#!/bin/bash # change openvpn config 'tcp-client' to compatible iptables 'tcp' if [[ "${VPN_PROTOCOL}" == "tcp-client" ]]; then export VPN_PROTOCOL="tcp" fi # ip route ### # split comma seperated string into list from LAN_NETWORK env variable IFS=',' read -ra lan_network_list <<< "${LAN_NETWORK}" # process lan networks in the list for lan_network_item in "${lan_network_list[@]}"; do # strip whitespace from start and end of lan_network_item lan_network_item=$(echo "${lan_network_item}" | sed -e 's~^[ \t]*~~;s~[ \t]*$~~') echo "[info] Adding ${lan_network_item} as route via docker eth0" ip route add "${lan_network_item}" via "${DEFAULT_GATEWAY}" dev eth0 done echo "[info] ip route defined as follows..." echo "--------------------" ip route echo "--------------------" # setup iptables marks to allow routing of defined ports via eth0 ### if [[ "${DEBUG}" == "true" ]]; then echo "[debug] Modules currently loaded for kernel" ; lsmod fi # check we have iptable_mangle, if so setup fwmark lsmod | grep iptable_mangle iptable_mangle_exit_code=$? if [[ $iptable_mangle_exit_code == 0 ]]; then echo "[info] iptable_mangle support detected, adding fwmark for tables" # setup route for rutorrent http using set-mark to route traffic for port 80 to eth0 echo "9080 rutorrent_http" >> /etc/iproute2/rt_tables ip rule add fwmark 1 table rutorrent_http ip route add default via $DEFAULT_GATEWAY table rutorrent_http # setup route for rutorrent https using set-mark to route traffic for port 443 to eth0 echo "9443 rutorrent_https" >> /etc/iproute2/rt_tables ip rule add fwmark 2 table rutorrent_https ip route add default via $DEFAULT_GATEWAY table rutorrent_https # setup route for flood using set-mark to route traffic for port 3000 to eth0 if [[ $ENABLE_FLOOD == "yes" || $ENABLE_FLOOD == "both" ]]; then echo "3000 flood" >> /etc/iproute2/rt_tables ip rule add fwmark 3 table flood ip route add default via $DEFAULT_GATEWAY table flood fi fi # identify docker bridge interface name (probably eth0) docker_interface=$(netstat -ie | grep -vE "lo|tun|tap" | sed -n '1!p' | grep -P -o -m 1 '^[^:]+') if [[ "${DEBUG}" == "true" ]]; then echo "[debug] Docker interface defined as ${docker_interface}" fi # identify ip for docker bridge interface docker_ip=$(ifconfig "${docker_interface}" | grep -P -o -m 1 '(?<=inet\s)[^\s]+') if [[ "${DEBUG}" == "true" ]]; then echo "[debug] Docker IP defined as ${docker_ip}" fi # identify netmask for docker bridge interface docker_mask=$(ifconfig "${docker_interface}" | grep -P -o -m 1 '(?<=netmask\s)[^\s]+') if [[ "${DEBUG}" == "true" ]]; then echo "[debug] Docker netmask defined as ${docker_mask}" fi # convert netmask into cidr format docker_network_cidr=$(ipcalc "${docker_ip}" "${docker_mask}" | grep -P -o -m 1 "(?<=Network:)\s+[^\s]+") echo "[info] Docker network defined as ${docker_network_cidr}" # input iptable rules ### # set policy to drop ipv4 for input iptables -P INPUT DROP # set policy to drop ipv6 for input ip6tables -P INPUT DROP 1>&- 2>&- # accept input to tunnel adapter iptables -A INPUT -i "${VPN_DEVICE_TYPE}" -j ACCEPT # accept input to/from docker containers (172.x range is internal dhcp) iptables -A INPUT -s "${docker_network_cidr}" -d "${docker_network_cidr}" -j ACCEPT # accept input to vpn gateway iptables -A INPUT -i eth0 -p $VPN_PROTOCOL --sport $VPN_PORT -j ACCEPT # accept input to rutorrent port 9080 iptables -A INPUT -i eth0 -p tcp --dport 9080 -j ACCEPT iptables -A INPUT -i eth0 -p tcp --sport 9080 -j ACCEPT # accept input to rutorrent port 9443 iptables -A INPUT -i eth0 -p tcp --dport 9443 -j ACCEPT iptables -A INPUT -i eth0 -p tcp --sport 9443 -j ACCEPT # accept input to flood port 3000 if enabled if [[ $ENABLE_FLOOD == "yes" || $ENABLE_FLOOD == "both" ]]; then iptables -A INPUT -i eth0 -p tcp --dport 3000 -j ACCEPT iptables -A INPUT -i eth0 -p tcp --sport 3000 -j ACCEPT fi # process lan networks in the list for lan_network_item in "${lan_network_list[@]}"; do # strip whitespace from start and end of lan_network_item lan_network_item=$(echo "${lan_network_item}" | sed -e 's~^[ \t]*~~;s~[ \t]*$~~') # accept input to rtorrent scgi - used for lan access iptables -A INPUT -i eth0 -s "${lan_network_item}" -p tcp --dport 5000 -j ACCEPT # accept input to privoxy if enabled if [[ $ENABLE_PRIVOXY == "yes" ]]; then iptables -A INPUT -i eth0 -p tcp -s "${lan_network_item}" -d "${docker_network_cidr}" -j ACCEPT fi done # accept input icmp (ping) iptables -A INPUT -p icmp --icmp-type echo-reply -j ACCEPT # accept input to local loopback iptables -A INPUT -i lo -j ACCEPT # output iptable rules ### # set policy to drop ipv4 for output iptables -P OUTPUT DROP # set policy to drop ipv6 for output ip6tables -P OUTPUT DROP 1>&- 2>&- # accept output from tunnel adapter iptables -A OUTPUT -o "${VPN_DEVICE_TYPE}" -j ACCEPT # accept output to/from docker containers (172.x range is internal dhcp) iptables -A OUTPUT -s "${docker_network_cidr}" -d "${docker_network_cidr}" -j ACCEPT # accept output from vpn gateway iptables -A OUTPUT -o eth0 -p $VPN_PROTOCOL --dport $VPN_PORT -j ACCEPT # if iptable mangle is available (kernel module) then use mark if [[ $iptable_mangle_exit_code == 0 ]]; then # accept output from rutorrent port 9080 - used for external access iptables -t mangle -A OUTPUT -p tcp --dport 9080 -j MARK --set-mark 1 iptables -t mangle -A OUTPUT -p tcp --sport 9080 -j MARK --set-mark 1 # accept output from rutorrent port 9443 - used for external access iptables -t mangle -A OUTPUT -p tcp --dport 9443 -j MARK --set-mark 2 iptables -t mangle -A OUTPUT -p tcp --sport 9443 -j MARK --set-mark 2 # accept output from flood port 3000 if enabled - used for external access if [[ $ENABLE_FLOOD == "yes" || $ENABLE_FLOOD == "both" ]]; then iptables -t mangle -A OUTPUT -p tcp --dport 3000 -j MARK --set-mark 3 iptables -t mangle -A OUTPUT -p tcp --sport 3000 -j MARK --set-mark 3 fi fi # accept output from rutorrent port 9080 - used for lan access iptables -A OUTPUT -o eth0 -p tcp --dport 9080 -j ACCEPT iptables -A OUTPUT -o eth0 -p tcp --sport 9080 -j ACCEPT # accept output from rutorrent port 9443 - used for lan access iptables -A OUTPUT -o eth0 -p tcp --dport 9443 -j ACCEPT iptables -A OUTPUT -o eth0 -p tcp --sport 9443 -j ACCEPT # accept output from flood port 3000 if enabled - used for lan access if [[ $ENABLE_FLOOD == "yes" || $ENABLE_FLOOD == "both" ]]; then iptables -A OUTPUT -o eth0 -p tcp --dport 3000 -j ACCEPT iptables -A OUTPUT -o eth0 -p tcp --sport 3000 -j ACCEPT fi # process lan networks in the list for lan_network_item in "${lan_network_list[@]}"; do # strip whitespace from start and end of lan_network_item lan_network_item=$(echo "${lan_network_item}" | sed -e 's~^[ \t]*~~;s~[ \t]*$~~') # accept output to rtorrent scgi - used for lan access iptables -A OUTPUT -o eth0 -d "${lan_network_item}" -p tcp --sport 5000 -j ACCEPT # accept output from privoxy if enabled - used for lan access if [[ $ENABLE_PRIVOXY == "yes" ]]; then iptables -A OUTPUT -o eth0 -p tcp -s "${docker_network_cidr}" -d "${lan_network_item}" -j ACCEPT fi done # accept output for icmp (ping) iptables -A OUTPUT -p icmp --icmp-type echo-request -j ACCEPT # accept output from local loopback adapter iptables -A OUTPUT -o lo -j ACCEPT echo "[info] iptables defined as follows..." echo "--------------------" iptables -S echo "--------------------" # change iptable 'tcp' to openvpn config compatible 'tcp-client' (this file is sourced) if [[ "${VPN_PROTOCOL}" == "tcp" ]]; then export VPN_PROTOCOL="tcp-client" fi