|
|
|
@ -1509,14 +1509,14 @@ class ServerConfigReaderTests(LogCaptureTestCase):
|
|
|
|
|
),
|
|
|
|
|
}),
|
|
|
|
|
# iptables-ipset-proto6 --
|
|
|
|
|
('j-w-iptables-ipset', 'iptables-ipset-proto6[name=%(__name__)s, bantime="10m", port="http", protocol="tcp", chain="<known/chain>"]', {
|
|
|
|
|
('j-w-iptables-ipset', 'iptables-ipset-proto6[name=%(__name__)s, port="http", protocol="tcp", chain="<known/chain>"]', {
|
|
|
|
|
'ip4': (' f2b-j-w-iptables-ipset ',), 'ip6': (' f2b-j-w-iptables-ipset6 ',),
|
|
|
|
|
'ip4-start': (
|
|
|
|
|
"`ipset create f2b-j-w-iptables-ipset hash:ip timeout 600`",
|
|
|
|
|
"`ipset create f2b-j-w-iptables-ipset hash:ip timeout 0 `",
|
|
|
|
|
"`iptables -w -I INPUT -p tcp -m multiport --dports http -m set --match-set f2b-j-w-iptables-ipset src -j REJECT --reject-with icmp-port-unreachable`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-start': (
|
|
|
|
|
"`ipset create f2b-j-w-iptables-ipset6 hash:ip timeout 600 family inet6`",
|
|
|
|
|
"`ipset create f2b-j-w-iptables-ipset6 hash:ip timeout 0 family inet6`",
|
|
|
|
|
"`ip6tables -w -I INPUT -p tcp -m multiport --dports http -m set --match-set f2b-j-w-iptables-ipset6 src -j REJECT --reject-with icmp6-port-unreachable`",
|
|
|
|
|
),
|
|
|
|
|
'flush': (
|
|
|
|
@ -1532,27 +1532,27 @@ class ServerConfigReaderTests(LogCaptureTestCase):
|
|
|
|
|
"`ipset destroy f2b-j-w-iptables-ipset6`",
|
|
|
|
|
),
|
|
|
|
|
'ip4-ban': (
|
|
|
|
|
r"`ipset add f2b-j-w-iptables-ipset 192.0.2.1 timeout 600 -exist`",
|
|
|
|
|
r"`ipset add f2b-j-w-iptables-ipset 192.0.2.1 timeout 0 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip4-unban': (
|
|
|
|
|
r"`ipset del f2b-j-w-iptables-ipset 192.0.2.1 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-ban': (
|
|
|
|
|
r"`ipset add f2b-j-w-iptables-ipset6 2001:db8:: timeout 600 -exist`",
|
|
|
|
|
r"`ipset add f2b-j-w-iptables-ipset6 2001:db8:: timeout 0 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-unban': (
|
|
|
|
|
r"`ipset del f2b-j-w-iptables-ipset6 2001:db8:: -exist`",
|
|
|
|
|
),
|
|
|
|
|
}),
|
|
|
|
|
# iptables-ipset-proto6-allports --
|
|
|
|
|
('j-w-iptables-ipset-ap', 'iptables-ipset-proto6-allports[name=%(__name__)s, bantime="10m", chain="<known/chain>"]', {
|
|
|
|
|
('j-w-iptables-ipset-ap', 'iptables-ipset-proto6-allports[name=%(__name__)s, chain="<known/chain>"]', {
|
|
|
|
|
'ip4': (' f2b-j-w-iptables-ipset-ap ',), 'ip6': (' f2b-j-w-iptables-ipset-ap6 ',),
|
|
|
|
|
'ip4-start': (
|
|
|
|
|
"`ipset create f2b-j-w-iptables-ipset-ap hash:ip timeout 600`",
|
|
|
|
|
"`ipset create f2b-j-w-iptables-ipset-ap hash:ip timeout 0 `",
|
|
|
|
|
"`iptables -w -I INPUT -m set --match-set f2b-j-w-iptables-ipset-ap src -j REJECT --reject-with icmp-port-unreachable`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-start': (
|
|
|
|
|
"`ipset create f2b-j-w-iptables-ipset-ap6 hash:ip timeout 600 family inet6`",
|
|
|
|
|
"`ipset create f2b-j-w-iptables-ipset-ap6 hash:ip timeout 0 family inet6`",
|
|
|
|
|
"`ip6tables -w -I INPUT -m set --match-set f2b-j-w-iptables-ipset-ap6 src -j REJECT --reject-with icmp6-port-unreachable`",
|
|
|
|
|
),
|
|
|
|
|
'flush': (
|
|
|
|
@ -1568,13 +1568,13 @@ class ServerConfigReaderTests(LogCaptureTestCase):
|
|
|
|
|
"`ipset destroy f2b-j-w-iptables-ipset-ap6`",
|
|
|
|
|
),
|
|
|
|
|
'ip4-ban': (
|
|
|
|
|
r"`ipset add f2b-j-w-iptables-ipset-ap 192.0.2.1 timeout 600 -exist`",
|
|
|
|
|
r"`ipset add f2b-j-w-iptables-ipset-ap 192.0.2.1 timeout 0 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip4-unban': (
|
|
|
|
|
r"`ipset del f2b-j-w-iptables-ipset-ap 192.0.2.1 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-ban': (
|
|
|
|
|
r"`ipset add f2b-j-w-iptables-ipset-ap6 2001:db8:: timeout 600 -exist`",
|
|
|
|
|
r"`ipset add f2b-j-w-iptables-ipset-ap6 2001:db8:: timeout 0 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-unban': (
|
|
|
|
|
r"`ipset del f2b-j-w-iptables-ipset-ap6 2001:db8:: -exist`",
|
|
|
|
@ -1852,14 +1852,14 @@ class ServerConfigReaderTests(LogCaptureTestCase):
|
|
|
|
|
),
|
|
|
|
|
}),
|
|
|
|
|
# firewallcmd-ipset (multiport) --
|
|
|
|
|
('j-w-fwcmd-ipset', 'firewallcmd-ipset[name=%(__name__)s, bantime="10m", port="http", protocol="tcp", chain="<known/chain>"]', {
|
|
|
|
|
('j-w-fwcmd-ipset', 'firewallcmd-ipset[name=%(__name__)s, port="http", protocol="tcp", chain="<known/chain>"]', {
|
|
|
|
|
'ip4': (' f2b-j-w-fwcmd-ipset ',), 'ip6': (' f2b-j-w-fwcmd-ipset6 ',),
|
|
|
|
|
'ip4-start': (
|
|
|
|
|
"`ipset create f2b-j-w-fwcmd-ipset hash:ip timeout 600`",
|
|
|
|
|
"`ipset create f2b-j-w-fwcmd-ipset hash:ip timeout 0 `",
|
|
|
|
|
"`firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 0 -p tcp -m multiport --dports http -m set --match-set f2b-j-w-fwcmd-ipset src -j REJECT --reject-with icmp-port-unreachable`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-start': (
|
|
|
|
|
"`ipset create f2b-j-w-fwcmd-ipset6 hash:ip timeout 600 family inet6`",
|
|
|
|
|
"`ipset create f2b-j-w-fwcmd-ipset6 hash:ip timeout 0 family inet6`",
|
|
|
|
|
"`firewall-cmd --direct --add-rule ipv6 filter INPUT_direct 0 -p tcp -m multiport --dports http -m set --match-set f2b-j-w-fwcmd-ipset6 src -j REJECT --reject-with icmp6-port-unreachable`",
|
|
|
|
|
),
|
|
|
|
|
'flush': (
|
|
|
|
@ -1875,27 +1875,27 @@ class ServerConfigReaderTests(LogCaptureTestCase):
