* [PATCH] suricata: Explicitly ignore IPsec traffic unless enabled
@ 2024-10-21 17:03 Michael Tremer
0 siblings, 0 replies; only message in thread
From: Michael Tremer @ 2024-10-21 17:03 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1106 bytes --]
Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>
---
src/initscripts/system/suricata | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/src/initscripts/system/suricata b/src/initscripts/system/suricata
index a753e32e6..a0f607971 100644
--- a/src/initscripts/system/suricata
+++ b/src/initscripts/system/suricata
@@ -111,6 +111,18 @@ generate_fw_rules() {
if [ "${!status}" = "on" ]; then
# Handle IPsec packets
case "${zone}" in
+ RED)
+ # If IPsec is not enabled, skip everything that is IPsec traffic
+ if [ "${ENABLE_IDS_IPSEC}" != "on" ]; then
+ for intf in $(network_get_intfs "${zone}"); do
+ iptables -w -t mangle -A IPS_SCAN_IN \
+ -i "${intf}" -m policy --pol ipsec --dir in -j RETURN
+ iptables -w -t mangle -A IPS_SCAN_OUT \
+ -o "${intf}" -m policy --pol ipsec --dir out -j RETURN
+ done
+ fi
+ ;;
+
IPSEC)
iptables -w -t mangle -A IPS_SCAN_IN \
-m policy --pol ipsec --dir in -j MARK --set-mark "$(( IPS_SCAN_MARK ))/$(( IPS_SCAN_MASK ))"
--
2.39.5
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2024-10-21 17:03 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-10-21 17:03 [PATCH] suricata: Explicitly ignore IPsec traffic unless enabled Michael Tremer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox