File: //proc/thread-self/root/opt/cpguard/app/scripts/fw_debug.sh
#!/bin/bash
#
# fw-debug.sh - Basic nftables & firewall diagnostic tool
# Safe: read-only checks only. No system changes.
#
FAMILY="inet"
TABLE="cpguard_fw"
VALID_PATHS=(
"/usr/sbin/nft"
"/sbin/nft"
"/usr/bin/nft"
"/bin/nft"
)
GREEN="\e[32m"; RED="\e[31m"; YELLOW="\e[33m"; CYAN="\e[36m"; RESET="\e[0m"
check() {
echo -e "${CYAN}==> $1${RESET}"
}
status() {
if [ "$1" -eq 0 ]; then
echo -e " ${GREEN}✔ $2${RESET}"
else
echo -e " ${RED}✘ $2${RESET}"
fi
}
warn() {
echo -e " ${YELLOW}⚠ $1${RESET}"
}
# --- Root check ---
if [ "$EUID" -ne 0 ]; then
echo -e "${RED}✘ Please run this script as root.${RESET}"
exit 1
fi
echo -e "${CYAN}\nFirewall Debug Tool - nftables Diagnostics${RESET}"
echo "---------------------------------------------"
# 1. Check nft binary in specific allowed paths
check "Checking for nft binary in standard paths..."
NFT_PATH=$(command -v nft 2>/dev/null)
if [[ -z "$NFT_PATH" ]]; then
status 1 "nft binary not found. Please install nftables."
exit 1
fi
if [[ " ${VALID_PATHS[*]} " =~ " ${NFT_PATH} " ]]; then
status 0 "nft binary found at ${NFT_PATH}"
else
status 1 "nft binary found at ${NFT_PATH}, but not in standard paths."
echo -e " Valid paths are:"
for p in "${VALID_PATHS[@]}"; do
echo " - $p"
done
exit 1
fi
# 2. Check nft version
check "Checking nft version..."
NFT_VER=$(nft --version 2>/dev/null | awk '{print $2}')
if [[ -z "$NFT_VER" ]]; then
status 1 "Unable to determine nft version (possibly broken install)"
else
status 0 "nft version: $NFT_VER"
fi
# 3. Kernel version
check "Checking kernel version..."
KERNEL_VER=$(uname -r)
K_MAJOR=$(echo "$KERNEL_VER" | cut -d. -f1)
K_MINOR=$(echo "$KERNEL_VER" | cut -d. -f2)
echo -e " Kernel version: ${KERNEL_VER}"
if (( K_MAJOR < 5 )); then
warn "Kernel is very old (<5.x). nftables may not fully support features."
elif (( K_MAJOR == 5 && K_MINOR < 10 )); then
warn "Kernel is older than 5.10. Some nft features may be missing."
else
status 0 "Kernel version is recent enough"
fi
# 4. nftables table and chains
check "Checking nftables table and basic chains..."
if nft list table $FAMILY $TABLE >/dev/null 2>&1; then
status 0 "Table '$FAMILY $TABLE' exists"
CHAINS=$(nft list table $FAMILY $TABLE | grep -E 'chain ' | awk '{print $2}')
echo " Chains found: $CHAINS"
else
status 1 "Table '$FAMILY $TABLE' not found. Firewall likely not initialized."
fi
# 5. nft ruleset validity
check "Checking nftables ruleset syntax..."
if nft list ruleset >/dev/null 2>&1; then
status 0 "Ruleset dump successful"
else
status 1 "Failed to read ruleset (broken setup or invalid rules)"
fi
# 6. Systemd service
check "Checking nftables service status..."
if systemctl list-unit-files | grep -q nftables.service; then
if systemctl is-active --quiet nftables; then
status 0 "nftables service is active"
else
warn "nftables service exists but is not active"
fi
else
warn "nftables service not found (manual setup likely)"
fi
# 7. IPv6 availability
check "Checking IPv6 availability..."
if [ -f /proc/net/if_inet6 ]; then
status 0 "IPv6 supported"
else
warn "IPv6 not supported or disabled"
fi
echo -e "\n${CYAN}Diagnostics completed.${RESET}"
echo "---------------------------------------------"
echo -e "If any ${RED}✘${RESET} or ${YELLOW}⚠${RESET} items appear above, please share this output with support.\n"