version 1.25, 2021/12/21 16:42:15
|
version 1.28, 2024/09/13 03:52:03
|
Line 82 sub firewall_open_port {
|
Line 82 sub firewall_open_port {
|
return 'inactive firewall' if (!&firewall_is_active()); |
return 'inactive firewall' if (!&firewall_is_active()); |
return 'port number unknown' if !$lond_port; |
return 'port number unknown' if !$lond_port; |
return 'invalid firewall chain' unless (ref($fw_chains) eq 'ARRAY'); |
return 'invalid firewall chain' unless (ref($fw_chains) eq 'ARRAY'); |
my (@opened,@okchains,$zone); |
my (@opened,@okchains,$zone,$firewalld_num_opened); |
if ($firewalld) { |
if ($firewalld) { |
$zone = &get_default_zone(); |
$zone = &get_default_zone(); |
return 'invalid zone' if ($zone eq ''); |
return 'invalid zone' if ($zone eq ''); |
|
$firewalld_num_opened = 0; |
} else { |
} else { |
my @badchains; |
my @badchains; |
foreach my $chain (@{$fw_chains}) { |
foreach my $chain (@{$fw_chains}) { |
Line 161 sub firewall_open_port {
|
Line 162 sub firewall_open_port {
|
close(PIPE); |
close(PIPE); |
if ($result eq 'success') { |
if ($result eq 'success') { |
push(@lond_port_open,$ip); |
push(@lond_port_open,$ip); |
|
$firewalld_num_opened ++; |
} else { |
} else { |
push(@port_error,$ip); |
push(@port_error,$ip); |
} |
} |
Line 242 sub firewall_open_port {
|
Line 244 sub firewall_open_port {
|
close(PIPE); |
close(PIPE); |
if ($result eq 'success') { |
if ($result eq 'success') { |
push(@opened,$port); |
push(@opened,$port); |
|
$firewalld_num_opened ++; |
} else { |
} else { |
$port_error = $port; |
$port_error = $port; |
} |
} |
Line 282 sub firewall_open_port {
|
Line 285 sub firewall_open_port {
|
} |
} |
} |
} |
} |
} |
|
if ($firewalld && $firewalld_num_opened) { |
|
system('firewall-cmd --runtime-to-permanent'); |
|
} |
foreach my $port (@{$ports}) { |
foreach my $port (@{$ports}) { |
if (!grep(/^\Q$port\E$/,@opened)) { |
if (!grep(/^\Q$port\E$/,@opened)) { |
return 'Required port not open: '.$port."\n"; |
return 'Required port not open: '.$port."\n"; |
Line 332 sub firewall_is_port_open {
|
Line 338 sub firewall_is_port_open {
|
while(<PIPE>) { |
while(<PIPE>) { |
if ($port eq $lond_port) { |
if ($port eq $lond_port) { |
if (ref($iphost) eq 'HASH') { |
if (ref($iphost) eq 'HASH') { |
if (/^ACCEPT\s+tcp\s+\-{2}\s+(\S+)\s+\S+\s+tcp\s+dpt\:\Q$port\E/) { |
if (/^ACCEPT\s+(?:tcp|6)\s+\-{2}\s+(\S+)\s+\S+\s+tcp\s+dpt\:\Q$port\E/) { |
my $ip = $1; |
my $ip = $1; |
if ($iphost->{$ip}) { |
if ($iphost->{$ip}) { |
$count ++; |
$count ++; |
Line 365 sub firewall_is_active {
|
Line 371 sub firewall_is_active {
|
} |
} |
close(PIPE); |
close(PIPE); |
} |
} |
|
unless ($status) { |
|
if (open(PIPE,'nft list tables |')) { |
|
while(<PIPE>) { |
|
chomp(); |
|
if (/filter$/) { |
|
$status = 1; |
|
last; |
|
} |
|
} |
|
close(PIPE); |
|
} |
|
} |
} |
} |
unless ($status) { |
unless ($status) { |
$status = &uses_firewalld(); |
$status = &uses_firewalld(); |
Line 377 sub firewall_close_port {
|
Line 395 sub firewall_close_port {
|
return 'inactive firewall' if (!&firewall_is_active()); |
return 'inactive firewall' if (!&firewall_is_active()); |
return 'port number unknown' if !$lond_port; |
return 'port number unknown' if !$lond_port; |
