mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-28 11:43:25 +02:00
initscripts: add TCP DDoS XDP program init script
Signed-off-by: Vincent Li <vincent.mc.li@gmail.com>
This commit is contained in:
9
config/cfgroot/tcp-ddos-settings
Normal file
9
config/cfgroot/tcp-ddos-settings
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
22=off
|
||||||
|
ENABLE_TCP_DDOS=off
|
||||||
|
25=off
|
||||||
|
80=off
|
||||||
|
53=off
|
||||||
|
8080=off
|
||||||
|
8090=off
|
||||||
|
443=off
|
||||||
|
5555=off
|
||||||
8
config/cfgroot/tcp_ports
Normal file
8
config/cfgroot/tcp_ports
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
ssh 22/tcp # The Secure Shell (SSH) Protocol
|
||||||
|
smtp 25/tcp # Simple Mail Transfer
|
||||||
|
http 80/tcp # World Wide Web HTTP
|
||||||
|
https 443/tcp # http protocol over TLS/SSL
|
||||||
|
domain 53/tcp # Domain Name Server
|
||||||
|
httpalt 8080/tcp # HTTP Alternate (see port 80)
|
||||||
|
opsmessaging 8090/tcp # Vehicle to station messaging
|
||||||
|
userdefined 5555/tcp # Vehicle to station messaging
|
||||||
@@ -94,6 +94,7 @@ etc/rc.d/init.d/waitdrives
|
|||||||
etc/rc.d/init.d/wlanclient
|
etc/rc.d/init.d/wlanclient
|
||||||
etc/rc.d/init.d/xdptailcall
|
etc/rc.d/init.d/xdptailcall
|
||||||
etc/rc.d/init.d/ddos
|
etc/rc.d/init.d/ddos
|
||||||
|
etc/rc.d/init.d/tcp-ddos
|
||||||
#etc/rc.d/rc0.d
|
#etc/rc.d/rc0.d
|
||||||
etc/rc.d/rc0.d/K01grub-btrfsd
|
etc/rc.d/rc0.d/K01grub-btrfsd
|
||||||
#etc/rc.d/rc0.d/K01imspetor
|
#etc/rc.d/rc0.d/K01imspetor
|
||||||
|
|||||||
@@ -113,6 +113,8 @@ $(TARGET) :
|
|||||||
cp $(DIR_SRC)/config/fwhosts/customservices $(CONFIG_ROOT)/fwhosts/customservices.default
|
cp $(DIR_SRC)/config/fwhosts/customservices $(CONFIG_ROOT)/fwhosts/customservices.default
|
||||||
cp $(DIR_SRC)/config/cfgroot/xdptailcall-settings $(CONFIG_ROOT)/xdptailcall/settings
|
cp $(DIR_SRC)/config/cfgroot/xdptailcall-settings $(CONFIG_ROOT)/xdptailcall/settings
|
||||||
cp $(DIR_SRC)/config/cfgroot/ddos-settings $(CONFIG_ROOT)/ddos/settings
|
cp $(DIR_SRC)/config/cfgroot/ddos-settings $(CONFIG_ROOT)/ddos/settings
|
||||||
|
cp $(DIR_SRC)/config/cfgroot/tcp-ddos-settings $(CONFIG_ROOT)/ddos/tcp-ddos-settings
|
||||||
|
cp $(DIR_SRC)/config/cfgroot/tcp_ports $(CONFIG_ROOT)/ddos/tcp_ports
|
||||||
# Oneliner configfiles
|
# Oneliner configfiles
|
||||||
echo "ENABLED=off" > $(CONFIG_ROOT)/vpn/settings
|
echo "ENABLED=off" > $(CONFIG_ROOT)/vpn/settings
|
||||||
echo "01" > $(CONFIG_ROOT)/certs/serial
|
echo "01" > $(CONFIG_ROOT)/certs/serial
|
||||||
|
|||||||
112
src/initscripts/system/tcp-ddos
Executable file
112
src/initscripts/system/tcp-ddos
Executable file
@@ -0,0 +1,112 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
###############################################################################
|
||||||
|
# #
|
||||||
|
# IPFire.org - A linux based firewall #
|
||||||
|
# Copyright (C) 2007-2022 IPFire Team <info@ipfire.org> #
|
||||||
|
# Copyright (C) 2024-2025 BPFire <vincent.mc.li@gmail.com> #
|
||||||
|
# #
|
||||||
|
# This program is free software: you can redistribute it and/or modify #
|
||||||
|
# it under the terms of the GNU General Public License as published by #
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or #
|
||||||
|
# (at your option) any later version. #
|
||||||
|
# #
|
||||||
|
# This program is distributed in the hope that it will be useful, #
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of #
