96 lines
3.0 KiB
Plaintext
96 lines
3.0 KiB
Plaintext
-- Example: home router firewall in FWL
|
|
-- Compile with: fwlc compile examples/router.fwl
|
|
|
|
interface wan : WAN { dynamic; };
|
|
interface lan : LAN { cidr4 = { 10.17.1.0/24 }; };
|
|
interface wg0 : WireGuard {};
|
|
|
|
zone lan_zone = { lan, wg0 };
|
|
|
|
import rfc1918 : CIDRSet from "builtin:rfc1918";
|
|
|
|
let forwards : Map<(Protocol, Port), (IP, Port)> = {
|
|
(tcp, :8080) -> (10.17.1.10, :80),
|
|
(tcp, :2222) -> (10.17.1.11, :22)
|
|
};
|
|
|
|
-- WireGuard handshake detection (compiles to ct mark state machine)
|
|
pattern WGInitiation : (UDPHeader, Bytes) =
|
|
(udp { length = 156 }, [0x01 _*]);
|
|
|
|
pattern WGResponse : (UDPHeader, Bytes) =
|
|
(udp { length = 100 }, [0x02 _*]);
|
|
|
|
flow WireGuardHandshake : FlowPattern =
|
|
WGInitiation . WGResponse within 5s;
|
|
|
|
-- Block LAN clients from tunnelling out via WireGuard
|
|
rule blockOutboundWG : Frame -> <FlowMatch, Log> Action =
|
|
\frame ->
|
|
case frame of {
|
|
| Frame(iif in lan_zone -> wan, IPv4(ip, UDP(udp, payload)))
|
|
if matches(WGInitiation, (udp, payload)) ->
|
|
case perform FlowMatch.check(flowOf(ip, wg), WireGuardHandshake) of {
|
|
| Matched -> do {
|
|
perform Log.emit(Warn, "WG blocked");
|
|
Drop
|
|
};
|
|
| _ -> Continue;
|
|
};
|
|
| _ -> Continue;
|
|
};
|
|
|
|
-- Inbound to router
|
|
policy input : Frame
|
|
on { hook = Input, table = Filter, priority = Filter }
|
|
= {
|
|
| _ if ct.state in { Established, Related } -> Allow;
|
|
| Frame(lo, _) -> Allow;
|
|
| Frame(_, IPv6(ip6, ICMPv6(_, _)))
|
|
if ip6.src in fe80::/10 -> Allow;
|
|
| Frame(_, IPv4(_, TCP(tcp, _)))
|
|
if tcp.dport == :22 -> Allow;
|
|
| Frame(_, IPv4(_, UDP(udp, _)))
|
|
if udp.dport == :51944 -> Allow;
|
|
| _ -> Drop;
|
|
};
|
|
|
|
-- Forwarded traffic
|
|
policy forward : Frame
|
|
on { hook = Forward, table = Filter, priority = Filter }
|
|
= {
|
|
| _ if ct.state in { Established, Related } -> Allow;
|
|
| frame if iif in lan_zone && oif == wan -> blockOutboundWG(frame);
|
|
| _ if ct.status == DNAT -> Allow;
|
|
| Frame(iif in lan_zone -> wan, _) -> Allow;
|
|
| Frame(iif in lan_zone -> lan_zone, _) -> Allow;
|
|
| Frame(wan -> lan_zone, IPv4(ip, TCP(tcp, _)))
|
|
if (ip.dst, tcp.dport) in forwards -> Allow;
|
|
| _ -> Drop;
|
|
};
|
|
|
|
-- Outbound from router
|
|
policy output : Frame
|
|
on { hook = Output, table = Filter, priority = Filter }
|
|
= {
|
|
| _ -> Allow;
|
|
};
|
|
|
|
-- NAT
|
|
policy nat_prerouting : Frame
|
|
on { hook = Prerouting, table = NAT, priority = DstNat }
|
|
= {
|
|
| Frame(_, IPv4(ip, _)) ->
|
|
if perform FIB.daddrLocal(ip.dst)
|
|
then DNATMap(forwards)
|
|
else Allow;
|
|
| _ -> Allow;
|
|
};
|
|
|
|
policy nat_postrouting : Frame
|
|
on { hook = Postrouting, table = NAT, priority = SrcNat }
|
|
= {
|
|
| Frame(_ -> wan, IPv4(ip, _)) if ip.src in rfc1918 -> Masquerade;
|
|
| _ -> Allow;
|
|
};
|