mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-29 00:55:22 +00:00
313a71ee7b
While the default iptables setup used by Fedora/RHEL distros only restricts traffic on the INPUT and/or FORWARD rules, some users might have custom firewalls that restrict the OUTPUT rules too. These can prevent DHCP/DNS/TFTP responses from dnsmasq from reaching the guest VMs. We should thus whitelist these protocols in the OUTPUT chain, as well as the INPUT chain. Signed-off-by: Malina Salina <malina.salina@protonmail.com> Initial patch then modified to add unit tests and IPv6 support Reviewed-by: Michal Privoznik <mprivozn@redhat.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
158 lines
8.8 KiB
C
158 lines
8.8 KiB
C
/*
|
|
* viriptables.h: helper APIs for managing iptables
|
|
*
|
|
* Copyright (C) 2007, 2008 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#pragma once
|
|
|
|
#include "virsocketaddr.h"
|
|
#include "virfirewall.h"
|
|
|
|
int iptablesSetupPrivateChains (virFirewallLayer layer);
|
|
|
|
void iptablesSetDeletePrivate (bool pvt);
|
|
|
|
void iptablesAddTcpInput (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface,
|
|
int port);
|
|
void iptablesRemoveTcpInput (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface,
|
|
int port);
|
|
|
|
void iptablesAddUdpInput (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface,
|
|
int port);
|
|
void iptablesRemoveUdpInput (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface,
|
|
int port);
|
|
|
|
void iptablesAddTcpOutput (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface,
|
|
int port);
|
|
void iptablesRemoveTcpOutput (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface,
|
|
int port);
|
|
void iptablesAddUdpOutput (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface,
|
|
int port);
|
|
void iptablesRemoveUdpOutput (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface,
|
|
int port);
|
|
|
|
int iptablesAddForwardAllowOut (virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *iface,
|
|
const char *physdev)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
int iptablesRemoveForwardAllowOut (virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *iface,
|
|
const char *physdev)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
int iptablesAddForwardAllowRelatedIn(virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *iface,
|
|
const char *physdev)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
int iptablesRemoveForwardAllowRelatedIn(virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *iface,
|
|
const char *physdev)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
|
|
int iptablesAddForwardAllowIn (virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *iface,
|
|
const char *physdev)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
int iptablesRemoveForwardAllowIn (virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *iface,
|
|
const char *physdev)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
|
|
void iptablesAddForwardAllowCross (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface);
|
|
void iptablesRemoveForwardAllowCross (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface);
|
|
|
|
void iptablesAddForwardRejectOut (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface);
|
|
void iptablesRemoveForwardRejectOut (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface);
|
|
|
|
void iptablesAddForwardRejectIn (virFirewallPtr fw,
|
|
virFirewallLayer layer,
|
|
const char *iface);
|
|
void iptablesRemoveForwardRejectIn (virFirewallPtr fw,
|
|
virFirewallLayer layery,
|
|
const char *iface);
|
|
|
|
int iptablesAddForwardMasquerade (virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *physdev,
|
|
virSocketAddrRangePtr addr,
|
|
virPortRangePtr port,
|
|
const char *protocol)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
int iptablesRemoveForwardMasquerade (virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *physdev,
|
|
virSocketAddrRangePtr addr,
|
|
virPortRangePtr port,
|
|
const char *protocol)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
int iptablesAddDontMasquerade (virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *physdev,
|
|
const char *destaddr)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
int iptablesRemoveDontMasquerade (virFirewallPtr fw,
|
|
virSocketAddr *netaddr,
|
|
unsigned int prefix,
|
|
const char *physdev,
|
|
const char *destaddr)
|
|
G_GNUC_WARN_UNUSED_RESULT;
|
|
void iptablesAddOutputFixUdpChecksum (virFirewallPtr fw,
|
|
const char *iface,
|
|
int port);
|
|
void iptablesRemoveOutputFixUdpChecksum (virFirewallPtr fw,
|
|
const char *iface,
|
|
int port);
|