sync_iptables.pl 32 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752
  1. #!/usr/bin/perl
  2. #
  3. # Copyright (C) Roman Dmitriev, rnd@rajven.ru
  4. #
  5. use utf8;
  6. use warnings;
  7. use Encode;
  8. use open qw(:std :encoding(UTF-8));
  9. no warnings 'utf8';
  10. use English;
  11. use base;
  12. use FindBin '$Bin';
  13. use lib "/opt/Eye/scripts";
  14. use strict;
  15. use Time::Local;
  16. use FileHandle;
  17. use Data::Dumper;
  18. use eyelib::config;
  19. use eyelib::main;
  20. use eyelib::cmd;
  21. use Net::Patricia;
  22. use Date::Parse;
  23. use eyelib::net_utils;
  24. use eyelib::database;
  25. use eyelib::logconfig;
  26. use eyelib::common;
  27. use DBI;
  28. use Fcntl qw(:flock);
  29. use Net::DNS;
  30. use File::Path qw(make_path);
  31. #$debug = 1;
  32. open(SELF,"<",$0) or die "Cannot open $0 - $!";
  33. flock(SELF, LOCK_EX|LOCK_NB) or exit 1;
  34. $|=1;
  35. if (IsNotRun($SPID)) { Add_PID($SPID); } else { die "Warning!!! $SPID already running!\n"; }
  36. my $router_id = $ARGV[0];
  37. # ============================================================================
  38. # КОНСТАНТЫ ДЛЯ IPTABLES/IPSET
  39. # ============================================================================
  40. my $IPSET_CMD = '/usr/sbin/ipset';
  41. my $IPTABLES_CMD = '/usr/sbin/iptables';
  42. my $IPTABLES_TABLE_NAME = 'eye_acl';
  43. my $IPTABLES_CHAIN_PREFIX = 'EYE_';
  44. my $IPSET_SAVE_DIR = '/etc/ipset.d';
  45. my $IPSET_SAVE_EXTENSION = '.conf';
  46. # ============================================================================
  47. # ОСНОВНАЯ ЛОГИКА
  48. # ============================================================================
  49. my $gate = get_record_sql($dbh, 'SELECT * FROM devices WHERE id=?', $router_id );
  50. exit 100 if (!$gate);
  51. our %PROTO_NUMS;
  52. my $proto_loaded = 0;
  53. _load_protocols();
  54. my $gate_ident = $gate->{device_name}." [$gate->{ip}]:: ";
  55. my @cmd_list=();
  56. my @cmd_ipset_list=();
  57. my $router_name=$gate->{device_name};
  58. my $router_ip=$gate->{ip};
  59. my $connected_users_only = $gate->{connected_user_only};
  60. my @changed_ref=();
  61. # Лог начала обработки
  62. log_verbose($gate_ident."=== ACL Sync STARTED ===");
  63. log_info($gate_ident."Starting ACL synchronization for router $router_name [$router_ip]");
  64. # все сети роутера, которые к нему подключены по информации из БД
  65. my $connected_users = new Net::Patricia;
  66. my %connected_nets_hash;
  67. my %hotspot_exceptions;
  68. my @lan_int=();
  69. my @wan_int=();
  70. # настройки используемых l3-интерфейсов
  71. my %l3_interfaces;
  72. my @l3_int = get_records_sql($dbh,'SELECT * FROM device_l3_interfaces WHERE device_id=?',$gate->{'id'});
  73. foreach my $l3 (@l3_int) {
  74. $l3->{'name'}=~s/\"//g;
  75. $l3_interfaces{$l3->{'name'}}{type} = $l3->{'interface_type'};
  76. $l3_interfaces{$l3->{'name'}}{bandwidth} = 0;
  77. if ($l3->{'bandwidth'}) { $l3_interfaces{$l3->{'name'}}{bandwidth} = $l3->{'bandwidth'}; }
  78. if ($l3->{'interface_type'} eq '0') { push(@lan_int,$l3->{'name'}); }
  79. if ($l3->{'interface_type'} eq '1') { push(@wan_int,$l3->{'name'}); }
  80. }
  81. log_verbose($gate_ident."Loaded ".scalar(@l3_int)." L3 interfaces (".scalar(@lan_int)." LAN, ".scalar(@wan_int)." WAN)");
  82. # формируем список подключенных к роутеру сетей
  83. my @gw_subnets = get_records_sql($dbh,"SELECT gateway_subnets.*,subnets.subnet FROM gateway_subnets LEFT JOIN subnets ON gateway_subnets.subnet_id = subnets.id WHERE gateway_subnets.device_id=?",$gate->{'id'});
  84. if (@gw_subnets and scalar @gw_subnets) {
  85. foreach my $gw_subnet (@gw_subnets) {
  86. if ($gw_subnet and $gw_subnet->{'subnet'}) {
  87. $connected_users->add_string($gw_subnet->{'subnet'});
  88. $connected_nets_hash{$gw_subnet->{'subnet'}} = $gw_subnet;
  89. }
  90. }
  91. }
  92. log_verbose($gate_ident."Loaded ".scalar(@gw_subnets)." gateway subnets");
  93. my %users;
  94. my %lists;
  95. my $group_sql = "SELECT DISTINCT filter_group_id FROM user_auth WHERE deleted = 0 ORDER BY filter_group_id;";
  96. my @grouplist_ref = get_records_sql($dbh,$group_sql);
  97. foreach my $row (@grouplist_ref) {
  98. $lists{'group_'.$row->{filter_group_id}}=1;
  99. }
  100. $lists{'group_all'}=1;
  101. log_verbose($gate_ident."Loaded ".scalar(keys %lists)." filter groups");
  102. my $chains_created = 0;
  103. my $chains_removed = 0;
  104. my $rules_added = 0;
  105. my $rules_removed = 0;
  106. my $ipset_created = 0;
  107. my $ipset_added = 0;
  108. my $ipset_removed = 0;
  109. # ============================================================================
  110. # ACCESS LISTS CONFIG
  111. # ============================================================================
  112. if ($gate->{user_acl}) {
  113. log_verbose($gate_ident."Sync user state at router $router_name [".$router_ip."] started.");
  114. db_log_verbose($dbh,$gate_ident."Sync user state at router $router_name [".$router_ip."] started.");
  115. my $user_auth_sql="SELECT user_auth.ip, user_auth.filter_group_id, user_auth.id
  116. FROM user_auth, user_list
  117. WHERE user_auth.user_id = user_list.id
  118. AND user_auth.deleted =0
  119. AND user_auth.enabled =1
  120. AND user_auth.blocked =0
  121. AND user_list.blocked =0
  122. AND user_list.enabled =1
  123. AND user_auth.ou_id <> ?
  124. ORDER BY ip_int";
  125. my @authlist_ref = get_records_sql($dbh,$user_auth_sql,$default_hotspot_ou_id);
  126. foreach my $row (@authlist_ref) {
  127. if ($connected_users_only) { next if (!$connected_users->match_string($row->{ip})); }
  128. next if (!$office_networks->match_string($row->{ip}));
  129. $users{'group_'.$row->{filter_group_id}}->{$row->{ip}}=1;
  130. $users{'group_all'}->{$row->{ip}}=1;
  131. }
  132. # Подсчёт пользователей
  133. my $users_count = 0;
  134. foreach my $group (values %users) {
  135. $users_count += scalar keys %$group;
  136. }
  137. log_verbose($gate_ident."Loaded $users_count user IPs for ACL processing");
  138. log_debug($gate_ident."Users status by ACL:".Dumper(\%users));
  139. my @filter_instances = get_records_sql($dbh,"SELECT * FROM filter_instances");
  140. my @filter_ipsets = get_records_sql($dbh,"SELECT * FROM ipset_list");
  141. my @filterlist_ref = get_records_sql($dbh,"SELECT * FROM filter_list where filter_type=0");
  142. my %filters;
  143. my %dyn_filters;
  144. my $max_filter_rec = get_record_sql($dbh,"SELECT MAX(id) as max_filter FROM filter_list");
  145. my $max_filter_id = $max_filter_rec->{max_filter};
  146. my $dyn_filters_base = $max_filter_id+1000;
  147. my $dyn_filters_index = $dyn_filters_base;
  148. foreach my $row (@filterlist_ref) {
  149. if ($row->{ipset_id} && $row->{ipset_id}>0) {
  150. $filters{$row->{id}}->{id}=$row->{id};
  151. $filters{$row->{id}}->{proto}=$row->{proto};
  152. $filters{$row->{id}}->{dst}=undef;
  153. $filters{$row->{id}}->{ipset_id}=$row->{ipset_id};
  154. $filters{$row->{id}}->{dstport}=$row->{dstport};
  155. $filters{$row->{id}}->{srcport}=$row->{srcport};
  156. $filters{$row->{id}}->{dns_dst}=0;
  157. } else {
  158. if (is_ip($row->{dst})) {
  159. $filters{$row->{id}}->{id}=$row->{id};
  160. $filters{$row->{id}}->{ipset_id}=undef;
  161. $filters{$row->{id}}->{proto}=$row->{proto};
  162. $filters{$row->{id}}->{dst}=$row->{dst};
  163. $filters{$row->{id}}->{dstport}=$row->{dstport};
  164. $filters{$row->{id}}->{srcport}=$row->{srcport};
  165. $filters{$row->{id}}->{dns_dst}=0;
  166. } else {
  167. my @dns_record=ResolveNames($row->{dst},undef);
  168. my $resolved_ips = (scalar @dns_record>0);
  169. next if (!$resolved_ips);
  170. foreach my $resolved_ip (sort @dns_record) {
  171. next if (!$resolved_ip);
  172. $filters{$row->{id}}->{dns_dst}=1;
  173. $filters{$dyn_filters_index}->{id}=$row->{id};
  174. $filters{$dyn_filters_index}->{proto}=$row->{proto};
  175. $filters{$dyn_filters_index}->{dst}=$resolved_ip;
  176. $filters{$dyn_filters_index}->{ipset_id}=undef;
  177. $filters{$dyn_filters_index}->{dstport}=$row->{dstport};
  178. $filters{$dyn_filters_index}->{srcport}=$row->{srcport};
  179. $filters{$dyn_filters_index}->{dns_dst}=0;
  180. push(@{$dyn_filters{$row->{id}}},$dyn_filters_index);
  181. $dyn_filters_index++;
  182. }
  183. }
  184. }
  185. }
  186. log_debug($gate_ident."Filters status:". Dumper(\%filters));
  187. log_debug($gate_ident."DNS-filters status:". Dumper(\%dyn_filters));
  188. log_verbose($gate_ident."Loaded ".scalar(keys %filters)." filters (".scalar(keys %dyn_filters)." with DNS resolution)");
  189. do_sql($dbh,"DELETE FROM group_filters WHERE group_id NOT IN (SELECT id FROM group_list)");
  190. do_sql($dbh,"DELETE FROM group_filters WHERE filter_id NOT IN (SELECT id FROM filter_list)");
  191. my @groups_list = get_records_sql($dbh,"SELECT * FROM group_list");
  192. my %groups;
  193. foreach my $group (@groups_list) { $groups{'group_'.$group->{id}}=$group; }
  194. my @grouplist_ref = get_records_sql($dbh,"SELECT group_id,filter_id,rule_order,action FROM group_filters ORDER BY group_filters.group_id,group_filters.rule_order");
  195. my %group_filters;
  196. my $index = 0;
  197. my $cur_group;
  198. foreach my $row (@grouplist_ref) {
  199. if (!$cur_group) { $cur_group = $row->{group_id}; }
  200. if ($cur_group != $row->{group_id}) {
  201. $index = 0;
  202. $cur_group = $row->{group_id};
  203. }
  204. if (!$filters{$row->{filter_id}}->{dns_dst}) {
  205. $group_filters{'group_'.$row->{group_id}}->{$index}->{filter_id}=$row->{filter_id};
  206. $group_filters{'group_'.$row->{group_id}}->{$index}->{action}=$row->{action};
  207. $index++;
  208. } else {
  209. if (exists $dyn_filters{$row->{filter_id}}) {
  210. my @dyn_ips = @{$dyn_filters{$row->{filter_id}}};
  211. if (scalar @dyn_ips >0) {
  212. for (my $i = 0; $i < scalar @dyn_ips; $i++) {
  213. $group_filters{'group_'.$row->{group_id}}->{$index}->{filter_id}=$dyn_ips[$i];
  214. $group_filters{'group_'.$row->{group_id}}->{$index}->{action}=$row->{action};
  215. $index++;
  216. }
  217. }
  218. }
  219. }
  220. }
  221. log_debug($gate_ident."Group filters: ".Dumper(\%group_filters));
  222. log_verbose($gate_ident."Prepared ".scalar(keys %group_filters)." group filter configurations");
  223. # ============================================================================
  224. # СИНХРОНИЗАЦИЯ IPSET
  225. # ============================================================================
  226. my %cur_users;
  227. my %final_ipsets; # Хранилище для финальных IPset данных
  228. # Создаем таблицу ipset если не существует
  229. log_verbose($gate_ident."Ensure ipset exists: ${IPTABLES_TABLE_NAME}_group_all");
  230. push(@cmd_ipset_list, "$IPSET_CMD create ${IPTABLES_TABLE_NAME}_group_all hash:net family inet hashsize 1024 maxelem 2655360 2>/dev/null || true");
  231. # log_debug(Dumper(\%lists));
  232. foreach my $group_name (keys %lists) {
  233. my $set_name = $IPTABLES_TABLE_NAME . '_' . $group_name;
  234. log_verbose($gate_ident."Ensure ipset exists: $set_name");
  235. push(@cmd_ipset_list, "$IPSET_CMD create $set_name hash:net family inet hashsize 1024 maxelem 2655360 2>/dev/null || true");
  236. my @address_list = get_ipset_members($set_name);
  237. foreach my $ip (@address_list) {
  238. $cur_users{$group_name}{$ip} = 1;
  239. $final_ipsets{$group_name}{$ip} = 1; # Сохраняем в финальный хэш
  240. }
  241. log_verbose($gate_ident."Current ipset $group_name has ".scalar(@address_list)." entries");
