summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorOliver Welter <github@oliwel.de>2015-01-18 14:05:41 +0100
committerOliver Welter <github@oliwel.de>2015-01-18 15:04:43 +0100
commit4dedce6d46c92c4ea3ced36d718461fc5e1f8a2d (patch)
treee0aa81e6733c8e40ed246b9b7f4378d7f1b50f48
parente4d8943c59cfceba229e2689d67601127e8ceb1a (diff)
downloadpfsense-4dedce6d46c92c4ea3ced36d718461fc5e1f8a2d.zip
pfsense-4dedce6d46c92c4ea3ced36d718461fc5e1f8a2d.tar.gz
Add showblock and unblock options to easyrule CLI tool
Block rules added with easyrule block.... can now be listed and removed using the easyrule tool. This is handy to be used with external IDS like tools, e.g fail2ban.
-rw-r--r--etc/inc/easyrule.inc81
-rwxr-xr-xusr/local/bin/easyrule14
2 files changed, 94 insertions, 1 deletions
diff --git a/etc/inc/easyrule.inc b/etc/inc/easyrule.inc
index 978f21e..cdd327d 100644
--- a/etc/inc/easyrule.inc
+++ b/etc/inc/easyrule.inc
@@ -348,6 +348,87 @@ function easyrule_parse_block($int, $src, $ipproto = "inet") {
}
return gettext("Unknown block error.");
}
+
+function easyrule_parse_unblock($int, $host, $ipproto = "inet") {
+ global $blockaliasname, $config;
+
+ if (!empty($host) && !empty($int)) {
+ $host = trim($host, "[]");
+ if (!is_ipaddr($host) && !is_subnet($host)) {
+ return gettext("Tried to unblock invalid IP:") . ' ' . htmlspecialchars($host);
+ }
+ $real_int = easyrule_find_rule_interface($int);
+ if ($real_int === false) {
+ return gettext("Invalid interface for block rule:") . ' ' . htmlspecialchars($int);
+ }
+
+ /* Try to get the ID - will fail if there are no rules/alias on this interface */
+ $id = easyrule_block_alias_getid($real_int);
+ if ($id === false || !$config['aliases']['alias'][$id]) {
+ return gettext("No block rules set on interface:") . ' ' . htmlspecialchars($int);
+ }
+
+ $alias = &$config['aliases']['alias'][$id];
+
+ if (is_subnet($host)) {
+ list($host, $mask) = explode("/", $host);
+ } elseif (is_specialnet($host)) {
+ $mask = 0;
+ } elseif (is_ipaddrv6($host)) {
+ $mask = 128;
+ } else {
+ $mask = 32;
+ }
+
+ // Create the expected string representation
+ $unblock = $host.'/'.$mask;
+
+ $a_address = explode(" ", $config['aliases']['alias'][$id]['address']);
+ $a_detail = explode("||", $config['aliases']['alias'][$id]['detail']);
+
+ if(($key = array_search($unblock, $a_address)) !== false) {
+ unset($a_address[$key]);
+ unset($a_detail[$key]);
+ // Write back the result to the config array
+ $config['aliases']['alias'][$id]['address'] = join(" ", $a_address);
+ $config['aliases']['alias'][$id]['detail'] = join("||", $a_detail);
+
+ // Update config
+ write_config();
+ $retval = filter_configure();
+ if (!empty($_SERVER['DOCUMENT_ROOT'])) {
+ header("Location: firewall_aliases.php");
+ exit;
+ } else {
+ return gettext("Host unblocked successfully");
+ }
+ } else {
+ return gettext("Host ist not on block list: " . $host);
+ }
+ }
+
+ return gettext("Tried to unblock but had no host IP or interface");
+
+}
+
+function easyrule_parse_getblock($int = 'wan', $sep = "\n") {
+ global $blockaliasname, $config;
+
+ $real_int = easyrule_find_rule_interface($int);
+ if ($real_int === false) {
+ return gettext("Invalid interface for block rule:") . ' ' . htmlspecialchars($int);
+ }
+
+ /* Try to get the ID - will fail if there are no rules/alias on this interface */
+ $id = easyrule_block_alias_getid($real_int);
+
+ if ($id === false || !$config['aliases']['alias'][$id] || empty($config['aliases']['alias'][$id]['address'])) {
+ return gettext("No block rules set on interface:") . ' ' . htmlspecialchars($int);
+ }
+ return join($sep, explode(" ", $config['aliases']['alias'][$id]['address']));
+
+}
+
function easyrule_parse_pass($int, $proto, $src, $dst, $dstport = 0, $ipproto = "inet") {
/* Check for valid int, srchost, dsthost, dstport, and proto */
global $protocols_with_ports;
diff --git a/usr/local/bin/easyrule b/usr/local/bin/easyrule
index 9850aee..3179ffa 100755
--- a/usr/local/bin/easyrule
+++ b/usr/local/bin/easyrule
@@ -96,6 +96,12 @@ if (($argc > 1) && !empty($argv[1])) {
case 'block':
$message = easyrule_parse_block($argv[2], $argv[3]);
break;
+ case 'unblock':
+ $message = easyrule_parse_unblock($argv[2], $argv[3]);
+ break;
+ case 'showblock':
+ $message = easyrule_parse_getblock($argv[2]);
+ break;
case 'pass':
$message = easyrule_parse_pass($argv[2], $argv[3], $argv[4], $argv[5], $argv[6]);
break;
@@ -104,7 +110,7 @@ if (($argc > 1) && !empty($argv[1])) {
} else {
// Print usage:
echo "usage:\n";
- echo " Blocking only requires an IP to block\n";
+ echo " Blocking only requires an IP to block, block rules can be shown with showblock and revoked using unblock\n";
echo " " . basename($argv[0]) . " block <interface> <source IP>\n";
echo "\n";
echo " Passing requires more detail, as it must be as specific as possible. The destination port is optional if you're using a protocol without a port (e.g. ICMP, OSPF, etc).\n";
@@ -113,6 +119,12 @@ if (($argc > 1) && !empty($argv[1])) {
echo " Block example:\n";
echo " " . basename($argv[0]) . " block wan 1.2.3.4\n";
echo "\n";
+ echo " Show active blocks example:\n";
+ echo " " . basename($argv[0]) . " showblock wan\n";
+ echo "\n";
+ echo " Unblock example:\n";
+ echo " " . basename($argv[0]) . " unblock wan 1.2.3.4\n";
+ echo "\n";
echo " Pass example (protocol with port):\n";
echo " " . basename($argv[0]) . " pass wan tcp 1.2.3.4 192.168.0.4 80\n";
echo "\n";
OpenPOWER on IntegriCloud