mirror of
https://github.com/hackacad/bastille.git
synced 2025-12-19 00:30:05 +01:00
Added SPDX-License-Identifier to all scripts for better license clarity and compliance. Updated the copyright years from 2024 to 2025 in various files to reflect the current maintenance period.
219 lines
7.7 KiB
Bash
219 lines
7.7 KiB
Bash
#!/bin/sh
|
|
#
|
|
# SPDX-License-Identifier: BSD-3-Clause
|
|
#
|
|
# Copyright (c) 2018-2025, Christer Edwards <christer.edwards@gmail.com>
|
|
# All rights reserved.
|
|
#
|
|
# Redistribution and use in source and binary forms, with or without
|
|
# modification, are permitted provided that the following conditions are met:
|
|
#
|
|
# * Redistributions of source code must retain the above copyright notice, this
|
|
# list of conditions and the following disclaimer.
|
|
#
|
|
# * Redistributions in binary form must reproduce the above copyright notice,
|
|
# this list of conditions and the following disclaimer in the documentation
|
|
# and/or other materials provided with the distribution.
|
|
#
|
|
# * Neither the name of the copyright holder nor the names of its
|
|
# contributors may be used to endorse or promote products derived from
|
|
# this software without specific prior written permission.
|
|
#
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
# DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
|
|
# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
|
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
# OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
. /usr/local/share/bastille/common.sh
|
|
. /usr/local/etc/bastille/bastille.conf
|
|
|
|
usage() {
|
|
error_exit "Usage: bastille rdr TARGET [clear|list|(tcp|udp host_port jail_port [log ['(' logopts ')'] ] )]"
|
|
}
|
|
|
|
# Handle special-case commands first.
|
|
case "$1" in
|
|
help|-h|--help)
|
|
usage
|
|
;;
|
|
esac
|
|
|
|
if [ $# -lt 2 ]; then
|
|
usage
|
|
fi
|
|
|
|
bastille_root_check
|
|
|
|
TARGET="${1}"
|
|
JAIL_NAME=""
|
|
JAIL_IP=""
|
|
JAIL_IP6=""
|
|
EXT_IF=""
|
|
shift
|
|
|
|
check_jail_validity() {
|
|
# Can only redirect to single jail
|
|
if [ "${TARGET}" = 'ALL' ]; then
|
|
error_exit "Can only redirect to a single jail."
|
|
fi
|
|
|
|
# Check if jail name is valid
|
|
JAIL_NAME=$(/usr/sbin/jls -j "${TARGET}" name 2>/dev/null)
|
|
if [ -z "${JAIL_NAME}" ]; then
|
|
error_exit "Jail not found: ${TARGET}"
|
|
fi
|
|
|
|
# Check if jail ip4 address (ip4.addr) is valid (non-VNET only)
|
|
if [ "$(bastille config $TARGET get vnet)" != 'enabled' ]; then
|
|
JAIL_IP=$(/usr/sbin/jls -j "${TARGET}" ip4.addr 2>/dev/null)
|
|
if [ -z "${JAIL_IP}" ] || [ "${JAIL_IP}" = "-" ]; then
|
|
error_exit "Jail IP not found: ${TARGET}"
|
|
fi
|
|
fi
|
|
# Check if jail ip6 address (ip6.addr) is valid (non-VNET only)
|
|
if [ "$(bastille config $TARGET get vnet)" != 'enabled' ]; then
|
|
if [ "$(bastille config $TARGET get ip6)" != 'disable' ] && [ "$(bastille config $TARGET get ip6)" != 'not set' ]; then
|
|
JAIL_IP6=$(/usr/sbin/jls -j "${TARGET}" ip6.addr 2>/dev/null)
|
|
fi
|
|
fi
|
|
|
|
|
|
# Check if rdr-anchor is defined in pf.conf
|
|
if ! (pfctl -sn | grep rdr-anchor | grep 'rdr/\*' >/dev/null); then
|
|
error_exit "rdr-anchor not found in pf.conf"
|
|
fi
|
|
|
|
# Check if ext_if is defined in pf.conf
|
|
if [ -n "${bastille_pf_conf}" ]; then
|
|
EXT_IF=$(grep "^[[:space:]]*${bastille_network_pf_ext_if}[[:space:]]*=" ${bastille_pf_conf})
|
|
if [ -z "${EXT_IF}" ]; then
|
|