  242. }
  243. # Добавляем новые IP
  244. foreach my $group_name (keys %users) {
  245. my $set_name = $IPTABLES_TABLE_NAME . '_' . $group_name;
  246. foreach my $user_ip (keys %{$users{$group_name}}) {
  247. if (!exists($cur_users{$group_name}{$user_ip})) {
  248. log_info($gate_ident."ADD ipset entry: $user_ip -> $group_name");
  249. db_log_verbose($dbh, $gate_ident."Add user with ip: $user_ip to ipset $group_name");
  250. push(@cmd_ipset_list, "$IPSET_CMD add $set_name $user_ip");
  251. $ipset_added++;
  252. }
  253. }
  254. }
  255. # Удаляем старые IP
  256. foreach my $group_name (keys %cur_users) {
  257. my $set_name = $IPTABLES_TABLE_NAME . '_' . $group_name;
  258. foreach my $user_ip (keys %{$cur_users{$group_name}}) {
  259. if (!exists($users{$group_name}{$user_ip})) {
  260. log_info($gate_ident."REMOVE ipset entry: $user_ip <- $group_name");
  261. db_log_verbose($dbh, $gate_ident."Remove user with ip: $user_ip from ipset $group_name");
  262. push(@cmd_ipset_list, "$IPSET_CMD del $set_name $user_ip");
  263. $ipset_removed++;
  264. }
  265. }
  266. }
  267. my %cur_ipset_members;
  268. my %ipset_members;
  269. my %ipset_list;
  270. foreach my $ipset_row (@filter_ipsets) {
  271. next if (!$ipset_row);
  272. $ipset_list{$ipset_row->{id}} = $ipset_row->{name};
  273. my @filter_ipset_members = get_records_sql($dbh,"SELECT * FROM ipset_members WHERE ipset_id=?", $ipset_row->{id});
  274. foreach my $ip_row (@filter_ipset_members) {
  275. $ipset_members{$ipset_row->{name}}{$ip_row->{ip}} = 1;
  276. $final_ipsets{$ipset_row->{name}}{$ip_row->{ip}} = 1; # Сохраняем в финальный хэш
  277. }
  278. log_verbose($gate_ident."Config ipset $ipset_row=>{name} has ".scalar(@filter_ipset_members)." entries");
  279. }
  280. # filter ipsets
  281. foreach my $ipset_row (@filter_ipsets) {
  282. next if (!$ipset_row);
  283. my $set_name = $IPTABLES_TABLE_NAME . '_' . $ipset_row->{name};
  284. log_verbose($gate_ident."Ensure ipset exists: $set_name");
  285. push(@cmd_ipset_list, "$IPSET_CMD create $set_name hash:net family inet hashsize 1024 maxelem 2655360 2>/dev/null || true");
  286. my @address_list = get_ipset_members($set_name);
  287. foreach my $ip (@address_list) { $cur_ipset_members{$ipset_row->{name}}{$ip} = 1; }
  288. log_verbose($gate_ident."Current ipset $ipset_row=>{name} has ".scalar(@address_list)." entries");
  289. }
  290. # Добавляем новые IP в фильтры
  291. foreach my $ipset_name (keys %ipset_members) {
  292. my $set_name = $IPTABLES_TABLE_NAME . '_' . $ipset_name;
  293. foreach my $ipset_member_ip (keys %{$ipset_members{$ipset_name}}) {
  294. if (!exists($cur_ipset_members{$ipset_name}{$ipset_member_ip})) {
  295. log_info($gate_ident."ADD ipset entry: $ipset_member_ip -> $ipset_name");
  296. db_log_verbose($dbh, $gate_ident."Add user with ip: $ipset_member_ip to ipset $ipset_name");
  297. push(@cmd_ipset_list, "$IPSET_CMD add $set_name $ipset_member_ip");
  298. $ipset_added++;
  299. }
  300. }
  301. }
  302. # Удаляем старые IP из фильтров
  303. foreach my $ipset_name (keys %cur_ipset_members) {
  304. my $set_name = $IPTABLES_TABLE_NAME . '_' . $ipset_name;
  305. foreach my $ipset_member_ip (keys %{$cur_ipset_members{$ipset_name}}) {
  306. if (!exists($ipset_members{$ipset_name}{$ipset_member_ip})) {
  307. log_info($gate_ident."REMOVE ipset entry: $ipset_member_ip <- $ipset_name");
  308. db_log_verbose($dbh, $gate_ident."Remove user with ip: $ipset_member_ip from ipset $ipset_name");
  309. push(@cmd_ipset_list, "$IPSET_CMD del $set_name $ipset_member_ip");
  310. $ipset_removed++;
  311. }
  312. }
  313. }
  314. log_verbose($gate_ident."IPset changes: $ipset_added added, $ipset_removed removed");
  315. # ============================================================================
  316. # СОХРАНЕНИЕ IPSET В ФАЙЛЫ
