aboutsummaryrefslogtreecommitdiff
path: root/examples/firewall.rs
blob: fc2501037cbfdbb24517ba05e8c85bb6c3061747 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
//use rustables::{Batch, Chain, ChainMethods, Hook, MatchError, ProtoFamily,
//    Protocol, Rule, RuleMethods, Table, MsgType, Policy};
//use rustables::query::{send_batch, Error as QueryError};
//use rustables::expr::{LogGroup, LogPrefix, LogPrefixError};
use ipnetwork::IpNetwork;
use std::ffi::{CString, NulError};
use std::rc::Rc;
use std::str::Utf8Error;

#[derive(thiserror::Error, Debug)]
pub enum Error {
    #[error("Unable to open netlink socket to netfilter")]
    NetlinkOpenError(#[source] std::io::Error),
    #[error("Firewall is already started")]
    AlreadyDone,
    #[error("Error converting from a C String")]
    NulError(#[from] NulError),
    //#[error("Error creating match")]
    //MatchError(#[from] MatchError),
    #[error("Error converting to utf-8 string")]
    Utf8Error(#[from] Utf8Error),
    #[error("Error applying batch")]
    BatchError(#[from] std::io::Error),
    //#[error("Error applying batch")]
    //QueryError(#[from] QueryError),
    //#[error("Error encoding the prefix")]
    //LogPrefixError(#[from] LogPrefixError),
}

const TABLE_NAME: &str = "main-table";

fn main() -> Result<(), Error> {
    //    let fw = Firewall::new()?;
    //    fw.start()?;
    Ok(())
}
//
//
///// An example firewall. See the source of its `start()` method.
//pub struct Firewall {
//    batch: Batch,
//    inbound: Rc<Chain>,
//    _outbound: Rc<Chain>,
//    _forward: Rc<Chain>,
//    table: Rc<Table>,
//}
//
//impl Firewall {
//    pub fn new() -> Result<Self, Error> {
//        let mut batch = Batch::new();
//        let table = Rc::new(
//            Table::new(&CString::new(TABLE_NAME)?, ProtoFamily::Inet)
//        );
//        batch.add(&table, MsgType::Add);
//
//        // Create base chains. Base chains are hooked into a Direction/Hook.
//        let inbound = Rc::new(
//            Chain::from_hook(Hook::In, Rc::clone(&table))
//                  .verdict(Policy::Drop)
//                  .add_to_batch(&mut batch)
//        );
//        let _outbound = Rc::new(
//            Chain::from_hook(Hook::Out, Rc::clone(&table))
//                  .verdict(Policy::Accept)
//                  .add_to_batch(&mut batch)
//        );
//        let _forward = Rc::new(
//            Chain::from_hook(Hook::Forward, Rc::clone(&table))
//                  .verdict(Policy::Accept)
//                  .add_to_batch(&mut batch)
//        );
//
//        Ok(Firewall {
//            table,
//            batch,
//            inbound,
//            _outbound,
//            _forward
//        })
//    }
//    /// Allow some common-sense exceptions to inbound drop, and accept outbound and forward.
//    pub fn start(mut self) -> Result<(), Error> {
//        // Allow all established connections to get in.
//        Rule::new(Rc::clone(&self.inbound))
//             .established()
//             .accept()
//             .add_to_batch(&mut self.batch);
//        // Allow all traffic on the loopback interface.
//        Rule::new(Rc::clone(&self.inbound))
//             .iface("lo")?
//             .accept()
//             .add_to_batch(&mut self.batch);
//        // Allow ssh from anywhere, and log to dmesg with a prefix.
//        Rule::new(Rc::clone(&self.inbound))
//             .dport("22", &Protocol::TCP)?
//             .accept()
//             .log(None, Some(LogPrefix::new("allow ssh connection:")?))
//             .add_to_batch(&mut self.batch);
//
//        // Allow http from all IPs in 192.168.1.255/24 .
//        let local_net = IpNetwork::new([192, 168, 1, 0].into(), 24).unwrap();
//        Rule::new(Rc::clone(&self.inbound))
//             .dport("80", &Protocol::TCP)?
//             .snetwork(local_net)
//             .accept()
//             .add_to_batch(&mut self.batch);
//
//        // Allow ICMP traffic, drop IGMP.
//        Rule::new(Rc::clone(&self.inbound))
//             .icmp()
//             .accept()
//             .add_to_batch(&mut self.batch);
//        Rule::new(Rc::clone(&self.inbound))
//             .igmp()
//             .drop()
//             .add_to_batch(&mut self.batch);
//
//        // Log all traffic not accepted to NF_LOG group 1, accessible with ulogd.
//        Rule::new(Rc::clone(&self.inbound))
//             .log(Some(LogGroup(1)), None)
//             .add_to_batch(&mut self.batch);
//
//        let mut finalized_batch = self.batch.finalize().unwrap();
//        send_batch(&mut finalized_batch)?;
//        println!("table {} commited", TABLE_NAME);
//        Ok(())
//    }
//    /// If there is any table with name TABLE_NAME, remove it.
//    pub fn stop(mut self) -> Result<(), Error> {
//        self.batch.add(&self.table, MsgType::Add);
//        self.batch.add(&self.table, MsgType::Del);
//
//        let mut finalized_batch = self.batch.finalize().unwrap();
//        send_batch(&mut finalized_batch)?;
//        println!("table {} destroyed", TABLE_NAME);
//        Ok(())
//    }
//}
//
//