X-Git-Url: http://ftp.carnet.hr/carnet-debian/scm?a=blobdiff_plain;f=debian%2Fpostinst;h=6a57a0dc285a57330e9e0c03619ba75486630451;hb=a34e04407c58606899a68512cf7f259d91dd98c6;hp=81d185d1f9154e53e6bbe5e589370bfeb1fc77e8;hpb=a10ac83218b772a9ded3059d49407869b108bce2;p=iptables-cn.git diff --git a/debian/postinst b/debian/postinst index 81d185d..6a57a0d 100755 --- a/debian/postinst +++ b/debian/postinst @@ -34,26 +34,43 @@ if dpkg --compare-versions "$2" lt "2:1.2.11-4"; then fi # remove old iptables init script -if [ -e /etc/init.d/iptables ]; then - rm -f /etc/init.d/iptables - update-rc.d -f iptables remove -fi +update-rc.d -f iptables remove >/dev/null 2>&1 || true # check if old default file exists and import it if [ -e /etc/default/iptables ]; then mv /etc/default/iptables /etc/default/iptables-cn fi -# check if there is any default netfilter policy and install default SSH -# REJECT recent if there is none.. -# also, save current set of rules into active and inactive configuration -if [ ! -e /var/lib/iptables/active ]; then - if ! iptables-save | grep '^-' >/dev/null; then - echo "CN: Netfilter rules empty: importing SSH bruteforce rules" - . /usr/share/doc/iptables-cn/examples/ssh-bruteforce - fi +# check to see if fail2ban is installed +check=(fail2ban fail2ban-cn) +check=$(dpkg -s $check 2> /dev/null | egrep '^Package:|^Status:' | awk '{if ($1 ~ /^Package:/) { package=$2 } else if ($0 ~ /^Status: .* installed$/) { print package }}') +if [ "x$check" != "x" ]; then + echo "CN: Detected Fail2Ban installation, will remove SSH bruteforce rules by default" + iptables -D SSH_Brute_Force -m recent ! --rcheck --seconds 90 \ + --hitcount 3 --name SSH --rsource \ + -j RETURN >/dev/null 2>&1 || true + iptables -D SSH_Brute_Force -p tcp -j REJECT \ + --reject-with icmp-port-unreachable >/dev/null 2>&1 || true + iptables -D INPUT -p tcp -m tcp --dport 22 -m state \ + --state NEW -m recent --set --name SSH --rsource \ + -j SSH_Brute_Force >/dev/null 2>&1 || true + iptables -X SSH_Brute_Force >/dev/null 2>&1 || true + echo "CN: Saving current Netfilter rules to /var/lib/iptables/active" iptables-save > /var/lib/iptables/active +else + # check if there is any default netfilter policy and install default SSH + # REJECT recent if there is none.. + # also, save current set of rules into active and inactive configuration + if [ ! -e /var/lib/iptables/active ]; then + if ! iptables-save | grep '^-' >/dev/null; then + echo "CN: Netfilter rules empty: importing SSH bruteforce rules" + /usr/share/doc/iptables-cn/examples/ssh-bruteforce \ + 1>/dev/null 2>&1 || true + fi + echo "CN: Saving current Netfilter rules to /var/lib/iptables/active" + iptables-save > /var/lib/iptables/active + fi fi # create inactive