blob: c923cebb206f7d10730bdc68ee7b2830f3080422 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
|
#!/usr/sbin/nft -f
# This example file shows how to use secmark labels with the nftables framework.
# This script is meant to be loaded with `nft -f <file>`
# You require linux kernel >= 4.20 and nft >= 0.9.3
# This example is SELinux based, for the secmark objects you require
# SELinux enabled and a SELinux policy defining the stated contexts
# For up-to-date information please visit https://wiki.nftables.org
flush ruleset
table inet x {
secmark ssh_server {
"system_u:object_r:ssh_server_packet_t:s0"
}
secmark dns_client {
"system_u:object_r:dns_client_packet_t:s0"
}
secmark http_client {
"system_u:object_r:http_client_packet_t:s0"
}
secmark https_client {
"system_u:object_r:http_client_packet_t:s0"
}
secmark ntp_client {
"system_u:object_r:ntp_client_packet_t:s0"
}
secmark icmp_client {
"system_u:object_r:icmp_client_packet_t:s0"
}
secmark icmp_server {
"system_u:object_r:icmp_server_packet_t:s0"
}
secmark ssh_client {
"system_u:object_r:ssh_client_packet_t:s0"
}
secmark git_client {
"system_u:object_r:git_client_packet_t:s0"
}
map secmapping_in {
type inet_service : secmark
elements = { 22 : "ssh_server" }
}
map secmapping_out {
type inet_service : secmark
elements = { 22 : "ssh_client", 53 : "dns_client", 80 : "http_client", 123 : "ntp_client", 443 : "http_client", 9418 : "git_client" }
}
chain y {
type filter hook input priority -225;
# label new incoming packets and add to connection
ct state new meta secmark set tcp dport map @secmapping_in
ct state new meta secmark set udp dport map @secmapping_in
ct state new ip protocol icmp meta secmark set "icmp_server"
ct state new ip6 nexthdr icmpv6 meta secmark set "icmp_server"
ct state new ct secmark set meta secmark
# set label for est/rel packets from connection
ct state established,related meta secmark set ct secmark
}
chain z {
type filter hook output priority 225;
# label new outgoing packets and add to connection
ct state new meta secmark set tcp dport map @secmapping_out
ct state new meta secmark set udp dport map @secmapping_out
ct state new ip protocol icmp meta secmark set "icmp_client"
ct state new ip6 nexthdr icmpv6 meta secmark set "icmp_client"
ct state new ct secmark set meta secmark
# set label for est/rel packets from connection
ct state established,related meta secmark set ct secmark
}
}
|