to is filtered, switch of edit if ($edit && !$chain_filtered) { push(@cols, &ui_link("edit_rule.cgi?version=${ipvx_arg}&table=".&urlize($in{'table'})."&idx=$r->{'index'}",$act)); } else { # add col for not visible checkmark push(@cols, "", $act); } if ($config{'view_condition'}) { push(@cols, &describe_rule($r)); } if ($config{'view_comment'}) { $cmt = $config{'comment_mod'} || $r->{'comment'} ? $r->{'comment'}->[1] : $r->{'cmt'}; push(@cols, $cmt); } # Up/down mover local $mover; if ($r eq $rules[@rules-1]) { $mover .= ""; } else { $mover .= "{'index'}&". "down=1'>"; } if ($r eq $rules[0]) { $mover .= ""; } else { $mover .= "{'index'}&". "up=1'>"; } push(@cols, $mover); # Before / after adder local $adder; $adder .= "{'index'}'>"; $adder .= "{'index'}'>"; push(@cols, $adder); # chain to jump to is filtered, switch of edit if ($edit && !$chain_filtered) { print &ui_checked_columns_row( \@cols, \@tds, "d", $r->{'index'}); } else { print &ui_columns_row(\@cols, \@tds); } } print &ui_columns_end(); print &ui_links_row(\@links); } else { print "$text{'index_none'}
\n"; } # Show policy changing button for chains that support it, # and rule-adding button print "\n"; local $d = $table->{'defaults'}->{$c}; if ($d ne '-') { # Built-in chain if ($access{'policy'}) { # Change default button print "\n"; } else { print "\n"; } print "\n"; } else { # Custom chain if ($access{'delchain'}) { # Delete and rename chain buttons print "\n"; } print "\n"; } print "\n"; print "
", &ui_submit($text{'index_policy'}),"\n"; print "\n"; if (@rules) { # Delete selected button print &ui_submit($text{'index_cdeletesel'}, "delsel"),"\n"; # Move selected button print &ui_submit($text{'index_cmovesel'}, "movesel"),"\n"; } print "", &ui_submit($text{'index_cdelete'}, "delete"), "\n", &ui_submit($text{'index_crename'}, "rename"), "\n"; if (@rules) { # Clear chain button if ($access{'delchain'}) { print &ui_submit($text{'index_cclear'}, "clear"),"\n"; } # Delete rules button print &ui_submit($text{'index_cdeletesel'}, "delsel"),"\n"; # Move selected button print &ui_submit($text{'index_cmovesel'}, "movesel"),"\n"; } print "", &ui_submit($text{'index_radd'}, "add"),"
\n"; $form++; } # Show ipset overview if ipsets are availibe # may need to check if they are used by firewall rules @ipsets = &get_ipsets_active(); if (@ipsets) { print &ui_hr(); print "$text{'index_ipset_title'}"; # Generate the header @hcols = ( $text{'index_ipset'}, $text{'index_ipset_name'}, $text{'index_ipset_type'}, $text{'index_ipset_elem'}, $text{'index_ipset_maxe'}, $text{'index_ipset_size'} ); print &ui_columns_start(\@hcols, 100, 0); # Generate a row for each rule foreach $s (@ipsets) { my @h = split(/ /, $s->{'Header'}); # print matching pĂ­net version if ($h[1] =~ /inet${ipvx}$/) { my @cols = ( "$h[0] $h[1]", $s->{'Name'}, $s->{'Type'}, $s->{'Number'} || 0, $h[5], $s->{'Size'} ); print &ui_columns_row(\@cols); } } print &ui_columns_end(); } # Display buttons for applying and un-applying the configuration, # and for creating an init script if possible print &ui_hr(); print &ui_buttons_start(); if (!$config{"direct${ipvx}"}) { # Buttons to apply and reset the config if (&foreign_check("servers")) { @servers = &list_cluster_servers(); } if ($access{'apply'}) { print &ui_buttons_row("apply.cgi", $text{'index_apply'}, @servers ? $text{'index_applydesc2'} : $text{'index_applydesc'}, [ [ "table", $in{'table'} ] ]); } if ($access{'unapply'}) { print &ui_buttons_row("unapply.cgi", $text{'index_unapply'}, $text{'index_unapplydesc'}, [ [ "table", $in{'table'} ] ]); } if ($init_support && $access{'bootup'}) { print &ui_buttons_row("bootup.cgi", $text{'index_bootup'}, $text{'index_bootupdesc'}, [ [ "table", $in{'table'} ] ], &ui_yesno_radio("boot", $atboot)); } if ($access{'setup'}) { print &ui_buttons_row("index.cgi", $text{'index_reset'}, $text{'index_resetdesc'}, [ [ "reset", 1 ] ]); } } else { # Button to save the live config in a file if ($access{'unapply'}) { print &ui_buttons_row("unapply.cgi", $text{'index_unapply2'}, $text{'index_unapply2desc'}, [ [ "table", $in{'table'} ] ]); } } # Show button for cluster page if (&foreign_check("servers")) { &foreign_require("servers", "servers-lib.pl"); @allservers = grep { $_->{'user'} } &servers::list_servers(); } if ($access{'cluster'} && @allservers) { print &ui_buttons_row( "cluster.cgi", $text{'index_cluster'}, $text{'index_clusterdesc'}); } print &ui_buttons_end(); } &ui_print_footer("/", $text{'index'}); # external_firewall_message(&tables) sub external_firewall_message { my ($tables) = @_; my $fwconfig = "@{[&get_webprefix()]}/config.cgi?firewall"; my @fwname = &external_firewall_list($tables); # Warning about not using direct if(@fwname && !$config{"direct${ipvx}"}) { print "
", &text('index_filter_nodirect', $fwconfig), "

\n"; } # Alert about the detected firewall modules foreach my $word (@fwname) { print ui_alert_box(&text("index_$word", "@{[&get_webprefix()]}/$word/", $fwconfig), 'warn'); } }