From 97c5a05efa49dad6c7aa4721e87d62da67dd1ecb Mon Sep 17 00:00:00 2001 From: Jarod Pauchet Date: Thu, 4 Apr 2024 14:25:22 +0200 Subject: [PATCH] =?UTF-8?q?=09nouveau=20fichier=C2=A0:=20siotp/sisr1/TP7/s?= =?UTF-8?q?criptsnft/current=5Fruleset.nft=20=09nouveau=20fichier=C2=A0:?= =?UTF-8?q?=20siotp/sisr1/TP7/scriptsnft/fw=5Fpart1.nft=20=09nouveau=20fic?= =?UTF-8?q?hier=C2=A0:=20siotp/sisr1/TP7/scriptsnft/fw=5Fpart2.nft=20=09no?= =?UTF-8?q?uveau=20fichier=C2=A0:=20siotp/sisr1/TP7/scriptsnft/fw=5Fpart3.?= =?UTF-8?q?nft=20=09nouveau=20fichier=C2=A0:=20siotp/sisr1/TP7/scriptsnft/?= =?UTF-8?q?refresh=5Ffirewall.sh?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../sisr1/TP7/scriptsnft/current_ruleset.nft | 68 +++++++++++++++++++ siotp/sisr1/TP7/scriptsnft/fw_part1.nft | 18 +++++ siotp/sisr1/TP7/scriptsnft/fw_part2.nft | 34 ++++++++++ siotp/sisr1/TP7/scriptsnft/fw_part3.nft | 41 +++++++++++ .../sisr1/TP7/scriptsnft/refresh_firewall.sh | 7 ++ 5 files changed, 168 insertions(+) create mode 100644 siotp/sisr1/TP7/scriptsnft/current_ruleset.nft create mode 100644 siotp/sisr1/TP7/scriptsnft/fw_part1.nft create mode 100644 siotp/sisr1/TP7/scriptsnft/fw_part2.nft create mode 100644 siotp/sisr1/TP7/scriptsnft/fw_part3.nft create mode 100644 siotp/sisr1/TP7/scriptsnft/refresh_firewall.sh diff --git a/siotp/sisr1/TP7/scriptsnft/current_ruleset.nft b/siotp/sisr1/TP7/scriptsnft/current_ruleset.nft new file mode 100644 index 0000000..f88dcdc --- /dev/null +++ b/siotp/sisr1/TP7/scriptsnft/current_ruleset.nft @@ -0,0 +1,68 @@ +define netif = enp0s3 +define dmzif = enp0s8 +define lanif = enp0s9 + +define firewall = 192.168.0.140 +define ipdmz = 172.16.0.254 +define iplan = 10.0.0.254 + +table ip ipfilter{ + chain prerouting { + type filter hook prerouting priority filter; policy drop; + icmp type echo-reply accept + ct state established, related accept + icmp type echo-request iif {$lanif} ip daddr 172.16.0.1-172.16.0.254 accept + icmp type echo-request iif {$lanif} ip daddr {$iplan} accept + tcp dport 20 accept + tcp dport 21 accept + tcp dport {80, 443} accept + tcp dport 22 accept + ip saddr 10.121.38.1 tcp dport {80, 443} accept + } + chain system_in { + type filter hook input priority filter; policy drop; + icmp type echo-reply accept + icmp type echo-request iif {$lanif} accept + ct state established, related accept + tcp dport 20 accept + tcp dport 21 accept + tcp dport {80, 443} accept + tcp dport 22 accept + ip saddr 10.121.38.1 tcp dport {80, 443} accept + } + chain routing { + type filter hook forward priority filter; policy drop; + icmp type echo-request iif {$lanif} oif {$dmzif} accept + icmp type echo-reply iif {$dmzif} oif {$lanif} accept + } + chain system_out { + type filter hook output priority filter; policy drop; + ip daddr 10.121.38.7-10.121.38.8 accept + ip daddr 10.121.38.1 tcp dport 8080 accept + icmp type echo-reply oif {$lanif} accept + icmp type echo-request accept + tcp dport 20 accept + tcp sport 20 accept + tcp dport 21 accept + tcp sport 21 accept + tcp dport {80, 443} accept + tcp sport {80, 443} accept + tcp sport 22 accept + } + chain postrouting { + type filter hook postrouting priority filter; policy drop; + ip daddr 10.121.38.7-10.121.38.8 accept + ip daddr 10.121.38.1 tcp dport 8080 accept + icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept + icmp type echo-reply iif {$dmzif} oif {$lanif} accept + icmp type echo-request iif {$lanif} oif {$dmzif} accept + icmp type echo-request ip saddr $iplan oif $lanif accept + tcp dport 20 accept + tcp sport 20 accept + tcp dport 21 accept + tcp sport 21 accept + tcp dport {80, 443} accept + tcp sport {80, 443} accept + tcp sport 22 accept + } +} diff --git a/siotp/sisr1/TP7/scriptsnft/fw_part1.nft b/siotp/sisr1/TP7/scriptsnft/fw_part1.nft new file mode 100644 index 0000000..5302461 --- /dev/null +++ b/siotp/sisr1/TP7/scriptsnft/fw_part1.nft @@ -0,0 +1,18 @@ +define netif = enp0s3 +define dmzif = enp0s8 +define lanif = enp0s9 + + +table ip ipfilter { + chain routing { + type filter hook forward priority filter; policy accept; + icmp type echo-request iif { "$netif", "$dmzif" } drop + icmp type { echo-reply, echo-request } accept + drop + } + + chain system_in { + type filter hook input priority filter; policy accept; + icmp type echo-request iif { "$netif", "$dmzif" } drop + } +} diff --git a/siotp/sisr1/TP7/scriptsnft/fw_part2.nft b/siotp/sisr1/TP7/scriptsnft/fw_part2.nft new file mode 100644 index 0000000..adf0209 --- /dev/null +++ b/siotp/sisr1/TP7/scriptsnft/fw_part2.nft @@ -0,0 +1,34 @@ +define netif = enp0s3 +define dmzif = enp0s8 +define lanif = enp0s9 + + +table ip ipfilter { + + chain prerouting { + type filter hook prerouting priority filter; policy drop; + tcp dport 22 accept + } + + chain routing { + type filter hook forward priority filter; policy drop; + icmp type echo-request iif { $netif, $dmzif } drop + icmp type { echo-reply, echo-request } accept + } + + chain system_in { + type filter hook input priority filter; policy drop; + icmp type echo-request iif { $netif, $dmzif } drop + tcp dport 22 accept + } + + chain system_out { + type filter hook output priority filter; policy drop; + tcp sport 22 accept + } + + chain postrouting { + type filter hook postrouting priority filter; policy drop; + tcp sport 22 accept + } +} diff --git a/siotp/sisr1/TP7/scriptsnft/fw_part3.nft b/siotp/sisr1/TP7/scriptsnft/fw_part3.nft new file mode 100644 index 0000000..ed18634 --- /dev/null +++ b/siotp/sisr1/TP7/scriptsnft/fw_part3.nft @@ -0,0 +1,41 @@ +define netif = enp0s3 +define dmzif = enp0s8 +define lanif = enp0s9 +define netip = 192.168.0.140 +define dmzip = 172.16.0.254 +define lanip = 10.0.0.254 + +table ip ipfilter{ + chain prerouting { + type filter hook prerouting priority filter; policy drop; + icmp type echo-request iif $lanif ip daddr 172.16.0.1-172.16.0.254 accept + icmp type echo-request iif $lanif ip daddr $lanip accept + icmp type echo-reply accept + tcp dport 22 accept + } + chain system_in { + type filter hook input priority filter; policy drop; + icmp type echo-request iif $lanif accept + icmp type echo-reply accept + tcp dport 22 accept + } + chain routing { + type filter hook forward priority filter; policy drop; + icmp type echo-request iif $lanif oif $dmzif accept + icmp type echo-reply iif $dmzif oif $lanif accept + } + chain system_out { + type filter hook output priority filter; policy drop; + icmp type echo-request accept + icmp type echo-reply oif $lanif accept + tcp sport 22 accept + } + chain postrouting { + type filter hook postrouting priority filter; policy drop; + icmp type echo-request ip saddr {$lanip , $dmzip , $netip } accept + icmp type echo-request iif $lanif oif $dmzif accept + icmp type echo-reply iif $dmzif oif $lanif accept + icmp type echo-reply ip saddr $lanip oif $lanif accept + tcp sport 22 accept + } +} diff --git a/siotp/sisr1/TP7/scriptsnft/refresh_firewall.sh b/siotp/sisr1/TP7/scriptsnft/refresh_firewall.sh new file mode 100644 index 0000000..070243f --- /dev/null +++ b/siotp/sisr1/TP7/scriptsnft/refresh_firewall.sh @@ -0,0 +1,7 @@ +#!/bin/bash +# active le routage entre les interfaces réseau du firewall +echo "1" > /proc/sys/net/ipv4/ip_forward +#vide les règles actuelles du pare-feu +nft flush ruleset +#charge les règles du pare-feu présentes dans le fichier +nft -f /root/scriptsnft/current_ruleset.nft