Review your favorite Linux distribution.
Go Back > Forums > Linux Forums > Linux - Security
User Name
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.


  Search this Thread
Old 11-04-2011, 07:56 PM   #1
Registered: Mar 2010
Posts: 202

Rep: Reputation: 84
Cool yes sir, another iptables management script!

Yes I know there must be hundreds of these here at LQ, and most folks already did their own (and probably don't want to look at it again) YES i know there's ufw, gufw, Shorewall, and a thousand other frontends for iptables.

So here's mine . I love it. I've been using it from years, tuning it up a bit from time to time when my bash improves.

I know iptables syntax by heart, but this script saves me hours when I'm tweaking something and also I use it from my rc scripts to manage my firewall.

Name it as you want, perhaps "yyais" (yes, yet another iptables script) would be a good name.

It's based on "profiles" which are simple iptables-save format files, which means you can try it right away with your current config if you want: if you want to play, make a backup of your current config with:

root@localhost:/# yyais save profilename
Saving current state to profile /home/root/scripts/net/profilename ...

From that on you can have as many profiles in any place, and work directly with them. If you want to switch profiles back use:

root@localhost:/# yyais switch profilename
Switching to profile /home/root/scripts/net/profilename ...

It also allows for some nifty operations on many tables/chains in one sweep. And has a "start" and "stop" routines where you can tune up your main firewall routines, for example I have added a simple qdisc.

It autodetects the location of every external program it uses with the exception of "which". You should check its path is correct for your distro in the configuration section (there are two other tunables as of now, being the default policy and verbose mode). Anyway, if any external program (including which) is not found the script will refuse to run.

For instructions, run it with "?" or "help". Has to be run as root of course.

Hope you enjoy it, and any comments/criticism/oblivion/etc are welcome, thanks!

Only for Bash 4, sorry!

Version 3.4
Version 3.5


# BASICS -----------------------------------------------------------------------
# shell options: extended globbing
shopt -qs extglob

# global arrays: script metadata, user config, user commands
declare -Ax script config calltable
script[verb_levels]='debug info status warning error critical fatal'
script[external_programs]='which iptables iptables-save iptables-restore tc sysctl readlink sed sort'

# USER CONFIG -----------------------------------------------------------------
# make sure this contains the path for "which", otherwise the script will abort
# in doubt type "which which"

# the rest of the values are case insensitive

# default policy when not specified
# values: accept|drop

# verbosity level: increment to see more output
# 1:warnings, 2:status, 3:information, 4=debug messages
# error, critical and fatal messages ignore this value, and stop execution

# EXPOSED FUNCS ----------------------------------------------------------------
cmd1:help() {
    IFS="\n" _msg<<HELP
${script[name]} version ${script[version]}

Iptables helper

Usage: ${script[name]} ${script[valid_commands]// /|}

        Shows a help screen.

    start [profiles]
        Initializes the firewall according to configuration, optionally loading profiles.

        Removes any iptables state and configuration, and disables forwarding.

    switch <profile>
        Switches iptables configuration to the specified profile.

    load <profiles>
        Load the specified profile(s) into the iptables configuration preserving existing rules.

    save [-f] <profile>
        Stores current iptables configuration and state into a profile. The -f switch causes to
        overwrite an existing profile, otherwise an overwrite attempt triggers an error.

    flush [tables] [chains]
        Flushes (removes all rules) in the specified tables and/or chains.

    zero [tables] [chains]
        Zeroes packet counters in the specified tables and/or chains.

    user [tables]
        Flushes (removes) all user-defined chains in the specified tables.

    clear [tables]
        Equivalent to calling flush+zero+user in sequence.

    policy [tables] [chains] [policy]
        Sets default policy for the specified tables and/or chains.

    Notes on [tables], [chains] and [policy] arguments:
        *) All these arguments are optional, case-insensitive and can appear in any order.
        *) Policy can be one of DROP or ACCEPT, defaulting to user configuration.
        *) Whenever a [tables] or [chains] argument is completely missing, the default is to INCLUDE all tables or chains.
        *) Tables and chains are comma-delimited lists, without spaces.
        *) All the commands that operate with these arguments currently IGNORE bogus strings.

