my lame attempt at a shell script...

Daniel Bye freebsd-questions at slightlystrange.org
Tue Jan 4 05:34:17 PST 2005


On Mon, Jan 03, 2005 at 05:28:56PM -0600, Eric F Crist wrote:
> A couple more questions, then I'm done. Promise.
> 
> I need to verify whether or not there is an entry for grog_firewall_oif 
> and grog_firewall_iif in /etc/rc.conf.  If not, I want to exit with an 
> error.

Read /etc/rc.conf into your script's namespace using the syntax already
discussed in this thread (`. /etc/defaults/rc.conf'), and you can then
test for the existence of any variable it defines (or doesn't define): 

if [ -n "${grog_firewall_iif}" ]
then
    # Do stuff if ${grog_firewall_iif} is set
else
    # Do stuff if ${grog_firewall_iif} is NOT set
fi

Or, to reverse the logic, use [ -z "{grog_firewall_iif}" ]

if [ -z "${grog_firewall_iif}" ]
then
    # Do stuff if ${grog_firewall_iif} is NOT set
else
    # Do stuff if ${grog_firewall_iif} is set
fi

> Also, a little more advanced, I need to pull information from an 
> ifconfig output.  I need to pull network numbers for both the internal 
> interface, as well as external interface.  For example,
> 
> vr0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
>         inet 192.168.1.5 netmask 0xffffff00 broadcast 192.168.1.255
>         inet6 fe80::20e:a6ff:feb9:2d3d%vr0 prefixlen 64 scopeid 0x3
>         ether 00:0e:a6:b9:2d:3d
>         media: Ethernet autoselect (100baseTX <full-duplex>)
>         status: active
> 
> I don't actually need my own address, I need to be able to figure out 
> that the system, based on the above output, is on the 192.168.1.0/24 
> network.  This will be input into my firewall rulesets.
> 
> I imagine that there's a util or command around that can do this, or I 
> can code out the math, but there's got to be an easier way.

ipfw(8) can understand the netmask in hex format, so you can simply say:

ii_nw=$(ifconfig "${grog_firewall_iif}" | awk '/inet/ {print $2":"$4}')

${ii_nw} will now contain something like "192.168.37.23:0xffffff00",
which you can safely pass to ipfw(8):

(2)[root at ip73:~]
---># ipfw add 900 allow ip from any to 192.168.37.23:0xffffff00
00900 allow ip from any to 192.168.0.0/24

HTH

Dan

-- 
Daniel Bye

PGP Key: ftp://ftp.slightlystrange.org/pgpkey/dan.asc
PGP Key fingerprint: 3B9D 8BBB EB03 BA83 5DB4 3B88 86FC F03A 90A1 BE8F
                                                                     _
                                              ASCII ribbon campaign ( )
                                         - against HTML, vCards and  X
                                - proprietary attachments in e-mail / \
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-questions/attachments/20050104/f7da3b58/attachment.bin


More information about the freebsd-questions mailing list