  317. # ============================================================================
  318. save_ipsets_to_files(\%final_ipsets);
  319. timestamp;
  320. # ========================================================================
  321. # СИНХРОНИЗАЦИЯ IPTABLES
  322. # ========================================================================
  323. foreach my $filter_instance (@filter_instances) {
  324. my $instance_name = 'Users';
  325. if ($filter_instance->{id}>1) {
  326. $instance_name = 'Users-'.$filter_instance->{name};
  327. my $instance_ok = get_record_sql($dbh,"SELECT * FROM device_filter_instances WHERE device_id= ? AND instance_id=?", $gate->{'id'}, $filter_instance->{id});
  328. if (!$instance_ok) {
  329. log_verbose($gate_ident."Skip filter instance '$instance_name' - not assigned to this device");
  330. next;
  331. }
  332. }
  333. # Создаем цепочку iptables если не существует
  334. my $chain_name = $IPTABLES_CHAIN_PREFIX . $instance_name;
  335. log_verbose($gate_ident."Ensure chain exists: $chain_name");
  336. push(@cmd_list, "$IPTABLES_CMD -N $chain_name 2>/dev/null || true");
  337. # Проверяем существующие цепочки для групп
  338. my %cur_chain = get_iptables_jumps($chain_name);
  339. # Удаляем старые цепочки
  340. foreach my $group_name (keys %cur_chain) {
  341. if (!exists($group_filters{$group_name}) or $groups{$group_name}->{instance_id} ne $filter_instance->{id}) {
  342. my $filter_chain_name = $IPTABLES_CHAIN_PREFIX . $group_name;
  343. my $user_ipset_group = $IPTABLES_TABLE_NAME . "_" . $group_name;
  344. log_info($gate_ident."REMOVE iptables chain link: $group_name -> $instance_name");
  345. push(@cmd_list, "$IPTABLES_CMD -D $chain_name -m set --match-set $user_ipset_group src -j $filter_chain_name");
  346. push(@cmd_list, "$IPTABLES_CMD -D $chain_name -m set --match-set $user_ipset_group dst -j $filter_chain_name");
  347. push(@cmd_list, "$IPTABLES_CMD -F $filter_chain_name 2>/dev/null");
  348. push(@cmd_list, "$IPTABLES_CMD -X $filter_chain_name 2>/dev/null");
  349. $chains_removed++;
  350. }
  351. }
  352. # Добавляем новые цепочки
  353. foreach my $group_name (keys %group_filters) {
  354. # Пропускаем фильтры, которых нет у пользователей данного шлюза
  355. next if (!exists $lists{$group_name});
  356. if (!exists($cur_chain{$group_name}) and $groups{$group_name}->{instance_id} eq $filter_instance->{id}) {
  357. my $filter_chain_name = $IPTABLES_CHAIN_PREFIX . $group_name;
  358. my $user_ipset_group = $IPTABLES_TABLE_NAME . "_" . $group_name;
  359. log_info($gate_ident."ADD iptables chain link: $group_name -> $instance_name");
  360. push(@cmd_list, "$IPTABLES_CMD -N $filter_chain_name 2>/dev/null || true");
  361. push(@cmd_list, "$IPTABLES_CMD -A $chain_name -m set --match-set $user_ipset_group src -j $filter_chain_name");
  362. push(@cmd_list, "$IPTABLES_CMD -A $chain_name -m set --match-set $user_ipset_group dst -j $filter_chain_name");
  363. $chains_created++;
  364. }
  365. }
  366. }
  367. # Формируем правила для цепочек
  368. my %chain_rules;
  369. foreach my $group_name (sort keys %group_filters) {
  370. next if (!$group_name);
  371. if (!exists $lists{$group_name}) {
  372. log_info($gate_ident."Filter group $group_name not found at users this device. Skip create");
  373. next;
  374. }
  375. my %group_filter = %{$group_filters{$group_name}};
  376. my $group_rules_count = 0;
  377. foreach my $filter_index (sort keys %group_filter) {
  378. my $filter = $group_filter{$filter_index};
  379. my $filter_id=$filter->{filter_id};
  380. next if (!$filters{$filter_id});
  381. next if ($filters{$filter_id}->{dns_dst});
  382. my $chain_name = $IPTABLES_CHAIN_PREFIX . $group_name;
  383. my $action = $filter->{action} ? 'ACCEPT' : 'REJECT';
  384. my $proto = $filters{$filter_id}->{proto};
  385. my $dstport = $filters{$filter_id}->{dstport} || 0;
  386. my $srcport = $filters{$filter_id}->{srcport} || 0;
  387. $dstport=~s/\-/:/g;
  388. $srcport=~s/\-/:/g;
  389. my $src_rule = '-A '.$chain_name;
  390. my $dst_rule = '-A '.$chain_name;
  391. if ($filters{$filter_id}->{proto} and ($filters{$filter_id}->{proto}!~/all/i)) {
  392. $src_rule=$src_rule." -p ".$filters{$filter_id}->{proto};
  393. $dst_rule=$dst_rule." -p ".$filters{$filter_id}->{proto};
  394. }
  395. if (defined $filters{$filter_id}->{ipset_id} && $filters{$filter_id}->{ipset_id}>0 && $ipset_list{$filters{$filter_id}->{ipset_id}}) {
  396. my $set_name = $IPTABLES_TABLE_NAME . '_' . $ipset_list{$filters{$filter_id}->{ipset_id}};
  397. $src_rule .= " -m set --match-set $set_name src";
  398. $dst_rule .= " -m set --match-set $set_name dst";
  399. } else {
  400. if ($filters{$filter_id}->{dst} and $filters{$filter_id}->{dst} ne '0/0' and $filters{$filter_id}->{dst} !~ /\/\d{1,2}/) { $filters{$filter_id}->{dst} .='/32'; }
  401. my $dst = $filters{$filter_id}->{dst};
  402. if (defined $dst && $dst ne '' && $dst ne '0/0') {
  403. $src_rule .= " -s $dst";
  404. $dst_rule .= " -d $dst";
  405. }
  406. }
  407. if ($dstport ne '0' and $srcport ne '0') {
  408. $src_rule=$src_rule." -m multiport --dports ".trim($srcport)." --sports ".trim($dstport);
  409. $dst_rule=$dst_rule." -m multiport --sports ".trim($srcport)." --dports ".trim($dstport);
  410. }
  411. if ($dstport eq '0' and $srcport ne '0') {
  412. $src_rule=$src_rule." -m multiport --dports ".trim($srcport);
  413. $dst_rule=$dst_rule." -m multiport --sports ".trim($srcport);
  414. }
  415. if ($dstport ne '0' and $srcport eq '0') {
  416. $src_rule=$src_rule." -m multiport --sports ".trim($dstport);
  417. $dst_rule=$dst_rule." -m multiport --dports ".trim($dstport);
  418. }
  419. if ($filter->{action}) {
  420. $src_rule=$src_rule." -j ACCEPT";
  421. $dst_rule=$dst_rule." -j ACCEPT";
  422. } else {
  423. $src_rule=$src_rule." -j REJECT --reject-with icmp-port-unreachable";
  424. $dst_rule=$dst_rule." -j REJECT --reject-with icmp-port-unreachable";
  425. }
  426. if ($src_rule ne $dst_rule) {
  427. push(@{$chain_rules{$group_name}},$src_rule);
  428. push(@{$chain_rules{$group_name}},$dst_rule);
  429. $group_rules_count += 2;
  430. } else {
  431. push(@{$chain_rules{$group_name}},$src_rule);
  432. $group_rules_count++;
  433. }
  434. }
  435. log_verbose($gate_ident."Prepared $group_rules_count rules for chain $IPTABLES_CHAIN_PREFIX$group_name");
  436. $rules_added += $group_rules_count;
  437. }
  438. # Применяем правила цепочек
  439. foreach my $group_name (sort keys %group_filters) {
  440. next if (!$group_name);
  441. next if (!exists $lists{$group_name});
  442. my $chain_name = $IPTABLES_CHAIN_PREFIX . $group_name;
  443. my @cur_filter = get_iptables_chain_rules($chain_name);
  444. my $chain_ok = 1;
  445. if (scalar @cur_filter != scalar @{$chain_rules{$group_name}}) {
  446. $chain_ok = 0;
  447. log_verbose($gate_ident."Chain $chain_name rules count mismatch (current: ".scalar(@cur_filter).", expected: ".scalar(@{$chain_rules{$group_name}}).")");
  448. } else {
  449. # Проверка текущих правил
  450. for (my $f_index=0; $f_index<scalar(@cur_filter); $f_index++) {
  451. my $filter_str = trim($cur_filter[$f_index]);
  452. my $expected = $chain_rules{$group_name}[$f_index];
  453. my $rules_ok = compare_iptables_rules($expected, $filter_str);
  454. if (!$rules_ok) {
  455. log_error($gate_ident."Check chain $chain_name error! Rule mismatch at position $f_index");
  456. log_verbose($gate_ident."Expected: $expected");
  457. log_verbose($gate_ident."Current: $filter_str");
  458. $chain_ok = 0;
  459. last;
  460. }
  461. }
  462. }
  463. if (!$chain_ok) {
  464. log_info($gate_ident."RECREATE iptables chain: $chain_name (".scalar(@{$chain_rules{$group_name}})." rules)");
