|
|
|
@ -252,6 +252,8 @@ func (p *Policy) processPacket(pkt *nfqueue.NFQPacket, pinfo *procsnitch.Info, o
|
|
|
|
|
dstip := net.IP(dstb)
|
|
|
|
|
srcip := net.IP(pkt.Packet.NetworkLayer().NetworkFlow().Src().Raw())
|
|
|
|
|
name := p.fw.dns.Lookup(dstip, pinfo.Pid)
|
|
|
|
|
log.Infof("Lookup(%s): %s", dstip.String(), name)
|
|
|
|
|
|
|
|
|
|
if !FirewallConfig.LogRedact {
|
|
|
|
|
log.Infof("Lookup(%s): %s", dstip.String(), name)
|
|
|
|
|
}
|
|
|
|
@ -441,13 +443,22 @@ func printPacket(pkt *nfqueue.NFQPacket, hostname string, pinfo *procsnitch.Info
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func (fw *Firewall) filterPacket(pkt *nfqueue.NFQPacket) {
|
|
|
|
|
isudp := pkt.Packet.Layer(layers.LayerTypeUDP) != nil
|
|
|
|
|
|
|
|
|
|
if basicAllowPacket(pkt) {
|
|
|
|
|
if isudp {
|
|
|
|
|
srcport, _ := getPacketUDPPorts(pkt)
|
|
|
|
|
|
|
|
|
|
if srcport == 53 {
|
|
|
|
|
fw.dns.processDNS(pkt)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pkt.Accept()
|
|
|
|
|
return
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
isudp := pkt.Packet.Layer(layers.LayerTypeUDP) != nil
|
|
|
|
|
if isudp {
|
|
|
|
|
/* if isudp {
|
|
|
|
|
srcport, _ := getPacketUDPPorts(pkt)
|
|
|
|
|
|
|
|
|
|
if srcport == 53 {
|
|
|
|
@ -457,6 +468,7 @@ func (fw *Firewall) filterPacket(pkt *nfqueue.NFQPacket) {
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
*/
|
|
|
|
|
_, dstip := getPacketIPAddrs(pkt)
|
|
|
|
|
/* _, dstp := getPacketPorts(pkt)
|
|
|
|
|
fwo := eatchAgainstOzRules(srcip, dstip, dstp)
|
|
|
|
@ -786,6 +798,7 @@ func basicAllowPacket(pkt *nfqueue.NFQPacket) bool {
|
|
|
|
|
if pkt.Packet.Layer(layers.LayerTypeUDP) != nil {
|
|
|
|
|
_, dport := getPacketUDPPorts(pkt)
|
|
|
|
|
if dport == 53 {
|
|
|
|
|
// fw.dns.processDNS(pkt)
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|