|
|
|
|
|
"`ipset destroy f2b-j-w-fwcmd-ipset6`",
|
|
|
|
|
),
|
|
|
|
|
'ip4-ban': (
|
|
|
|
|
r"`ipset add f2b-j-w-fwcmd-ipset 192.0.2.1 timeout 600 -exist`",
|
|
|
|
|
r"`ipset add f2b-j-w-fwcmd-ipset 192.0.2.1 timeout 0 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip4-unban': (
|
|
|
|
|
r"`ipset del f2b-j-w-fwcmd-ipset 192.0.2.1 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-ban': (
|
|
|
|
|
r"`ipset add f2b-j-w-fwcmd-ipset6 2001:db8:: timeout 600 -exist`",
|
|
|
|
|
r"`ipset add f2b-j-w-fwcmd-ipset6 2001:db8:: timeout 0 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-unban': (
|
|
|
|
|
r"`ipset del f2b-j-w-fwcmd-ipset6 2001:db8:: -exist`",
|
|
|
|
|
),
|
|
|
|
|
}),
|
|
|
|
|
# firewallcmd-ipset (allports) --
|
|
|
|
|
('j-w-fwcmd-ipset-ap', 'firewallcmd-ipset[name=%(__name__)s, bantime="10m", actiontype=<allports>, protocol="tcp", chain="<known/chain>"]', {
|
|
|
|
|
('j-w-fwcmd-ipset-ap', 'firewallcmd-ipset[name=%(__name__)s, actiontype=<allports>, protocol="tcp", chain="<known/chain>"]', {
|
|
|
|
|
'ip4': (' f2b-j-w-fwcmd-ipset-ap ',), 'ip6': (' f2b-j-w-fwcmd-ipset-ap6 ',),
|
|
|
|
|
'ip4-start': (
|
|
|
|
|
"`ipset create f2b-j-w-fwcmd-ipset-ap hash:ip timeout 600`",
|
|
|
|
|
"`ipset create f2b-j-w-fwcmd-ipset-ap hash:ip timeout 0 `",
|
|
|
|
|
"`firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 0 -p tcp -m set --match-set f2b-j-w-fwcmd-ipset-ap src -j REJECT --reject-with icmp-port-unreachable`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-start': (
|
|
|
|
|
"`ipset create f2b-j-w-fwcmd-ipset-ap6 hash:ip timeout 600 family inet6`",
|
|
|
|
|
"`ipset create f2b-j-w-fwcmd-ipset-ap6 hash:ip timeout 0 family inet6`",
|
|
|
|
|
"`firewall-cmd --direct --add-rule ipv6 filter INPUT_direct 0 -p tcp -m set --match-set f2b-j-w-fwcmd-ipset-ap6 src -j REJECT --reject-with icmp6-port-unreachable`",
|
|
|
|
|
),
|
|
|
|
|
'flush': (
|
|
|
|
@ -1911,13 +1911,13 @@ class ServerConfigReaderTests(LogCaptureTestCase):
|
|
|
|
|
"`ipset destroy f2b-j-w-fwcmd-ipset-ap6`",
|
|
|
|
|
),
|
|
|
|
|
'ip4-ban': (
|
|
|
|
|
r"`ipset add f2b-j-w-fwcmd-ipset-ap 192.0.2.1 timeout 600 -exist`",
|
|
|
|
|
r"`ipset add f2b-j-w-fwcmd-ipset-ap 192.0.2.1 timeout 0 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip4-unban': (
|
|
|
|
|
r"`ipset del f2b-j-w-fwcmd-ipset-ap 192.0.2.1 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-ban': (
|
|
|
|
|
r"`ipset add f2b-j-w-fwcmd-ipset-ap6 2001:db8:: timeout 600 -exist`",
|
|
|
|
|
r"`ipset add f2b-j-w-fwcmd-ipset-ap6 2001:db8:: timeout 0 -exist`",
|
|
|
|
|
),
|
|
|
|
|
'ip6-unban': (
|
|
|
|
|
r"`ipset del f2b-j-w-fwcmd-ipset-ap6 2001:db8:: -exist`",
|
|
|
|
|