ipsec-policy: Correct open ports for connections on aliases

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
This commit is contained in:
Michael Tremer
2019-01-21 16:33:53 +00:00
parent ae0d069827
commit c32fc72e36

View File

@@ -24,10 +24,10 @@ VPN_CONFIG="/var/ipfire/vpn/config"
eval $(/usr/local/bin/readhash /var/ipfire/vpn/settings) eval $(/usr/local/bin/readhash /var/ipfire/vpn/settings)
VARS=( VARS=(
id status name lefthost type ctype x1 x2 x3 leftsubnets id status name lefthost type ctype psk local x1 leftsubnets
remote righthost rightsubnets x5 x6 x7 x8 x9 x10 x11 x12 x2 remote rightsubnets x3 x4 x5 x6 x7 x8 x9 x10 x11 x12
x13 x14 x15 x16 x17 x18 x19 x20 x21 proto x22 x23 x24 x13 x14 x15 x16 x17 x18 x19 proto x20 x21 x22
route x26 mode interface_mode interface_address interface_mtu rest route x23 mode interface_mode interface_address interface_mtu rest
) )
block_subnet() { block_subnet() {
@@ -82,15 +82,20 @@ install_policy() {
# Check if this a net-to-net connection # Check if this a net-to-net connection
[ "${type}" = "net" ] || continue [ "${type}" = "net" ] || continue
# Default local to 0.0.0.0/0
if [ "${local}" = "" -o "${local}" = "off" ]; then
local="0.0.0.0/0"
fi
# Install permissions for GRE traffic # Install permissions for GRE traffic
case "${interface_mode}" in case "${interface_mode}" in
gre) gre)
if [ -n "${remote}" ]; then if [ -n "${remote}" ]; then
iptables -A IPSECINPUT -p gre \ iptables -A IPSECINPUT -p gre \
-s "${remote}" -j ACCEPT -s "${remote}" -d "${local}" -j ACCEPT
iptables -A IPSECOUTPUT -p gre \ iptables -A IPSECOUTPUT -p gre \
-d "${remote}" -j ACCEPT -s "${local}" -d "${remote}" -j ACCEPT
fi fi
;; ;;
esac esac