  465. push(@cmd_list, "$IPTABLES_CMD -F $chain_name 2>/dev/null || true");
  466. push(@cmd_list, "$IPTABLES_CMD -N $chain_name 2>/dev/null || true");
  467. foreach my $filter_str (@{$chain_rules{$group_name}}) {
  468. push(@cmd_list, "$IPTABLES_CMD $filter_str");
  469. }
  470. } else {
  471. log_verbose($gate_ident."Chain $chain_name is up to date");
  472. }
  473. }
  474. log_verbose($gate_ident."IPTables chains: $chains_created created, $chains_removed removed, $rules_added rules total");
  475. }
  476. # ============================================================================
  477. # ВЫПОЛНЕНИЕ КОМАНД
  478. # ============================================================================
  479. my $cmd_executed = 0;
  480. my $cmd_failed = 0;
  481. log_verbose($gate_ident."Executing ipset ".scalar(@cmd_ipset_list)." commands...");
  482. foreach my $cmd (@cmd_ipset_list) {
  483. log_debug($gate_ident."EXEC: $cmd");
  484. my %result = do_exec_ref($cmd);
  485. $cmd_executed++;
  486. if (%result && $result{status} && $result{status} != 0) {
  487. log_error($gate_ident."Command failed (exit code $result{status}): $cmd");
  488. $cmd_failed++;
  489. }
  490. }
  491. log_verbose($gate_ident."Ipset ommands executed: $cmd_executed total, $cmd_failed failed");
  492. $cmd_executed = 0;
  493. $cmd_failed = 0;
  494. log_verbose($gate_ident."Executing iptables ".scalar(@cmd_list)." commands...");
  495. foreach my $cmd (@cmd_list) {
  496. log_debug($gate_ident."EXEC: $cmd");
  497. my %result = do_exec_ref($cmd);
  498. $cmd_executed++;
  499. if (%result && $result{status} && $result{status} != 0) {
  500. log_error($gate_ident."Command failed (exit code $result{status}): $cmd");
  501. $cmd_failed++;
  502. }
  503. }
  504. log_verbose($gate_ident."Iptables commands executed: $cmd_executed total, $cmd_failed failed");
  505. # ============================================================================
  506. # ЗАВЕРШЕНИЕ
  507. # ============================================================================
  508. if (IsMyPID($SPID)) { Remove_PID($SPID); };
  509. log_info($gate_ident."=== ACL Sync COMPLETED ===");
  510. log_verbose($gate_ident."Summary: chains=$chains_created created/$chains_removed removed, rules=$rules_added, ipset=$ipset_added added/$ipset_removed removed, commands=$cmd_executed executed/$cmd_failed failed");
  511. do_exit 0;
  512. # ============================================================================
  513. # ВСПОМОГАТЕЛЬНЫЕ ФУНКЦИИ
  514. # ============================================================================
  515. sub get_iptables_jumps {
  516. my ($chain) = @_;
  517. my %jumps;
  518. my %result = do_exec_ref("$IPTABLES_CMD --list-rules $chain");
  519. my $output = $result{output};
  520. my @lines = split(/\n/, $output);
  521. foreach my $line (@lines) {
  522. next if ($line !~/^\-A\s+/);
  523. if ($line =~ /\-j\s+(\S+)$/) {
  524. my $target = $1;
  525. $target =~ s/^${IPTABLES_CHAIN_PREFIX}//;
  526. $jumps{$target}++ if ($target);
  527. }
  528. }
  529. log_debug($gate_ident."Get target chain for $chain: ".Dumper(\%jumps));
  530. return %jumps;
  531. }
  532. sub get_iptables_chain_rules {
  533. my ($chain) = @_;
  534. my @rules;
  535. my %result = do_exec_ref("$IPTABLES_CMD --list-rules $chain");
  536. my $output = $result{output};
  537. my @lines = split(/\n/, $output);
  538. foreach my $line (@lines) {
  539. next if ($line !~ /^\-A/);
  540. push(@rules, trim($line));
  541. }
  542. log_debug($gate_ident."Current rules for $chain: ".Dumper(\@rules));
  543. return @rules;
  544. }
  545. sub get_ipset_members {
  546. my ($set_name) = @_;
  547. my @members;
  548. my %result = do_exec_ref("$IPSET_CMD list $set_name");
  549. if ($result{status} != 0) {
  550. do_exec("$IPSET_CMD create $set_name hash:net family inet hashsize 1024 maxelem 2655360 2>/dev/null || true");
  551. do_exec("$IPSET_CMD flush $set_name 2>/dev/null || true");
  552. return @members;
  553. }
  554. my $output = $result{output};
  555. while ($output =~ /^(\d+\.\d+\.\d+\.\d+(?:\/\d+)?)\s*$/gm) {
  556. push(@members, $1);
  557. }
  558. log_debug($gate_ident."Current ipset $set_name members:".Dumper(\@members));
  559. return @members;
  560. }
  561. # ============================================================================
  562. # ФУНКЦИИ ДЛЯ СОХРАНЕНИЯ IPSET В ФАЙЛЫ
  563. # ============================================================================
  564. sub save_ipsets_to_files {
  565. my ($ipsets_ref) = @_;
  566. # Создаем директорию если не существует
  567. unless (-d $IPSET_SAVE_DIR) {
  568. make_path($IPSET_SAVE_DIR) or die "Cannot create $IPSET_SAVE_DIR: $!";
  569. log_verbose($gate_ident."Created directory: $IPSET_SAVE_DIR");
  570. }
  571. # Сохраняем каждый ipset в отдельный файл
  572. my $files_saved = 0;
  573. foreach my $group_name (sort keys %$ipsets_ref) {
  574. my $set_name = $IPTABLES_TABLE_NAME . '_' . $group_name;
  575. my $filename = $IPSET_SAVE_DIR . '/' . $group_name . $IPSET_SAVE_EXTENSION;
  576. my $fh = FileHandle->new();
  577. if ($fh->open(">$filename")) {
  578. # Заголовок файла с метаинформацией
  579. print $fh "# ipset configuration file\n";
  580. print $fh "# Generated: " . scalar(localtime) . "\n";
  581. print $fh "# Router: $router_name ($router_ip)\n";
  582. print $fh "# Set name: $set_name\n";
  583. print $fh "#\n\n";
  584. print $fh "create $set_name hash:net family inet hashsize 1024 maxelem 2655360\n";
  585. # Добавляем все IP адреса
  586. foreach my $ip (sort keys %{$ipsets_ref->{$group_name}}) {
  587. print $fh "add $set_name $ip\n";
  588. }
  589. $fh->close();
  590. log_verbose($gate_ident."Saved ipset $group_name to $filename (".scalar(keys %{$ipsets_ref->{$group_name}})." entries)");
  591. log_info($gate_ident."SAVE ipset file: $filename (".scalar(keys %{$ipsets_ref->{$group_name}})." entries)");
  592. $files_saved++;
  593. } else {
  594. log_error($gate_ident."ERROR: Cannot write to $filename: $!");
  595. }
  596. }
  597. log_verbose($gate_ident."Saved $files_saved ipset configuration files");
  598. }
  599. sub compare_iptables_rules {
  600. my ($r1, $r2) = @_;
  601. return 1 if $r1 eq $r2;
  602. return 0 if !defined $r1;
  603. return 0 if !defined $r2;
  604. my $normalize = sub {
  605. my ($rule) = @_;
  606. my @parts;
  607. # Режем строго перед флагами (-x или --xx). Аргументы остаются в том же блоке.
  608. for my $block (grep { $_ } split(/\s+(?=-(?:-)?[a-z])/i, $rule)) {
  609. $block =~ s/^\s+|\s+$//g;
  610. $block = lc($block);
  611. if ($block =~ /^(!?\s*-[\w-]+)\s*(.*)/) {
  612. my ($flag, $val) = ($1, $2);
  613. $flag =~ s/\s+//g; # ! -p -> !-p
  614. $val =~ s/\s+/ /g; # схлопываем внутренние пробелы
  615. # Обработка -p: имя -> число, если найдено в /etc/protocols
  616. if ($flag eq '-p' || $flag eq '!-p') {
  617. $val = $PROTO_NUMS{$val} if exists $PROTO_NUMS{$val};
  618. }
  619. push @parts, "$flag=$val";
  620. }
  621. }
  622. return sort @parts;
  623. };
  624. my @n1 = $normalize->($r1);
  625. my @n2 = $normalize->($r2);
  626. # Длина массивов + посимвольное равенство отсортированных списков
  627. return @n1 == @n2 && join(' ', @n1) eq join(' ', @n2);
  628. }
  629. sub _load_protocols {
  630. return if $proto_loaded;
  631. open my $fh, '<', '/etc/protocols' or return;
  632. while (<$fh>) {
  633. chomp; s/#.*//; s/^\s+|\s+$//g; next unless length;
  634. my @p = split(/\s+/); next if @p < 2;
  635. # Мапим официальное имя и все алиасы (регистронезависимо) на число
  636. $PROTO_NUMS{lc($_)} = $p[1] for @p;
  637. }
  638. close $fh; $proto_loaded = 1;
  639. }