error_exit "bastille_network_pf_ext_if (${bastille_network_pf_ext_if}) not defined in pf.conf"
|
|
fi
|
|
fi
|
|
}
|
|
|
|
# function: write rule to rdr.conf
|
|
persist_rdr_rule() {
|
|
if ! grep -qs "$1 $2 $3" "${bastille_jailsdir}/${JAIL_NAME}/rdr.conf"; then
|
|
echo "$1 $2 $3" >> "${bastille_jailsdir}/${JAIL_NAME}/rdr.conf"
|
|
fi
|
|
}
|
|
|
|
persist_rdr_log_rule() {
|
|
proto=$1;host_port=$2;jail_port=$3;
|
|
shift 3;
|
|
log=$@;
|
|
if ! grep -qs "$proto $host_port $jail_port $log" "${bastille_jailsdir}/${JAIL_NAME}/rdr.conf"; then
|
|
echo "$proto $host_port $jail_port $log" >> "${bastille_jailsdir}/${JAIL_NAME}/rdr.conf"
|
|
fi
|
|
}
|
|
|
|
|
|
# function: load rdr rule via pfctl
|
|
load_rdr_rule() {
|
|
( pfctl -a "rdr/${JAIL_NAME}" -Psn 2>/dev/null;
|
|
printf '%s\nrdr pass on $%s inet proto %s to port %s -> %s port %s\n' "$EXT_IF" "${bastille_network_pf_ext_if}" "$1" "$2" "$JAIL_IP" "$3" ) \
|
|
| pfctl -a "rdr/${JAIL_NAME}" -f-
|
|
if [ -n "$JAIL_IP6" ]; then
|
|
( pfctl -a "rdr/${JAIL_NAME}" -Psn 2>/dev/null;
|
|
printf '%s\nrdr pass on $%s inet proto %s to port %s -> %s port %s\n' "$EXT_IF" "${bastille_network_pf_ext_if}" "$1" "$2" "$JAIL_IP6" "$3" ) \
|
|
| pfctl -a "rdr/${JAIL_NAME}" -f-
|
|
fi
|
|
}
|
|
|
|
# function: load rdr rule with log via pfctl
|
|
load_rdr_log_rule() {
|
|
proto=$1;host_port=$2;jail_port=$3;
|
|
shift 3;
|
|
log=$@
|
|
( pfctl -a "rdr/${JAIL_NAME}" -Psn 2>/dev/null;
|
|
printf '%s\nrdr pass %s on $%s inet proto %s to port %s -> %s port %s\n' "$EXT_IF" "$log" "${bastille_network_pf_ext_if}" "$proto" "$host_port" "$JAIL_IP" "$jail_port" ) \
|
|
| pfctl -a "rdr/${JAIL_NAME}" -f-
|
|
if [ -n "$JAIL_IP6" ]; then
|
|
( pfctl -a "rdr/${JAIL_NAME}" -Psn 2>/dev/null;
|
|
printf '%s\nrdr pass %s on $%s inet proto %s to port %s -> %s port %s\n' "$EXT_IF" "$log" "${bastille_network_pf_ext_if}" "$proto" "$host_port" "$JAIL_IP6" "$jail_port" ) \
|
|
| pfctl -a "rdr/${JAIL_NAME}" -f-
|
|
fi
|
|
|
|
}
|
|
|
|
while [ $# -gt 0 ]; do
|
|
case "$1" in
|
|
list)
|
|
if [ "${TARGET}" = 'ALL' ]; then
|
|
for JAIL_NAME in $(ls "${bastille_jailsdir}" | sed "s/\n//g"); do
|
|
echo "${JAIL_NAME} redirects:"
|
|
pfctl -a "rdr/${JAIL_NAME}" -Psn 2>/dev/null
|
|
done
|
|
else
|
|
check_jail_validity
|
|
pfctl -a "rdr/${JAIL_NAME}" -Psn 2>/dev/null
|
|
fi
|
|
shift
|
|
;;
|
|
clear)
|
|
if [ "${TARGET}" = 'ALL' ]; then
|
|
for JAIL_NAME in $(ls "${bastille_jailsdir}" | sed "s/\n//g"); do
|
|
echo "${JAIL_NAME} redirects:"
|
|
pfctl -a "rdr/${JAIL_NAME}" -Fn
|
|
done
|
|
else
|
|
check_jail_validity
|
|
pfctl -a "rdr/${JAIL_NAME}" -Fn
|
|
fi
|
|
shift
|
|
;;
|
|
tcp|udp)
|
|
if [ $# -lt 3 ]; then
|
|
usage
|
|
elif [ $# -eq 3 ]; then
|
|
check_jail_validity
|
|
persist_rdr_rule $1 $2 $3
|
|
load_rdr_rule $1 $2 $3
|
|
shift 3
|
|
else
|
|
case "$4" in
|
|
log)
|
|
proto=$1
|
|
host_port=$2
|
|
jail_port=$3
|
|
shift 3
|
|
if [ $# -gt 3 ]; then
|
|
for last in "$@"; do
|
|
true
|
|
done
|
|
if [ "$2" = "(" ] && [ "$last" = ")" ] ; then
|
|
check_jail_validity
|
|
persist_rdr_log_rule "$proto" "$host_port" "$jail_port" "$@"
|
|
load_rdr_log_rule "$proto" "$host_port" "$jail_port" "$@"
|
|
shift $#
|
|
else
|
|
usage
|
|
fi
|
|
elif [ $# -eq 1 ]; then
|
|
check_jail_validity
|
|
persist_rdr_log_rule $proto $host_port $jail_port "$@"
|
|
load_rdr_log_rule $proto $host_port $jail_port "$@"
|
|
shift 1
|
|
else
|
|
usage
|
|
fi
|
|
;;
|
|
*)
|
|
usage
|
|
;;
|
|
esac
|
|
fi
|
|
;;
|
|
*)
|
|
usage
|
|
;;
|
|
esac
|
|
done
|