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
|
||||||
|
# GNU General Public License for more details. #
|
||||||
|
# #
|
||||||
|
# You should have received a copy of the GNU General Public License #
|
||||||
|
# along with this program. If not, see <http://www.gnu.org/licenses/>. #
|
||||||
|
# #
|
||||||
|
###############################################################################
|
||||||
|
|
||||||
|
. /etc/sysconfig/rc
|
||||||
|
. $rc_functions
|
||||||
|
|
||||||
|
eval $(/usr/local/bin/readhash /var/ipfire/ddos/tcp-ddos-settings)
|
||||||
|
|
||||||
|
MSSOPTS="--mss4 1460 --mss6 1440"
|
||||||
|
TTLOPTS="--ttl 64"
|
||||||
|
WSCALE="--wscale 0"
|
||||||
|
BPF_OBJECT_FILE="/usr/lib/bpf/xdp_synproxy.bpf.o"
|
||||||
|
PROG_NAME="syncookie_xdp"
|
||||||
|
MAP_PIN_PATH="/sys/fs/bpf/xdp-ddos/ddos_progs"
|
||||||
|
KEY=0
|
||||||
|
|
||||||
|
get_ports () {
|
||||||
|
# Define an empty variable to store the output
|
||||||
|
local output=""
|
||||||
|
local ddos_port_file="$1"
|
||||||
|
|
||||||
|
# Read the input file line by line
|
||||||
|
while IFS= read -r line; do
|
||||||
|
# Check if the line contains '=on'
|
||||||
|
if [[ "$line" == [0-9]*"=on" ]]; then
|
||||||
|
# Extract the service/port number
|
||||||
|
service=$(echo "$line" | cut -d'=' -f1)
|
||||||
|
# Append the service/port number to the output string
|
||||||
|
output="$output$service,"
|
||||||
|
fi
|
||||||
|
done < $ddos_port_file
|
||||||
|
|
||||||
|
# Remove the trailing comma from the output string
|
||||||
|
output="${output%,}"
|
||||||
|
echo $output
|
||||||
|
}
|
||||||
|
|
||||||
|
load_syncookie () {
|
||||||
|
sysctl -w net.ipv4.tcp_syncookies=1
|
||||||
|
sysctl -w net.ipv4.tcp_timestamps=1
|
||||||
|
sysctl -w net.netfilter.nf_conntrack_tcp_loose=0
|
||||||
|
/usr/sbin/xdp_ddos add $BPF_OBJECT_FILE $PROG_NAME $MAP_PIN_PATH $KEY
|
||||||
|
if [ $? -eq 0 ]; then
|
||||||
|
prog_id=$(bpftool prog | grep syncookie_xdp | awk '{print $1}' | cut -d':' -f1)
|
||||||
|
xdp_synproxy --prog $prog_id $MSSOPTS $WSCALE $TTLOPTS --ports="$tcp_ports"
|
||||||
|
else
|
||||||
|
boot_mesg "Error to load $BPF_OBJECT_FILE"
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
unload_syncookie () {
|
||||||
|
sysctl -w net.ipv4.tcp_syncookies=1
|
||||||
|
/usr/sbin/xdp_ddos del $MAP_PIN_PATH $KEY
|
||||||
|
if [ $? -eq 0 ]; then
|
||||||
|
boot_mesg "syncookie_xdp unloaded!"
|
||||||
|
else
|
||||||
|
boot_mesg "Error syncookie_xdp not unloaded!"
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
tcp_ports="$(get_ports /var/ipfire/ddos/tcp-ddos-settings)"
|
||||||
|
|
||||||
|
case "$1" in
|
||||||
|
start)
|
||||||
|
if [ ! -e /var/ipfire/red/active ]; then
|
||||||
|
boot_mesg " ERROR! Red0 interface not online!"
|
||||||
|
echo_warning
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
boot_mesg -n "Starting tcp ddos..."
|
||||||
|
if [ "$ENABLE_TCP_DDOS" == "on" ]; then
|
||||||
|
load_syncookie
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
|
||||||
|
stop)
|
||||||
|
boot_mesg "Stopping tcp ddos..."
|
||||||
|
if [ "$ENABLE_TCP_DDOS" == "off" ]; then
|
||||||
|
unload_syncookie
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
|
||||||
|
restart)
|
||||||
|
$0 stop
|
||||||
|
sleep 1
|
||||||
|
$0 start
|
||||||
|
;;
|
||||||
|
|
||||||
|
*)
|
||||||
|
echo "Usage: $0 {start|stop|restart}"
|
||||||
|
exit 1
|
||||||
|
;;
|
||||||
|
esac
|
||||||
Reference in New Issue
Block a user