return 'invalid firewall chain' unless (ref($fw_chains) eq 'ARRAY'); |
return 'invalid firewall chain' unless (ref($fw_chains) eq 'ARRAY'); |
my (@okchains,$zone); |
my (@okchains,$zone,$firewalld_num_closed); |
if ($firewalld) { |
if ($firewalld) { |
$zone = &get_default_zone(); |
$zone = &get_default_zone(); |
return 'no default zone' if ($zone eq ''); |
return 'no default zone' if ($zone eq ''); |
|
$firewalld_num_closed = 0; |
} else { |
} else { |
my @badchains; |
my @badchains; |
foreach my $chain (@{$fw_chains}) { |
foreach my $chain (@{$fw_chains}) { |
Line 437 sub firewall_close_port {
|
Line 456 sub firewall_close_port {
|
close(PIPE); |
close(PIPE); |
if ($result eq 'success') { |
if ($result eq 'success') { |
push(@lond_port_close,$ip); |
push(@lond_port_close,$ip); |
|
$firewalld_num_closed ++; |
} else { |
} else { |
push(@port_error,$ip); |
push(@port_error,$ip); |
} |
} |
Line 458 sub firewall_close_port {
|
Line 478 sub firewall_close_port {
|
while (<PIPE>) { |
while (<PIPE>) { |
chomp(); |
chomp(); |
next unless (/dpt:\Q$port\E/); |
next unless (/dpt:\Q$port\E/); |
if (/^ACCEPT\s+tcp\s+\-{2}\s+(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s+/) { |
if (/^ACCEPT\s+(?:tcp|6)\s+\-{2}\s+(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s+/) { |
my $ip = $1; |
my $ip = $1; |
my $keepopen = 0; |
my $keepopen = 0; |
if (ref($iphost) eq 'HASH') { |
if (ref($iphost) eq 'HASH') { |
Line 525 sub firewall_close_port {
|
Line 545 sub firewall_close_port {
|
close(PIPE); |
close(PIPE); |
if ($result eq 'success') { |
if ($result eq 'success') { |
print "Port: $port closed in zone: $zone.\n"; |
print "Port: $port closed in zone: $zone.\n"; |
|
$firewalld_num_closed ++; |
} else { |
} else { |
print "Error closing port: $port in zone: $zone.\n"; |
print "Error closing port: $port in zone: $zone.\n"; |
} |
} |
Line 565 sub firewall_close_port {
|
Line 586 sub firewall_close_port {
|
} |
} |
} |
} |
} |
} |
|
if ($firewalld && $firewalld_num_closed) { |
|
system('firewall-cmd --runtime-to-permanent'); |
|
} |
return; |
return; |
} |
} |
|
|
Line 602 sub firewall_close_anywhere {
|
Line 626 sub firewall_close_anywhere {
|
close(PIPE); |
close(PIPE); |
if ($result eq 'success') { |
if ($result eq 'success') { |
print 'Port '.$port.' closed for source "anywhere"'."\n"; |
print 'Port '.$port.' closed for source "anywhere"'."\n"; |
|
system('firewall-cmd --runtime-to-permanent'); |
} else { |
} else { |
print 'Error closing port '.$port.' for source "anywhere".'."\n"; |
print 'Error closing port '.$port.' for source "anywhere".'."\n"; |
} |
} |
Line 613 sub firewall_close_anywhere {
|
Line 638 sub firewall_close_anywhere {
|
while (<PIPE>) { |
while (<PIPE>) { |
next unless (/dpt:\Q$port\E/); |
next unless (/dpt:\Q$port\E/); |
chomp(); |
chomp(); |
if (/^(\d+)\s+ACCEPT\s+tcp\s+\-{2}\s+0\.0\.0\.0\/0\s+0\.0\.0\.0\/0/) { |
if (/^(\d+)\s+ACCEPT\s+(?:tcp|6)\s+\-{2}\s+0\.0\.0\.0\/0\s+0\.0\.0\.0\/0/) { |
my $firewall_command = "$iptables -D $fw_chain $1"; |
my $firewall_command = "$iptables -D $fw_chain $1"; |
system($firewall_command); |
system($firewall_command); |
my $return_status = $?>>8; |
my $return_status = $?>>8; |