    Notes on profiles:
        *) When multiple profiles are expected they can be separated by comma or space.
        *) By default, profiles are loaded or stored from/to the same directory of this script.
           To specify another location, prepend a relative or absolute path to the profile name.

cmd2:start() {
    _status "${script[name]} ${script[version]} starting..."

    # clear iptables configuration and state, set everything to default policy
    _call clear
    _call policy

    # forward any arguments to "load"
    (( $# )) && {
        _info "a request to load profiles has been received"
        _call load $@

    _status "entering user section..."
    # --------------------------------------------------------------------------
    # ADD YOUR START UP COMMANDS HERE ------------------------------------------
    # --------------------------------------------------------------------------

    # enable kernel forwarding
    $_sysctl -w net.ipv4.ip_forward=1

    # simple qdisc to optimize ethernet
    $_tc qdisc add dev eth0 root tbf rate 256kbit latency 50ms burst 1540

    # here I force my output filter to accept
    _call policy output filter accept

    # --------------------------------------------------------------------------
    # ADD YOUR START UP COMMANDS HERE ------------------------------------------
    # --------------------------------------------------------------------------
    _status 'finished starting process.'

cmd3:stop() {
    (( $# )) && _error "extra arguments"

    _status "${script[name]} ${script[version]} stopping..."

    # clear iptables configuration and state, set everything to default policy
    _call clear
    _call policy

    _status "entering user section..."
    # --------------------------------------------------------------------------
    # ADD YOUR SHUTDOWN COMMANDS HERE ------------------------------------------
    # --------------------------------------------------------------------------

    # turn off kernel forwarding
    $_sysctl -w net.ipv4.ip_forward=0

    # remove ethernet qdisc
    $_tc qdisc del dev eth0 root
    # --------------------------------------------------------------------------
    # ADD YOUR SHUTDOWN COMMANDS HERE ------------------------------------------
    # --------------------------------------------------------------------------
    _status 'finished stopping process.'

cmd4:switch() { 
    (( ! $# )) && _error "<profile> expected"
    (( $# > 1 )) && _error "extra arguments"

    local file=$(_getprofile "$1")
    [[ ! -f "$file" ]] && _error "file not found: $file"

    _status "Switching to profile $file ..."
    $_iptables_restore < "$file"
    _status 'done switch.'

cmd5:load() {
    (( ! $# )) && _error "at least one <profile> expected"

    _status "loading profiles..."
    local file
    for file in ${@//,/ }; do
        file=$(_getprofile "$file")
        [[ ! -f "$file" ]] && _error "file not found: $file"

        _info "profile $file"
        $_iptables_restore -n < "$file"
    _status 'done loading.'

cmd6:save() {
    (( ! $# )) && _error "<profile> expected"
    (( $# > 1 )) && _error "extra arguments"

    local file overwrite arg
    for arg in $@; do
        [[ "$arg" == '-f' ]] && overwrite='yes' || file=$(_getprofile "$arg")

    [[ -f "$file" ]] && {
        [[ ! $overwrite ]] && _error "file \"$file\" already exists.\\\nIf you want to overwrite it try again with -f" 
        _warning "file \"$file\" already exists, but will overwrite as requested." 

    _status "saving current state to $file ..."
    $_iptables_save > "$file"
    _status 'done saving.'

cmd7:flush() {
    _status 'flushing builtin chains...'
    _tbchain flush $@
    _status 'done flushing builtin chains.'

cmd8:zero() {
    _status 'zeroing counters...'
    _tbchain zero $@
    _status 'done zeroing counters.'

cmd9:user() {
    _status 'flushing user chains...'
    _tbchain user $@
    _status 'done flushing user chains.'

cmd10:clear() {
    _call flush $@
    _call zero $@
    _call user $@

cmd11:policy() {
    _status 'setting policies...'

