* [LARTC] Re: RFC1918 blocking and DNAT
@ 2001-04-11 21:50 Antonio Paulo Salgado Forster
0 siblings, 0 replies; only message in thread
From: Antonio Paulo Salgado Forster @ 2001-04-11 21:50 UTC (permalink / raw)
To: lartc
Not much related to this, but is there any way to make CBQ match packets
with no firewall mark set (default) when using Firewall mark classifier?
Thanks!
Forster
"Alexander W . Janssen" <yalla@ynfonatic.de>@lists.samba.org on 11/04/2001
18:34:57
Please respond to "Alexander W . Janssen" <yalla@ynfonatic.de>
Sent by: netfilter-admin@lists.samba.org
To: Urs Thuermann <urs@isnogud.escape.de>
cc: Netfilter Mailinglist <netfilter@lists.samba.org>
Subject: Re: RFC1918 blocking and DNAT
Hello Urs,
On Sun, Apr 01, 2001 at 11:03:42AM +0200, Urs Thuermann wrote:
[...]
> iptables -t mangle -A PREROUTING -s 10.0.0.0/8 -j MARK --set-mark
1
> iptables -t mangle -A PREROUTING -d 10.0.0.0/8 -j MARK --set-mark
1
> iptables -t mangle -A PREROUTING -s 172.16.0.0/12 -j MARK --set-mark
1
> iptables -t mangle -A PREROUTING -d 172.16.0.0/12 -j MARK --set-mark
1
> iptables -t mangle -A PREROUTING -s 192.168.0.0/16 -j MARK --set-mark
1
> iptables -t mangle -A PREROUTING -d 192.168.0.0/16 -j MARK --set-mark
1
>
> iptables -A extin -m mark --mark 1 -j DROP
>
> Would this work? And is there another way to do it, using only the
> filter tables?
yes, this would work. Another way to restrict so called "martians"
(packets with source-ip equal to private assigend ones which come from
the internet) is setting the kernel-option "reverse path filtering" to
the value of 2 for your external interface. Example:
echo 2 > /proc/sys/net/ipv4/conf/ippp0
if ippp0 is your external interface.
Turning on these options drops all packets with obvisiously "bogus"
packets, that means: If you have a network 172.16.0.0/12 behind your
firewall, then no one with one of these IP's would be allowed to be
routed through your Linux-Box. You might want to read the "Advanced
Routing HOWTO", especially section 12.1 "Reverse Path Filtering"
(http://www.linuxdoc.org/HOWTO/Adv-Routing-HOWTO-12.html).
Anyway, but the best would be to block martian on the router. Just add
the crap to the DENY-list of the router. Possible at least on Cisco.
Call your provider if you can't administrate your router by yourself.
> BTW, the man page does not tell what the default value of a packets
> netfilter mark is when it is not changed in the mangle table. I
> assume this is 0, right?
There is no implicit mark, you allways have to give a --set-mark.
Cheers, Alex.
--
Join the Linuxbierwanderung 2001 !
25.8.2001 - 1.9.2001 in Bouillon, Belgium
Sign on today at http://lbw2001.ynfonatic.de/
_______________________________________________
LARTC mailing list / LARTC@mailman.ds9a.nl
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://ds9a.nl/2.4Routing/
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2001-04-11 21:50 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2001-04-11 21:50 [LARTC] Re: RFC1918 blocking and DNAT Antonio Paulo Salgado Forster
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox