diff options
author | Parabola <dev@list.parabolagnulinux.org> | 2012-02-05 17:25:05 +0000 |
---|---|---|
committer | Parabola <dev@list.parabolagnulinux.org> | 2012-02-05 17:25:05 +0000 |
commit | 359d940358dec836dd0acfe9d9caf0b1ff0a97fe (patch) | |
tree | eeed5f77c8417a98fe5b8538d3c019d1cea00c04 /testing/iptables | |
parent | cdc66cc7110e78bf1197f9effc70422114f9341b (diff) |
Sun Feb 5 17:25:01 UTC 2012
Diffstat (limited to 'testing/iptables')
-rw-r--r-- | testing/iptables/PKGBUILD | 76 | ||||
-rw-r--r-- | testing/iptables/empty-filter.rules | 6 | ||||
-rw-r--r-- | testing/iptables/empty-mangle.rules | 8 | ||||
-rw-r--r-- | testing/iptables/empty-nat.rules | 7 | ||||
-rw-r--r-- | testing/iptables/empty-raw.rules | 5 | ||||
-rw-r--r-- | testing/iptables/empty-security.rules | 6 | ||||
-rw-r--r-- | testing/iptables/empty.rules | 6 | ||||
-rwxr-xr-x | testing/iptables/ip6tables | 69 | ||||
-rwxr-xr-x | testing/iptables/iptables | 68 | ||||
-rw-r--r-- | testing/iptables/iptables.conf.d | 12 | ||||
-rw-r--r-- | testing/iptables/simple_firewall.rules | 11 |
11 files changed, 0 insertions, 274 deletions
diff --git a/testing/iptables/PKGBUILD b/testing/iptables/PKGBUILD deleted file mode 100644 index 4a0d3c815..000000000 --- a/testing/iptables/PKGBUILD +++ /dev/null @@ -1,76 +0,0 @@ -# $Id: PKGBUILD 147991 2012-01-29 12:47:57Z ronald $ -# Maintainer: Ronald van Haren <ronald.archlinux.org> -# Contributor: Thomas Baechler <thomas@archlinux.org> - -pkgname=iptables -pkgver=1.4.12.2 -pkgrel=1 -pkgdesc='Linux kernel packet control tool' -arch=('i686' 'x86_64') -license=('GPL2') -url='http://www.netfilter.org/projects/iptables/index.html' -depends=('glibc' 'bash') -makedepends=('linux-api-headers') -options=('!libtool') -source=("http://www.iptables.org/projects/iptables/files/${pkgname}-${pkgver}.tar.bz2" - iptables - ip6tables - empty.rules - simple_firewall.rules - iptables.conf.d - empty-filter.rules - empty-mangle.rules - empty-nat.rules - empty-raw.rules - empty-security.rules) -backup=(etc/conf.d/iptables) -sha1sums=('4dc8cdf1b711b23ed88eaaaa0e0e157d2bf2d81c' - '5bb6fa526665cdd728c26f0f282f5a51f220cf88' - '2db68906b603e5268736f48c8e251f3a49da1d75' - '83b3363878e3660ce23b2ad325b53cbd6c796ecf' - '9907f9e815592837abc7fa3264a401567b7606ab' - 'cdb830137192bbe002c6d01058656bd053ed0ddd' - 'd9f9f06b46b4187648e860afa0552335aafe3ce4' - 'c45b738b5ec4cfb11611b984c21a83b91a2d58f3' - '1694d79b3e6e9d9d543f6a6e75fed06066c9a6c6' - '7db53bb882f62f6c677cc8559cff83d8bae2ef73' - 'ebbd1424a1564fd45f455a81c61ce348f0a14c2e') - -build() { - cd "${srcdir}/${pkgname}-${pkgver}" - - # http://bugs.archlinux.org/task/17046 - sed -i '87 i libxt_RATEEST.so: libxt_RATEEST.oo' extensions/GNUmakefile.in - sed -i '88 i \\t${AM_VERBOSE_CCLD} ${CCLD} ${AM_LDFLAGS} -lm -shared ${LDFLAGS} -o $@ $<;\n' extensions/GNUmakefile.in - - # FS#25358: libxt_statistic.so undefined symbol: lround - export LDFLAGS='-lm' - - ./configure --prefix=/usr \ - --libexecdir=/usr/lib/iptables --sysconfdir=/etc \ - --with-xtlibdir=/usr/lib/iptables \ - --enable-devel --enable-libipq \ - --enable-shared --enable-static -# build fails when not enabling static, see if we can remove it on next build - - make -} - -package() { - cd "${srcdir}/${pkgname}-${pkgver}" - - unset CFLAGS - unset LDFLAGS - - make DESTDIR="${pkgdir}" install - - cd "${srcdir}" - install -D -m755 iptables "${pkgdir}"/etc/rc.d/iptables - install -D -m755 ip6tables "${pkgdir}"/etc/rc.d/ip6tables - install -D -m644 empty.rules "${pkgdir}"/etc/iptables/empty.rules - install -D -m644 simple_firewall.rules "${pkgdir}"/etc/iptables/simple_firewall.rules - install -D -m644 iptables.conf.d "${pkgdir}"/etc/conf.d/iptables - - mkdir -p "${pkgdir}"/var/lib/iptables - install -m644 empty-{filter,mangle,nat,raw,security}.rules "${pkgdir}"/var/lib/iptables -} diff --git a/testing/iptables/empty-filter.rules b/testing/iptables/empty-filter.rules deleted file mode 100644 index 5a4de4876..000000000 --- a/testing/iptables/empty-filter.rules +++ /dev/null @@ -1,6 +0,0 @@ -# Empty iptables filter table rule file -*filter -:INPUT ACCEPT [0:0] -:FORWARD ACCEPT [0:0] -:OUTPUT ACCEPT [0:0] -COMMIT diff --git a/testing/iptables/empty-mangle.rules b/testing/iptables/empty-mangle.rules deleted file mode 100644 index 49d493c4d..000000000 --- a/testing/iptables/empty-mangle.rules +++ /dev/null @@ -1,8 +0,0 @@ -# Empty iptables mangle table rules file -*mangle -:PREROUTING ACCEPT [0:0] -:INPUT ACCEPT [0:0] -:FORWARD ACCEPT [0:0] -:OUTPUT ACCEPT [0:0] -:POSTROUTING ACCEPT [0:0] -COMMIT diff --git a/testing/iptables/empty-nat.rules b/testing/iptables/empty-nat.rules deleted file mode 100644 index 437e96411..000000000 --- a/testing/iptables/empty-nat.rules +++ /dev/null @@ -1,7 +0,0 @@ -# Empty iptables nat table rules file -*nat -:PREROUTING ACCEPT [0:0] -:INPUT ACCEPT [0:0] -:OUTPUT ACCEPT [0:0] -:POSTROUTING ACCEPT [0:0] -COMMIT diff --git a/testing/iptables/empty-raw.rules b/testing/iptables/empty-raw.rules deleted file mode 100644 index 8dc50d23e..000000000 --- a/testing/iptables/empty-raw.rules +++ /dev/null @@ -1,5 +0,0 @@ -# Empty iptables raw table rules file -*raw -:PREROUTING ACCEPT [0:0] -:OUTPUT ACCEPT [0:0] -COMMIT diff --git a/testing/iptables/empty-security.rules b/testing/iptables/empty-security.rules deleted file mode 100644 index 4531fa13f..000000000 --- a/testing/iptables/empty-security.rules +++ /dev/null @@ -1,6 +0,0 @@ -# Empty iptables security table rules file -*security -:INPUT ACCEPT [0:0] -:FORWARD ACCEPT [0:0] -:OUTPUT ACCEPT [0:0] -COMMIT diff --git a/testing/iptables/empty.rules b/testing/iptables/empty.rules deleted file mode 100644 index e24e1aa30..000000000 --- a/testing/iptables/empty.rules +++ /dev/null @@ -1,6 +0,0 @@ -# Empty iptables rule file -*filter -:INPUT ACCEPT [0:0] -:FORWARD ACCEPT [0:0] -:OUTPUT ACCEPT [0:0] -COMMIT diff --git a/testing/iptables/ip6tables b/testing/iptables/ip6tables deleted file mode 100755 index 2d119e3ed..000000000 --- a/testing/iptables/ip6tables +++ /dev/null @@ -1,69 +0,0 @@ -#!/bin/bash - -# source application-specific settings -[ -f /etc/conf.d/iptables ] && . /etc/conf.d/iptables - -# Set defaults if settings are missing -[ -z "$IP6TABLES_CONF" ] && IP6TABLES_CONF=/etc/iptables/ip6tables.rules - -. /etc/rc.conf -. /etc/rc.d/functions - -case "$1" in - start) - if [ ! -f "$IP6TABLES_CONF" ]; then - echo "Cannot load ip6tables rules: $IP6TABLES_CONF is missing!" >&2 - exit 1 - fi - stat_busy "Starting IP6 Tables" - if [ "$IPTABLES_FORWARD" = "1" ]; then - echo 1 >/proc/sys/net/ipv6/conf/default/forwarding - echo 1 >/proc/sys/net/ipv6/conf/all/forwarding - fi - if ck_daemon ip6tables; then - /usr/sbin/ip6tables-restore < $IP6TABLES_CONF - if [ $? -gt 0 ]; then - stat_fail - else - add_daemon ip6tables - stat_done - fi - else - stat_fail - fi - ;; - stop) - stat_busy "Stopping IP6 Tables" - if ! ck_daemon ip6tables; then - fail=0 - for table in $(cat /proc/net/ip6_tables_names); do - ip6tables-restore < /var/lib/iptables/empty-$table.rules - [ $? -gt 0 ] && fail=1 - done - if [ $fail -gt 0 ]; then - stat_fail - else - rm_daemon ip6tables - stat_done - fi - else - stat_fail - fi - ;; - restart) - $0 stop - $0 start - ;; - save) - stat_busy "Saving IP6 Tables" - /usr/sbin/ip6tables-save >$IP6TABLES_CONF - if [ $? -gt 0 ]; then - stat_fail - else - stat_done - fi - ;; - *) - echo "usage: $0 {start|stop|restart|save}" -esac -exit 0 diff --git a/testing/iptables/iptables b/testing/iptables/iptables deleted file mode 100755 index fbb02face..000000000 --- a/testing/iptables/iptables +++ /dev/null @@ -1,68 +0,0 @@ -#!/bin/bash - -# source application-specific settings -[ -f /etc/conf.d/iptables ] && . /etc/conf.d/iptables - -# Set defaults if settings are missing -[ -z "$IPTABLES_CONF" ] && IPTABLES_CONF=/etc/iptables/iptables.rules - -. /etc/rc.conf -. /etc/rc.d/functions - -case "$1" in - start) - if [ ! -f "$IPTABLES_CONF" ]; then - echo "Cannot load iptables rules: $IPTABLES_CONF is missing!" >&2 - exit 1 - fi - stat_busy "Starting IP Tables" - if [ "$IPTABLES_FORWARD" = "1" ]; then - echo 1 >/proc/sys/net/ipv4/ip_forward - fi - if ck_daemon iptables; then - /usr/sbin/iptables-restore < $IPTABLES_CONF - if [ $? -gt 0 ]; then - stat_fail - else - add_daemon iptables - stat_done - fi - else - stat_fail - fi - ;; - stop) - stat_busy "Stopping IP Tables" - if ! ck_daemon iptables; then - fail=0 - for table in $(cat /proc/net/ip_tables_names); do - iptables-restore < /var/lib/iptables/empty-$table.rules - [ $? -gt 0 ] && fail=1 - done - if [ $fail -gt 0 ]; then - stat_fail - else - rm_daemon iptables - stat_done - fi - else - stat_fail - fi - ;; - restart) - $0 stop - $0 start - ;; - save) - stat_busy "Saving IP Tables" - /usr/sbin/iptables-save >$IPTABLES_CONF - if [ $? -gt 0 ]; then - stat_fail - else - stat_done - fi - ;; - *) - echo "usage: $0 {start|stop|restart|save}" -esac -exit 0 diff --git a/testing/iptables/iptables.conf.d b/testing/iptables/iptables.conf.d deleted file mode 100644 index 1c6cc7b5d..000000000 --- a/testing/iptables/iptables.conf.d +++ /dev/null @@ -1,12 +0,0 @@ -# Configuration for iptables rules -IPTABLES_CONF=/etc/iptables/iptables.rules -IP6TABLES_CONF=/etc/iptables/ip6tables.rules - -# Enable IP forwarding (both IPv4 and IPv6) -# NOTE: this is not the recommended way to do this, and is supported only for -# backward compatibility. Instead, use /etc/sysctl.conf and set the following -# options: -# * net.ipv4.ip_forward=1 -# * net.ipv6.conf.default.forwarding=1 -# * net.ipv6.conf.all.forwarding=1 -#IPTABLES_FORWARD=0 diff --git a/testing/iptables/simple_firewall.rules b/testing/iptables/simple_firewall.rules deleted file mode 100644 index e1604cc36..000000000 --- a/testing/iptables/simple_firewall.rules +++ /dev/null @@ -1,11 +0,0 @@ -*filter -:INPUT DROP [0:0] -:FORWARD DROP [0:0] -:OUTPUT ACCEPT [0:0] --A INPUT -p icmp -j ACCEPT --A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT --A INPUT -i lo -j ACCEPT --A INPUT -p tcp -j REJECT --reject-with tcp-reset --A INPUT -p udp -j REJECT --reject-with icmp-port-unreachable --A INPUT -j REJECT --reject-with icmp-proto-unreachable -COMMIT |