TCLUG Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [TCLUG:16582] Firewalls revisited...



I coudl use it too.  Put it up somewhere for people to see.  Doesn't filtering
out cifs prevent people from getting to your machine through windows
networking?  

Scott Dier - dieman <dieman@ringworld.org> writes:

> On Mon, 24 Apr 2000, ^chewie wrote:
> 
> > 	DON'T set the default policy to DENY.
> > 	(e.g. ipchains -P input DENY)
> Actually, do, but dont miss any packets with the below rule :)
> 
> > 	Append a LAST rule in the input, output, and forward chains that DENY
> > 	and log any missed packets instead...
> 
> I have a LDROP chain that i put just after my drops...
> 
> # excerpts from my iptables setup script
> 
> $IPTABLES --new LDROP 2>/dev/null
> $IPTABLES -A LDROP --proto tcp -j LOG --log-level info \
>                                            --log-prefix "TCP Drop "
> echo -n "."
> $IPTABLES -A LDROP --proto udp -j LOG --log-level info \
>                                            --log-prefix "UDP Drop "
> echo -n "."
> $IPTABLES -A LDROP --proto icmp -j LOG --log-level info \
>                                            --log-prefix "ICMP Drop "
> echo -n "."
> $IPTABLES -A LDROP --proto gre -j LOG --log-level info \
>                                            --log-prefix "GRE Drop "
> echo -n "."
> $IPTABLES -A LDROP -f -j LOG --log-level emerg \
>                                   --log-prefix "FRAGMENT Drop"
> echo -n "."
> $IPTABLES -A LDROP -j DROP
> echo -n "."
> 
> $IPTABLES -A INPUT --src $LOCALIP -i ! lo -j LDROP
> 
> # I have a whole ton of icmp rules here too.
> 
> echo -n "Logging rules"
> # Who cares about cifs lookups
> $IPTABLES -A INPUT --proto udp --dport 137:138 -j DROP
> $IPTABLES -A OUTPUT --proto udp --dport 137:138 -j DROP
> $IPTABLES -A INPUT --proto udp --dport 67:67 -j DROP
> echo -n "."
> 
> # Same goes for irc server paranoia.
> $IPTABLES -A INPUT --proto tcp --syn --dport 1080 -j DROP 
> echo -n "."
> 
> # Log anything else"
> $IPTABLES -A INPUT -i ! lo --proto tcp --syn --j LDROP
> echo -n "."
> 
> # Log low port UDP
> $IPTABLES -A INPUT -i ! lo --proto udp --dport :1023 -j LDROP
> echo -n "."
> 
> RPC_UDP=`rpcinfo -p localhost|perl -n -e '/.*udp\s+(\d+)\s+/ && print
> $1,"\n"'|s
> ort -u`
> for port in $RPC_UDP; do
>   $IPTABLES -A INPUT -i ! lo --proto udp --dport $port -j LDROP
> done 
> echo -n "."
> 
> echo "Done"
> 
> 
> ask if you want the whole script.  I use state based filtering to deal
> with it too :)
> 
> $IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> 
> whee!
> 
> -- 
> Scott Dier <dieman@ringworld.org> #nicnac@efnet 612.301.0265
> http://www.ringworld.org/  finger:dieman@destiny.ringworld.org
> 
> Wait. Watch. Wonder.
> 	-J
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: tclug-list-unsubscribe@mn-linux.org
> For additional commands, e-mail: tclug-list-help@mn-linux.org

-- 
Jon Schewe 
http://eggplant.mtu.net/~jpschewe
schewe@tcfreenet.org