sync_iptables.pl 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364
  1. #!/usr/bin/perl -w
  2. #
  3. # Copyright (C) Roman Dmitiriev, rnd@rajven.ru
  4. #
  5. use FindBin '$Bin';
  6. use lib "$Bin/";
  7. use strict;
  8. use Time::Local;
  9. use FileHandle;
  10. use Data::Dumper;
  11. use eyelib::config;
  12. use eyelib::main;
  13. use eyelib::cmd;
  14. use Net::Patricia;
  15. use Date::Parse;
  16. use eyelib::net_utils;
  17. use eyelib::database;
  18. use IPTables::libiptc;
  19. use DBI;
  20. use utf8;
  21. use open ":encoding(utf8)";
  22. use Net::DNS;
  23. #exit;
  24. $|=1;
  25. my $gate = get_record_sql($dbh,"SELECT * FROM devices WHERE device_type=2 and user_acl=1 and deleted=0 and vendor_id=19 and device_name='".$HOSTNAME."'");
  26. if (!$gate) { exit 0; }
  27. my $router_name=$gate->{device_name};
  28. my $router_ip=$gate->{ip};
  29. my $shaper_enabled = $gate->{queue_enabled};
  30. my $connected_users_only = $gate->{connected_user_only};
  31. my @lan_int=();
  32. my @wan_int=();
  33. my @l3_int = get_records_sql($dbh,'SELECT * FROM device_l3_interfaces WHERE device_id='.$gate->{'id'});
  34. foreach my $l3 (@l3_int) {
  35. if ($l3->{'interface_type'} eq '0') { push(@lan_int,$l3->{'name'}); }
  36. if ($l3->{'interface_type'} eq '1') { push(@wan_int,$l3->{'name'}); }
  37. }
  38. my $connected_users = new Net::Patricia;
  39. if ($connected_users_only) {
  40. foreach my $int (@lan_int) {
  41. $int=trim($int);
  42. next if (!$int);
  43. #get ip addr at interface
  44. foreach my $int_str (@lan_int) {
  45. $int_str=trim($int_str);
  46. my $int_addr=do_exec('/sbin/ip addr show '.$int_str.' | grep "scope global"');
  47. foreach my $address (split(/\n/,$int_addr)) {
  48. if ($address=~/inet\s+(.*)\s+brd/i) {
  49. if ($1) { $connected_users->add_string($1); }
  50. }
  51. }
  52. }
  53. }
  54. }
  55. db_log_verbose($dbh,"Sync user state at router $router_name started.");
  56. #get userid list
  57. my $user_auth_sql="SELECT user_auth.ip, user_auth.filter_group_id, user_auth.queue_id, user_auth.id
  58. FROM user_auth, user_list
  59. WHERE user_auth.user_id = user_list.id
  60. AND user_auth.deleted =0
  61. AND user_auth.enabled =1
  62. AND user_auth.blocked =0
  63. AND user_list.blocked =0
  64. AND user_list.enabled =1
  65. AND user_auth.ou_id <> $default_hotspot_ou_id
  66. ORDER BY ip_int";
  67. my @authlist_ref = get_records_sql($dbh,$user_auth_sql);
  68. my %users;
  69. my %lists;
  70. my %found_users;
  71. foreach my $row (@authlist_ref) {
  72. if ($connected_users_only) { next if (!$connected_users->match_string($row->{ip})); }
  73. #skip not office ip's
  74. next if (!$office_networks->match_string($row->{ip}));
  75. $found_users{$row->{'id'}}=$row->{ip};
  76. #filter group acl's
  77. $users{'group_'.$row->{filter_group_id}}->{$row->{ip}}=1;
  78. $users{'group_all'}->{$row->{ip}}=1;
  79. $lists{'group_'.$row->{filter_group_id}}=1;
  80. #queue acl's
  81. if ($row->{queue_id}) { $users{'queue_'.$row->{queue_id}}->{$row->{ip}}=1; }
  82. }
  83. log_debug("Users status:".Dumper(\%users));
  84. #full list
  85. $lists{'group_all'}=1;
  86. #get queue list
  87. my @queuelist_ref = get_records_sql($dbh,"SELECT * FROM queue_list");
  88. my %queues;
  89. foreach my $row (@queuelist_ref) {
  90. $lists{'queue_'.$row->{id}}=1;
  91. next if ((!$row->{Download}) and !($row->{Upload}));
  92. $queues{'queue_'.$row->{id}}{id}=$row->{id};
  93. $queues{'queue_'.$row->{id}}{down}=$row->{Download};
  94. $queues{'queue_'.$row->{id}}{up}=$row->{Upload};
  95. }
  96. log_debug("Queues status:".Dumper(\%queues));
  97. my @filterlist_ref = get_records_sql($dbh,"SELECT * FROM filter_list where type=0");
  98. my %filters;
  99. my %dyn_filters;
  100. my $max_filter_rec = get_record_sql($dbh,"SELECT MAX(id) FROM filter_list");
  101. my $max_filter_id = $max_filter_rec->{id};
  102. my $dyn_filters_base = $max_filter_id+1000;
  103. my $dyn_filters_index = $dyn_filters_base;
  104. foreach my $row (@filterlist_ref) {
  105. #if dst - ip address
  106. if (is_ip($row->{dst})) {
  107. $filters{$row->{id}}->{id}=$row->{id};
  108. $filters{$row->{id}}->{proto}=$row->{proto};
  109. $filters{$row->{id}}->{dst}=$row->{dst};
  110. $filters{$row->{id}}->{dstport}=$row->{dstport};
  111. $filters{$row->{id}}->{srcport}=$row->{srcport};
  112. #set false for dns dst flag
  113. $filters{$row->{id}}->{dns_dst}=0;
  114. } else {
  115. #if dst not ip - check dns record
  116. my @dns_record=ResolveNames($row->{dst},undef);
  117. my $resolved_ips = (scalar @dns_record>0);
  118. next if (!$resolved_ips);
  119. foreach my $resolved_ip (sort @dns_record) {
  120. next if (!$resolved_ip);
  121. #enable dns dst filters
  122. $filters{$row->{id}}->{dns_dst}=1;
  123. #add dynamic dns filter
  124. $filters{$dyn_filters_index}->{id}=$row->{id};
  125. $filters{$dyn_filters_index}->{proto}=$row->{proto};
  126. $filters{$dyn_filters_index}->{dst}=$resolved_ip;
  127. $filters{$dyn_filters_index}->{dstport}=$row->{dstport};
  128. $filters{$dyn_filters_index}->{srcport}=$row->{srcport};
  129. $filters{$dyn_filters_index}->{dns_dst}=0;
  130. #save new filter dns id for original filter id
  131. push(@{$dyn_filters{$row->{id}}},$dyn_filters_index);
  132. $dyn_filters_index++;
  133. }
  134. }
  135. }
  136. log_debug("Filters status:". Dumper(\%filters));
  137. log_debug("DNS-filters status:". Dumper(\%dyn_filters));
  138. #clean unused filter records
  139. do_sql($dbh,"DELETE FROM group_filters WHERE group_id NOT IN (SELECT id FROM group_list)");
  140. do_sql($dbh,"DELETE FROM group_filters WHERE filter_id NOT IN (SELECT id FROM filter_list)");
  141. my @grouplist_ref = get_records_sql($dbh,"SELECT group_id,filter_id,rule_order,action FROM group_filters ORDER BY group_filters.group_id,group_filters.rule_order");
  142. my %group_filters;
  143. my $index=0;
  144. foreach my $row (@grouplist_ref) {
  145. #if dst dns filter not found
  146. if (!$filters{$row->{filter_id}}->{dns_dst}) {
  147. $group_filters{'group_'.$row->{group_id}}->{$index}->{filter_id}=$row->{filter_id};
  148. $group_filters{'group_'.$row->{group_id}}->{$index}->{action}=$row->{action};
  149. $index++;
  150. } else {
  151. #if found dns dst filters - add
  152. if (exists $dyn_filters{$row->{filter_id}}) {
  153. my @dyn_ips = @{$dyn_filters{$row->{filter_id}}};
  154. if (scalar @dyn_ips >0) {
  155. for (my $i = 0; $i < scalar @dyn_ips; $i++) {
  156. $group_filters{'group_'.$row->{group_id}}->{$index}->{filter_id}=$dyn_ips[$i];
  157. $group_filters{'group_'.$row->{group_id}}->{$index}->{action}=$row->{action};
  158. $index++;
  159. }
  160. }
  161. }
  162. }
  163. }
  164. log_debug("Group filters: ".Dumper(\%group_filters));
  165. my %cur_users;
  166. my @new_iptables_users=();
  167. foreach my $group_name (keys %lists) {
  168. #new users chains
  169. push(@new_iptables_users,"-A USERS -m set --match-set $group_name src -j $group_name");
  170. push(@new_iptables_users,"-A USERS -m set --match-set $group_name dst -j $group_name");
  171. #current user chains members
  172. my $address_lists=do_exec('/sbin/ipset list '.$group_name.' 2>/dev/null');
  173. $cur_users{$group_name}{found}=0;
  174. foreach my $row (split(/\n/,$address_lists)) {
  175. $row=trim($row);
  176. next if (!$row);
  177. if ($row=~/^Error$/i) { $cur_users{$group_name}{found}=0; last; }
  178. next if ($row !~ /^[0-9]/);
  179. $cur_users{$group_name}{ips}{$row}=1;
  180. $cur_users{$group_name}{found}=1;
  181. }
  182. }
  183. #recreate ipsets if not found
  184. foreach my $group_name (keys %lists) {
  185. next if ($cur_users{$group_name}{found});
  186. do_exec("/sbin/ipset create $group_name hash:net family inet maxelem 2655360 2>/dev/null");
  187. }
  188. my @cmd_list=();
  189. #new-ips
  190. foreach my $group_name (keys %users) {
  191. next if (!$users{$group_name}{ips});
  192. foreach my $user_ip (keys %{$users{$group_name}{ips}}) {
  193. if (!exists($cur_users{$group_name}{ips}{$user_ip})) {
  194. db_log_verbose($dbh,"Add user with ip: $user_ip to access-list $group_name");
  195. do_exec("/sbin/ipset add $group_name $user_ip");
  196. }
  197. }
  198. }
  199. #old-ips
  200. foreach my $group_name (keys %cur_users) {
  201. next if (!$cur_users{$group_name}{ips});
  202. foreach my $user_ip (keys %{$cur_users{$group_name}{ips}}) {
  203. if (!exists($users{$group_name}{ips}{$user_ip})) {
  204. db_log_verbose($dbh,"Remove user with ip: $user_ip from access-list $group_name");
  205. do_exec("/sbin/ipset del $group_name $user_ip");
  206. }
  207. }
  208. }
  209. timestamp;
  210. #filters
  211. my %chain_rules;
  212. foreach my $group_name (keys %lists) {
  213. next if (!$group_name);
  214. next if (!exists($group_filters{$group_name}));
  215. push(@{$chain_rules{$group_name}},"-N $group_name");
  216. foreach my $filter_index (sort keys %{$group_filters{$group_name}}) {
  217. my $filter_id=$group_filters{$group_name}->{$filter_index}->{filter_id};
  218. next if (!$filters{$filter_id});
  219. my $src_rule='-A '.$group_name;
  220. my $dst_rule='-A '.$group_name;
  221. if ($filters{$filter_id}->{proto} and ($filters{$filter_id}->{proto}!~/all/i)) {
  222. $src_rule=$src_rule." -p ".$filters{$filter_id}->{proto};
  223. $dst_rule=$dst_rule." -p ".$filters{$filter_id}->{proto};
  224. }
  225. if ($filters{$filter_id}->{dst} and $filters{$filter_id}->{dst} ne '0/0') {
  226. $src_rule=$src_rule." -s ".trim($filters{$filter_id}->{dst});
  227. $dst_rule=$dst_rule." -d ".trim($filters{$filter_id}->{dst});
  228. }
  229. if ($filters{$filter_id}->{port} and $filters{$filter_id}->{port} ne '0') {
  230. my $module=" -m ".$filters{$filter_id}->{proto};
  231. if ($filters{$filter_id}->{port}=~/\-/ or $filters{$filter_id}->{port}=~/\,/ or $filters{$filter_id}->{port}=~/\:/) {
  232. $module=" -m multiport";
  233. $filters{$filter_id}->{port}=~s/\-/:/g;
  234. }
  235. $src_rule=$src_rule.$module." --sport ".trim($filters{$filter_id}->{port});
  236. $dst_rule=$dst_rule.$module." --dport ".trim($filters{$filter_id}->{port});
  237. }
  238. if ($group_filters{$group_name}->{$filter_index}->{action}) {
  239. $src_rule=$src_rule." -j ACCEPT";
  240. $dst_rule=$dst_rule." -j ACCEPT";
  241. } else {
  242. $src_rule=$src_rule." -j REJECT";
  243. $dst_rule=$dst_rule." -j REJECT";
  244. }
  245. if ($src_rule ne $dst_rule) {
  246. push(@{$chain_rules{$group_name}},$src_rule);
  247. push(@{$chain_rules{$group_name}},$dst_rule);
  248. } else {
  249. push(@{$chain_rules{$group_name}},$src_rule);
  250. }
  251. }
  252. }
  253. ######## get current iptables USERS chain state
  254. my $cur_iptables = do_exec("/sbin/iptables --list-rules USERS 2>/dev/null");
  255. my @cur_iptables_users = split(/\n/,$cur_iptables);
  256. my $users_chain_ok=(scalar @cur_iptables_users eq scalar @new_iptables_users);
  257. #if count records in chain ok - check stuff
  258. if ($users_chain_ok) {
  259. for (my $i = 0; $i <= $#cur_iptables_users; $i++) {
  260. if ($cur_iptables_users[$i]!~/$new_iptables_users[$i]/i) { $users_chain_ok=0; last; }
  261. }
  262. }
  263. #group rules
  264. my %cur_chain_rules;
  265. foreach my $group_name (keys %lists) {
  266. next if (!$group_name);
  267. my $tmp=do_exec("/sbin/iptables --list-rules $group_name 2>/dev/null");
  268. foreach my $rule (split(/\n/,$tmp)) {
  269. if ($rule=~/Error/i) {
  270. $lists{$group_name}=0;
  271. last;
  272. }
  273. push(@{$cur_chain_rules{$group_name}},$rule);
  274. }
  275. }
  276. #check filter group chain
  277. foreach my $group_name (keys %lists) {
  278. my @tmp = ();
  279. if ($chain_rules{$group_name}) { @tmp = @{$chain_rules{$group_name}}; }
  280. my @cur_tmp = ();
  281. if ($cur_chain_rules{$group_name}) { @cur_tmp=@{$cur_chain_rules{$group_name}}; }
  282. my $group_chain_ok=($#tmp eq $#cur_tmp);
  283. #if count records in chain ok - check stuff
  284. if ($group_chain_ok) {
  285. for (my $i = 0; $i <= $#tmp; $i++) {
  286. if ($tmp[$i]!~/$cur_tmp[$i]/i) { $group_chain_ok=0; last; }
  287. }
  288. }
  289. if (!$group_chain_ok) {
  290. if ($lists{$group_name}) {
  291. push(@cmd_list,"-D USERS -m set --match-set $group_name src -j $group_name");
  292. push(@cmd_list,"-D USERS -m set --match-set $group_name dst -j $group_name");
  293. push(@cmd_list,"-D $group_name");
  294. }
  295. push(@cmd_list,@{$chain_rules{$group_name}});
  296. if ($users_chain_ok) {
  297. push(@cmd_list,"-A USERS -m set --match-set $group_name src -j $group_name");
  298. push(@cmd_list,"-A USERS -m set --match-set $group_name dst -j $group_name");
  299. }
  300. }
  301. }
  302. #recreate users chain
  303. if (!$users_chain_ok) {
  304. for (my $i = 0; $i <= $#new_iptables_users; $i++) {
  305. push(@cmd_list,$new_iptables_users[$i]);
  306. }
  307. }
  308. my $table = IPTables::libiptc::init('filter');
  309. foreach my $row (@cmd_list) {
  310. print "$row\n" if ($debug);
  311. my @cmd_array = split(" ",$row);
  312. $table->iptables_do_command(\@cmd_array);
  313. }
  314. $table->commit();
  315. db_log_verbose($dbh,"Sync user state at router $router_name stopped.");
  316. $dbh->disconnect();
  317. exit;