|
|
|
@ -13,16 +13,44 @@ actionstop =
|
|
|
|
|
|
|
|
|
|
actioncheck =
|
|
|
|
|
|
|
|
|
|
actionban = [ -n "<application>" ] && app="app <application>"
|
|
|
|
|
ufw insert <insertpos> <blocktype> from <ip> to <destination> $app
|
|
|
|
|
# ufw does "quickly process packets for which we already have a connection" in before.rules,
|
|
|
|
|
# therefore all related sockets should be closed
|
|
|
|
|
# actionban is using `ss` to do so, this only handles IPv4 and IPv6.
|
|
|
|
|
|
|
|
|
|
actionunban = [ -n "<application>" ] && app="app <application>"
|
|
|
|
|
ufw delete <blocktype> from <ip> to <destination> $app
|
|
|
|
|
actionban = if [ -n "<application>" ] && ufw app info "<application>"
|
|
|
|
|
then
|
|
|
|
|
ufw <add> <blocktype> from <ip> to <destination> app "<application>" comment "<comment>"
|
|
|
|
|
else
|
|
|
|
|
ufw <add> <blocktype> from <ip> to <destination> comment "<comment>"
|
|
|
|
|
fi
|
|
|
|
|
<kill>
|
|
|
|
|
|
|
|
|
|
actionunban = if [ -n "<application>" ] && ufw app info "<application>"
|
|
|
|
|
then
|
|
|
|
|
ufw delete <blocktype> from <ip> to <destination> app "<application>"
|
|
|
|
|
else
|
|
|
|
|
ufw delete <blocktype> from <ip> to <destination>
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
# Option: kill-mode
|
|
|
|
|
# Notes.: can be set to ss (may be extended later with other modes) to immediately drop all connections from banned IP, default empty (no kill)
|
|
|
|
|
# Example: banaction = ufw[kill-mode=ss]
|
|
|
|
|
kill-mode =
|
|
|
|
|
|
|
|
|
|
# intern conditional parameter used to provide killing mode after ban:
|
|
|
|
|
_kill_ =
|
|
|
|
|
_kill_ss = ss -K dst "[<ip>]"
|
|
|
|
|
|
|
|
|
|
# Option: kill
|
|
|
|
|
# Notes.: can be used to specify custom killing feature, by default depending on option kill-mode
|
|
|
|
|
# Examples: banaction = ufw[kill='ss -K "( sport = :http || sport = :https )" dst "[<ip>]"']
|
|
|
|
|
banaction = ufw[kill='cutter "<ip>"']
|
|
|
|
|
kill = <_kill_<kill-mode>>
|
|
|
|
|
|
|
|
|
|
[Init]
|
|
|
|
|
# Option: insertpos
|
|
|
|
|
# Notes.: The position number in the firewall list to insert the block rule
|
|
|
|
|
insertpos = 1
|
|
|
|
|
# Option: add
|
|
|
|
|
# Notes.: can be set to "insert 1" to insert a rule at certain position (here 1):
|
|
|
|
|
add = prepend
|
|
|
|
|
|
|
|
|
|
# Option: blocktype
|
|
|
|
|
# Notes.: reject or deny
|
|
|
|
|