    # default policy: user-defined
    local policy="${config[policy]^^}" arg

    # get argument policy
    for arg in $@; do
        [[ "${arg^^}" =~ (ACCEPT|DROP) ]] && policy="${arg^^}" && continue
    # set policies
    _tbchain policy $policy $@
    _status 'done setting policies.'

# INTERNAL FUNCS ---------------------------------------------------------------

# returns a full path to a profile, starting from an ambiguous path/profile
# argument
_getprofile() {
    [[ "$1" =~ ^(/|./|../).* ]] && $_readlink -f "$1" || $_readlink -f "${script[directory]}/$1"

# process a command in some table(s) and chain(s)
_tbchain() {
    local -A tables
    local action="$1" arg table chain chainarg

    # get arguments
    for arg in $@; do
        [[ "${arg^^}" =~ (FILTER|NAT|MANGLE|RAW) ]] && {
            while IFS='' read -rd',' table; do
            done <<< "${arg,,},"
        [[ "${arg^^}" =~ (INPUT|OUTPUT|FORWARD|PREROUTING|POSTROUTING) ]] && chainarg="${arg^^}" && continue

    # default tables: all tables
    (( ! "${#tables[@]}" )) && tables=([filter]='' [nat]='' [mangle]='' [raw]='')
    # default chains: all chains
    [[ ! "$chainarg" ]] && chainarg="INPUT OUTPUT FORWARD PREROUTING POSTROUTING"

    # ensure that chains are defined only at tables where they exist
    for table in ${!tables[@]}; do
        while read chain; do
            [[ "$chainarg" =~ ($chain) ]] && tables[$table]="$chain ${tables[$table]}"
        done< <($_iptables -L -t $table | $_sed -n 's/^Chain \(.*\) (.*$/\1/p')
    # apply actions on selected tables and chains
    for table in ${!tables[@]}; do
        for chain in ${tables[$table]}; do
            case $action in
                    # note that $policy is local to policy() but we inherit as
                    # in this case we're its child! that puzzled me for a while
                    # morale: beware with locals inheritance!!!
                    _info "$table $chain $policy"
                    $_iptables -t $table -P $chain $policy 
                    _info "$table $chain"
                    $_iptables -t $table -F $chain
                    _info "$table $chain"
                    $_iptables -t $table -Z $chain
                    _info "$table"
                    $_iptables -t $table -X
                    continue 2

_msg() {
    # for 3.6 this function will get a complete rewrite
    # stdin probably will be the only input for message text, and $@
    # will be just for parameters (as god intended ??) hehe
    # proper management/options for stream redir, colors, escapes, etc
    # will be stuff put in place here

    # use params for messages with header
    (( $# )) && {
        echo -e "${script[name]} (${script[pid]}): $@"

    # read messages from stdin
    local stuff
    while read stuff; do
        echo -e "$stuff"

# calls exposed functions internally via lookup table
_call() {
    local command="$1"
    ${calltable[$command]} $@

_init() {
    # used in eval expansions
    local macro

    # shortcut functions for messages:
    # visibility is determined @rt by config[verbosity] + script[verb_override]
    # non overridable levels include an exit with corresponding errlevel
    local verbosity level=0
    for verbosity in ${script[verb_levels]}; do
        IFS="" read -d '' macro <<MACRO
        _$verbosity() {
            (( \${config[verbosity]} + $level > ${script[verb_override]} || $level > ${script[verb_override]} )) &&  _msg <<< "${verbosity}: \"\$@\"";
            $( (( $level > ${script[verb_override]} )) && echo "exit $(( level - ${script[verb_override]} ));" )
        eval "$macro"
        (( level++ ))

    # globals with validated full path to external programs:
    # we include "which" too for the case the user lefts it misconfigured
    local program path
    for program in ${script[external_programs]}; do
        path="$( ${config[which]} "$program" )"
        [[ ! -x "$path" ]] && _fatal "\"$program\" could not be found or is not executable. Aborting."

        # sanitize varname and spaces in path, push expr into to the macro
        # for varname rules see bash manual, DEFINITIONS section, "name" paragraph
        macro="_${program//@([![:alnum:]])/_}=\"${path// /\ }\"; $macro"
    eval "$macro"

    # find functions named after pattern ${script[cmd_prefix]}. An optional
    # index can be used before the last character of the pattern to aid the
    # help system to sort the commands for presentation.

