Linux Netfilter discussions
 help / color / mirror / Atom feed
* [Fwd: Re: Another way of doing? --state NEW -j DROP]
@ 2008-11-03  3:31 Sylvan
  0 siblings, 0 replies; 2+ messages in thread
From: Sylvan @ 2008-11-03  3:31 UTC (permalink / raw)
  To: netfilter


>> As an aside, one might question why you are using such a limiting
tool.  :(

Yeah I admit she's not the smartest of things. The main reason being I'd like to try the router is it uses nearly no electricity. I'm not trying to be 
stingy but in my neck of the woods electricity per unit has just gone up to 72c per unit. In the USA I understand it's around 15c and Australia 32c. 



On 11/2/2008 9:00 PM, Maximilian Wilhelm wrote:
> So you have to input all your rules via a GUI which does not accept 
> '--state NEW' right?

As an aside, one might question why you are using such a limiting tool.  :(

> Asuming yes and the you catch all '--state ESTABLISHED,RELATED' 
> packet which are/could be answer packets to outbound connections, how 
> about just leaving '--state NEW' out and DROP'ing all packets 
> remaining? Obviously after all rules which should accept things.

*nod*

This will work.

As far as TCP, you could watch for the SYN and ACK flag and filter out 
any packet that has are not fully established, i.e. SYN,ACK ACK.

> DROP'ing unwanted packets IMO is rather bad behavior as it makes 
> debugging (possible) network problems a lot harder. If you just 
> REJECT packets you don't want (with a appropriate limit) everybody 
> knows he is not welcome. So IMO it would be nicer to use '-j REJECT 
> --reject-with icmp-admin-prohibited'.

Agreed.

However you need to make sure that you will not reject packets with 
spoofed source address in to your network.  Consider Reverse Path filtering.





^ permalink raw reply	[flat|nested] 2+ messages in thread
* [Fwd: Re: Another way of doing? --state NEW -j DROP]
@ 2008-11-03  3:18 Sylvan
  0 siblings, 0 replies; 2+ messages in thread
From: Sylvan @ 2008-11-03  3:18 UTC (permalink / raw)
  To: Mail List - Netfilter


Thanks for your response Max.

I'm afraid it doesn't support rules using '--state ESTABLISHED,RELATED'
either. Apart from that it's a great router and does pretty much
everything else. Any other ideas/theory's ?

Thanks for your time.
Sylvan


Anno domini 2008 Sylvan scripsit:

Hi!

>  I am sure this might be an easy answer for someone. Could you please
> enlighten me ?

Let's see. :)

> I am using the rule below to drop any inbound connections into my .0.3
> Class which by default allows any Outbound connections. Plus if the
> connection is already established than those outside connections are ok
> as well.

> iptables -A INPUT -d 192.168.3.0/24 -m state --state NEW -j DROP

> However I am now using a router that doesn't support the -m state
> --state NEW rule.(crappy GUI thing) :-( Could someone please tell me another way using
> iptables to drop any new inbound connections but allow everything else
> outbound and the established connection replys to get back into the .0.3
> Class ? What is the most secure/easiest way ?

So you have to input all your rules via a GUI which does not acceppt
'--state NEW' right?
Asuming yes and the you catched all '--state ESTABLISHED,RELATED'
packet which are/could be answer packets to outbound connections, how
about just leaving '--state NEW' out and DROP'ing all packets
remaining? Obviously after all rules which should accept things.

Nearby:
 DROP'ing unwanted packets IMO is rather bad behavior as it makes
 debugging (possible) network problems a lot harder. If you just
 REJECT packets you don't want (with a appropriate limit) everybody
 knows he is not welcome. So IMO it would be nicer to use
 '-j REJECT --reject-with icmp-admin-prohibited'.

HTH
Ciao
Max


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2008-11-03  3:31 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-11-03  3:31 [Fwd: Re: Another way of doing? --state NEW -j DROP] Sylvan
  -- strict thread matches above, loose matches on Subject: below --
2008-11-03  3:18 Sylvan

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox