suricata: Add rule to skip IPS if a packet has the bypass bit set

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
This commit is contained in:
Michael Tremer
2021-10-18 10:10:19 +00:00
committed by Arne Fitzenreiter
parent 855475580b
commit 49dd3e2946

View File

@@ -134,6 +134,12 @@ function generate_fw_rules {
# Flush the firewall chains.
flush_fw_chain
# Skip anything that has the bypass bit set
local chain
for chain in "${IPS_INPUT_CHAIN}" "${IPS_FORWARD_CHAIN}" "${IPS_OUTPUT_CHAIN}"; do
iptables -w -A "${chain}" -m mark --mark "${BYPASS_MARK}/${BYPASS_MASK}" -j RETURN
done
# Check if the array of enabled_ips_zones contains any elements.
if [[ ${enabled_ips_zones[@]} ]]; then
# Loop through the array and create firewall rules.