    # would liked a single datastruct (ie ordered hash) to contain sorted funcs
    # along with the mappings of command<->realfunc, but couldn't do it, so the
    # options were RT overhead at _call() and/or string manips (even) weirder
    # than these below

    # alternatively I could decouple user-cmd/help hinting from funcnames and
    # just use pure hashes. Less nice, less "automatic", IMO...
    # trades: (space|static|verbose config) vs (cpu|dynamic|verbose code)
    # hope for suggestions
    local index command function
    while IFS=" " read index command function; do
        # lookup table mapping cmd names to functions

        # sorted list of functions exposed as user commands
        # the conditional handles intermixed indexed/non-indexed commands
        (( 10#$index )) && script[valid_commands]="$command${script[valid_commands]:+ ${script[valid_commands]}}" \
                        || script[valid_commands]="${script[valid_commands]:+${script[valid_commands]} }$command"

    done< <(declare -F | $_sed -nr "s/.*(${script[cmd_prefix]%%?}([0-9]*)${script[cmd_prefix]: -1}(.*))/0\2 \3 \1/p" | $_sort -rg)

    # get the script directory
    script[directory]="$($_readlink -f "${0%/*}")"

# START ------------------------------------------------------------------------

# initial stuff

# command loop
while IFS="\n" read command; do
    case "$command" in
        "") _msg <<< 'try with ?' ;;
        \?) _msg <<< "valid commands: ${script[valid_commands]}" ;;
        @(${script[valid_commands]// /|})?(+([[:space:]])*)) _call $command ;;
        *) _error "invalid command: $command\\\nto see available commands: ${script[name]} ?" ;;
done <<< "$@"
Attached Files
File Type: txt v3.4.txt (10.1 KB, 10 views)
File Type: txt changelog.txt (2.0 KB, 8 views)
File Type: txt TODO.txt (668 Bytes, 9 views)

Last edited by Juako; 11-12-2011 at 01:11 PM. Reason: upped v3.5, changelog, TODO
Old 11-05-2011, 02:40 PM   #2
Senior Member
Registered: Nov 2007
Location: Somewhere on my hard drive...
Distribution: Manjaro
Posts: 2,703
Blog Entries: 23

Rep: Reputation: 405Reputation: 405Reputation: 405Reputation: 405Reputation: 405
Hey there!

Thanks for this thread! This is stuff I can learn something from
Old 11-05-2011, 04:25 PM   #3
Registered: Mar 2010
Posts: 202

Original Poster
Rep: Reputation: 84
Tanks man! glad you like it
Old 11-05-2011, 05:42 PM   #4
LQ Guru
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 22,090

Rep: Reputation: 5901Reputation: 5901Reputation: 5901Reputation: 5901Reputation: 5901Reputation: 5901Reputation: 5901Reputation: 5901Reputation: 5901Reputation: 5901Reputation: 5901
Agree with Thor 2.0...thanks very much for sharing. Good work.
Old 11-05-2011, 08:19 PM   #5
Registered: Mar 2010
Posts: 202

Original Poster
Rep: Reputation: 84
Originally Posted by TB0ne View Post
Agree with Thor 2.0...thanks very much for sharing. Good work.
Thanks a lot! Is good to know it's valuable to you fellows


administration, bash, firewall, iptables, script

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
Central management of iptables mnejat Linux - Software 4 12-09-2008 11:04 AM
LXer: Sir Bill and Sir Tim: A Tale of Two Knights LXer Syndicated Linux News 0 07-02-2008 01:00 AM
squid management with IPtables shamza Linux - Newbie 3 07-10-2005 03:48 PM
squid management with IPtables shamza Linux - Networking 1 07-08-2005 04:13 PM
My iptables script is /etc/sysconfig/iptables. How do i make this baby execute on boo ForumKid Linux - General 3 01-22-2002 08:36 AM > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:24 PM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration