* RE: Iptables Rules
[not found] <47fc8b35.0e1f400a.4de1.0570@mx.google.com>
@ 2008-04-09 9:53 ` Jan Engelhardt
2008-04-09 17:01 ` Minh Cao
0 siblings, 1 reply; 20+ messages in thread
From: Jan Engelhardt @ 2008-04-09 9:53 UTC (permalink / raw)
To: Ukeme Noah; +Cc: 'Minh Cao', netfilter
>On Wednesday 2008-04-09 00:01, Minh Cao wrote:
>>Hi,
>>Is that matter if I placed the options/extensions ( -m
>>and -p ) in different orders ?
>
>No, but it matters between multiple -m.
On Wednesday 2008-04-09 11:23, Ukeme Noah wrote:
>Howdy,
>The last two, the ones using the state machine might give you problems if
>you use only those without specifying to allow established ssh connections.
>
>So, I'd suggest you add ,ESTABLISHED right after NEW to make the line
Adding random states to rules of which you do not have the context
is unlikely to be fruitful.
^ permalink raw reply [flat|nested] 20+ messages in thread* RE: Iptables Rules
2008-04-09 9:53 ` Iptables Rules Jan Engelhardt
@ 2008-04-09 17:01 ` Minh Cao
2008-04-09 17:03 ` Jan Engelhardt
0 siblings, 1 reply; 20+ messages in thread
From: Minh Cao @ 2008-04-09 17:01 UTC (permalink / raw)
To: Jan Engelhardt, Ukeme Noah; +Cc: 'Minh Cao', netfilter
Thanks for your help !
Please explain why these two acting differently.
On #2 I can login as anonymous, but ls.
Can I combine two rules into one ?
1/
-A INPUT -m state --state RELATED,ESTABLISHED -j
ACCEPT
-A INPUT -m state --state NEW -p tcp -m tcp --dport 21
-j ACCEPT
2/
-A INPUT -m state --state NEW,RELATED,ESTABLISHED -p
tcp -m tcp --dport 21 -j ACCEPT
--- Jan Engelhardt <jengelh@computergmbh.de> wrote:
>
> >On Wednesday 2008-04-09 00:01, Minh Cao wrote:
> >>Hi,
> >>Is that matter if I placed the options/extensions
> ( -m
> >>and -p ) in different orders ?
> >
> >No, but it matters between multiple -m.
>
> On Wednesday 2008-04-09 11:23, Ukeme Noah wrote:
> >Howdy,
> >The last two, the ones using the state machine
> might give you problems if
> >you use only those without specifying to allow
> established ssh connections.
> >
> >So, I'd suggest you add ,ESTABLISHED right after
> NEW to make the line
>
> Adding random states to rules of which you do not
> have the context
> is unlikely to be fruitful.
>
> --
> To unsubscribe from this list: send the line
> "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at
> http://vger.kernel.org/majordomo-info.html
>
^ permalink raw reply [flat|nested] 20+ messages in thread
* RE: Iptables Rules
2008-04-09 17:01 ` Minh Cao
@ 2008-04-09 17:03 ` Jan Engelhardt
0 siblings, 0 replies; 20+ messages in thread
From: Jan Engelhardt @ 2008-04-09 17:03 UTC (permalink / raw)
To: Minh Cao; +Cc: Ukeme Noah, netfilter
On Wednesday 2008-04-09 19:01, Minh Cao wrote:
>Thanks for your help !
>
>Please explain why these two acting differently.
>On #2 I can login as anonymous, but ls.
^ but not ls
That's because in #2, you limit RELATED to port 21,
which is essentially meaningless.
In #1, RELATED applies to any port (as does ESTABLISHED).
>Can I combine two rules into one ?
>
>1/
>-A INPUT -m state --state RELATED,ESTABLISHED -j
>ACCEPT
>-A INPUT -m state --state NEW -p tcp -m tcp --dport 21
>-j ACCEPT
No.
^ permalink raw reply [flat|nested] 20+ messages in thread
* Iptables Rules
@ 2008-04-08 22:01 Minh Cao
2008-04-09 4:12 ` Jan Engelhardt
0 siblings, 1 reply; 20+ messages in thread
From: Minh Cao @ 2008-04-08 22:01 UTC (permalink / raw)
To: netfilter
Hi,
Is that matter if I placed the options/extensions ( -m
and -p ) in different orders ?
Please tell me these 4 configurations make any
difference ... in term allows ssh to my workstation.
-A INPUT -s 1.2.3.0/24 -p tcp -m tcp --dport 22 -j
ACCEPT
-A INPUT -s 1.2.3.0/24 -m tcp -p tcp --dport 22 -j
ACCEPT
-A INPUT -s 1.2.3.0/24 -p tcp -m state --state NEW -m
tcp --dport 22 -j ACCEPT
-A INPUT -s 1.2.3.0/24 -m state --state NEW -m tcp -p
tcp --dport 22 -j ACCEPT
Thanks !
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: Iptables Rules
2008-04-08 22:01 Minh Cao
@ 2008-04-09 4:12 ` Jan Engelhardt
0 siblings, 0 replies; 20+ messages in thread
From: Jan Engelhardt @ 2008-04-09 4:12 UTC (permalink / raw)
To: Minh Cao; +Cc: netfilter
On Wednesday 2008-04-09 00:01, Minh Cao wrote:
>Hi,
>Is that matter if I placed the options/extensions ( -m
>and -p ) in different orders ?
No, but it matters between multiple -m.
>-A INPUT -s 1.2.3.0/24 -p tcp -m tcp --dport 22 -j
>ACCEPT
>-A INPUT -s 1.2.3.0/24 -m tcp -p tcp --dport 22 -j
>ACCEPT
no
>-A INPUT -s 1.2.3.0/24 -p tcp -m state --state NEW -m
>tcp --dport 22 -j ACCEPT
>
>
>-A INPUT -s 1.2.3.0/24 -m state --state NEW -m tcp -p
>tcp --dport 22 -j ACCEPT
no.
(But "-m conntrack --ctstate NEW -m tcp" and
"-m tcp -m conntrack --ctstate NEW" would)
^ permalink raw reply [flat|nested] 20+ messages in thread
* Iptables rules.
@ 2007-09-22 18:57 Shams Fantar
2007-09-22 19:32 ` Eljas Alakulppi
2007-09-22 19:44 ` Mike Wright
0 siblings, 2 replies; 20+ messages in thread
From: Shams Fantar @ 2007-09-22 18:57 UTC (permalink / raw)
To: netfilter
Hello,
I am writing iptables rules. Here is the rules, they are in a script :
http://jumble.snurf.info/iptables-start
When I use it, It blocks all access to the network. Why ?
Do you have suggestions for my rules ?
Regards,
--
Shams Fantar (http://snurf.info)
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: Iptables rules.
2007-09-22 18:57 Iptables rules Shams Fantar
@ 2007-09-22 19:32 ` Eljas Alakulppi
2007-09-22 19:44 ` Mike Wright
1 sibling, 0 replies; 20+ messages in thread
From: Eljas Alakulppi @ 2007-09-22 19:32 UTC (permalink / raw)
To: Shams Fantar, netfilter
Add:
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
Reason: You aren't allowing the incoming packets from the host you are
connected to (you send a packet, server recieves the packet, server sends
reply, your iptables rules drop it).
Shams Fantar <sfantar@snurf.info> kirjoitti Sat, 22 Sep 2007 21:57:21
+0300:
> Hello,
>
> I am writing iptables rules. Here is the rules, they are in a script :
> http://jumble.snurf.info/iptables-start
>
> When I use it, It blocks all access to the network. Why ?
>
> Do you have suggestions for my rules ?
>
> Regards,
>
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: Iptables rules.
2007-09-22 18:57 Iptables rules Shams Fantar
2007-09-22 19:32 ` Eljas Alakulppi
@ 2007-09-22 19:44 ` Mike Wright
1 sibling, 0 replies; 20+ messages in thread
From: Mike Wright @ 2007-09-22 19:44 UTC (permalink / raw)
To: Shams Fantar; +Cc: netfilter
Shams Fantar wrote:
> Hello,
>
> I am writing iptables rules. Here is the rules, they are in a script :
> http://jumble.snurf.info/iptables-start
>
> When I use it, It blocks all access to the network. Why ?
>
> Do you have suggestions for my rules ?
There has to be a way for replies to outbound traffic to get back in.
Maybe this (probably near the top):
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
The rules -A OUTPUT aren't needed because OUTPUT's policy is already ACCEPT.
hth,
:m)
^ permalink raw reply [flat|nested] 20+ messages in thread
* multiports
@ 2005-08-04 19:36 Peggy Kam
2005-08-05 6:34 ` multiports Jan Engelhardt
0 siblings, 1 reply; 20+ messages in thread
From: Peggy Kam @ 2005-08-04 19:36 UTC (permalink / raw)
To: netfilter
Hi,
Is it possible to match multiple source and destination ports at the
same time? It seems to me that it is not possible. I am using iptables
version 1.2.11 and I have tried the following command:
iptables -A INPUT -p tcp --src 192.168.1.0/255.255.255.0 -m tcp -m
multiport --sports 22,80 --dst 192.168.22.123 -m multiport --dports
22,80 -j ACCEPT
Please correct me if I have the wrong syntax. Any advice is
appreciated.
Thanks in advance,
Peggy
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: multiports
2005-08-04 19:36 multiports Peggy Kam
@ 2005-08-05 6:34 ` Jan Engelhardt
2005-08-10 20:13 ` Maximum number of ports? Peggy Kam
0 siblings, 1 reply; 20+ messages in thread
From: Jan Engelhardt @ 2005-08-05 6:34 UTC (permalink / raw)
To: Peggy Kam; +Cc: netfilter
>Is it possible to match multiple source and destination ports at the
>same time? It seems to me that it is not possible. I am using iptables
>version 1.2.11 and I have tried the following command:
>
>iptables -A INPUT -p tcp --src 192.168.1.0/255.255.255.0 -m tcp -m
>multiport --sports 22,80 --dst 192.168.22.123 -m multiport --dports
>22,80 -j ACCEPT
Everything is ANDed, so the following combinations are only possible with your
rule:
22/22
22/80
80/22
80/80
Probably not what you want, given that most HTTP clients connect from some
high-random port.
You need to separate rules,
-m multiport --dports 22,80
-m multiport --sports 22,80
to get an OR behavior
Jan Engelhardt
--
^ permalink raw reply [flat|nested] 20+ messages in thread
* Maximum number of ports?
2005-08-05 6:34 ` multiports Jan Engelhardt
@ 2005-08-10 20:13 ` Peggy Kam
2005-09-13 22:10 ` Maximum number of rules in iptables? Peggy Kam
0 siblings, 1 reply; 20+ messages in thread
From: Peggy Kam @ 2005-08-10 20:13 UTC (permalink / raw)
To: netfilter
Hi,
What is the maximum number of ports that I can define in the iptables?
What is the limitation?
Thanks in advance,
Peggy
^ permalink raw reply [flat|nested] 20+ messages in thread
* Maximum number of rules in iptables?
2005-08-10 20:13 ` Maximum number of ports? Peggy Kam
@ 2005-09-13 22:10 ` Peggy Kam
2005-09-15 15:22 ` iptables rules Peggy Kam
0 siblings, 1 reply; 20+ messages in thread
From: Peggy Kam @ 2005-09-13 22:10 UTC (permalink / raw)
To: netfilter
Hi,
What is the maximum number of policies I can define in the iptables?
ie. how much memory is allocated for iptables?
Thanks in advance,
Peggy
^ permalink raw reply [flat|nested] 20+ messages in thread
* iptables rules
2005-09-13 22:10 ` Maximum number of rules in iptables? Peggy Kam
@ 2005-09-15 15:22 ` Peggy Kam
2005-09-15 15:26 ` Jörg Harmuth
2005-09-15 15:33 ` Jörg Harmuth
0 siblings, 2 replies; 20+ messages in thread
From: Peggy Kam @ 2005-09-15 15:22 UTC (permalink / raw)
To: netfilter
Hi,
I have defined the following firewall rule in iptables:
iptables -I FORWARD -s 192.168.22.102 -d 192.168.1.112 -p tcp -m tcp -m
multiport --ports 22,23,24,25 -j ACCEPT
why were the packets able to get to 192.168.1.112 on port 22 when the
packets does not even come from ports 22,23,24 or 25?
Thanks in advance,
Peggy
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: iptables rules
2005-09-15 15:22 ` iptables rules Peggy Kam
@ 2005-09-15 15:26 ` Jörg Harmuth
2005-09-15 15:37 ` Peggy Kam
2005-09-15 15:33 ` Jörg Harmuth
1 sibling, 1 reply; 20+ messages in thread
From: Jörg Harmuth @ 2005-09-15 15:26 UTC (permalink / raw)
To: netfilter
Peggy Kam wrote:
> Hi,
>
> I have defined the following firewall rule in iptables:
>
> iptables -I FORWARD -s 192.168.22.102 -d 192.168.1.112 -p tcp -m tcp -m
> multiport --ports 22,23,24,25 -j ACCEPT
>
> why were the packets able to get to 192.168.1.112 on port 22 when the
> packets does not even come from ports 22,23,24 or 25?
man iptables:
--ports [!] port[,port[,port:port...]]
Match if either the source or destination
ports are equal to one
of the given ports.
So, this is expected behaviour, provided that there are no other rules
in the way.
HTH,
Joerg
^ permalink raw reply [flat|nested] 20+ messages in thread* Re: iptables rules
2005-09-15 15:26 ` Jörg Harmuth
@ 2005-09-15 15:37 ` Peggy Kam
2005-09-15 16:23 ` Jörg Harmuth
0 siblings, 1 reply; 20+ messages in thread
From: Peggy Kam @ 2005-09-15 15:37 UTC (permalink / raw)
To: Jörg Harmuth; +Cc: netfilter
did the manpage gets changed recently? the iptables manpage that I see
states that:
--port [port[,port]]
Match if the both the source and destination ports are equal to
each other and to one of the given ports.
On Thu, 2005-09-15 at 17:26 +0200, Jörg Harmuth wrote:
> Peggy Kam wrote:
> > Hi,
> >
> > I have defined the following firewall rule in iptables:
> >
> > iptables -I FORWARD -s 192.168.22.102 -d 192.168.1.112 -p tcp -m tcp -m
> > multiport --ports 22,23,24,25 -j ACCEPT
> >
> > why were the packets able to get to 192.168.1.112 on port 22 when the
> > packets does not even come from ports 22,23,24 or 25?
>
> man iptables:
>
> --ports [!] port[,port[,port:port...]]
> Match if either the source or destination
> ports are equal to one
> of the given ports.
>
> So, this is expected behaviour, provided that there are no other rules
> in the way.
>
> HTH,
>
> Joerg
>
>
^ permalink raw reply [flat|nested] 20+ messages in thread* Re: iptables rules
2005-09-15 15:37 ` Peggy Kam
@ 2005-09-15 16:23 ` Jörg Harmuth
2005-10-21 13:46 ` Realos
0 siblings, 1 reply; 20+ messages in thread
From: Jörg Harmuth @ 2005-09-15 16:23 UTC (permalink / raw)
To: netfilter
Peggy Kam wrote:
> did the manpage gets changed recently? the iptables manpage that I see
> states that:
>
> --port [port[,port]]
> Match if the both the source and destination ports are equal to
> each other and to one of the given ports.
I see. You are referring to -m mport --port*s* (by the way, there is a
typo or are you referring to another module ?), which is different from
-m multiport --port*s* port[...] - which I was referring to. Your rule was
... -m multiport --ports 22,23,24,25 -j ACCEPT
So I looked for multiport.
HTH,
Joerg
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: iptables rules
2005-09-15 16:23 ` Jörg Harmuth
@ 2005-10-21 13:46 ` Realos
2005-10-21 16:03 ` Rob Sterenborg
2005-10-21 16:19 ` Jörg Harmuth
0 siblings, 2 replies; 20+ messages in thread
From: Realos @ 2005-10-21 13:46 UTC (permalink / raw)
To: netfilter
Jörg Harmuth wanted us to know:
>I see. You are referring to -m mport --port*s* (by the way, there is a
>typo or are you referring to another module ?), which is different from
>-m multiport --port*s* port[...] - which I was referring to. Your rule was
>
>... -m multiport --ports 22,23,24,25 -j ACCEPT
>
>So I looked for multiport.
There seems to be an inconsistence between man pages Jörg Harmuth has installed
and of some other people (the original poster and myself at least).
man iptables:
mport
...
--ports port[,port[,port...]]
Match if the both the source and destination ports are
equal to each other and to one of the given
ports.
multiport
...
used in conjunction with -p tcp or -p udp.
rts port[,port[,port...]]
Match if the both the source and destination ports
are equal to each other and to one of the given
ports.
Mar 09, 2002 IPTABLES(8)
BTW, what is the diffence between mport and multiport modules?
--
Realos
^ permalink raw reply [flat|nested] 20+ messages in thread
* RE: iptables rules
2005-10-21 13:46 ` Realos
@ 2005-10-21 16:03 ` Rob Sterenborg
2005-10-21 16:19 ` Jörg Harmuth
1 sibling, 0 replies; 20+ messages in thread
From: Rob Sterenborg @ 2005-10-21 16:03 UTC (permalink / raw)
To: netfilter
> There seems to be an inconsistence between man pages Jörg
> Harmuth has installed and of some other people (the original poster
> and myself at least).
>
> man iptables:
>
> mport
> ...
> --ports port[,port[,port...]]
> Match if the both the source and destination ports are
> equal to each other and to one of the given
> ports.
>
> multiport
> ...
> used in conjunction with -p tcp or -p udp.
> rts port[,port[,port...]]
> Match if the both the source and destination ports
> are equal to each other and to one of the given ports.
>
> Mar 09, 2002 IPTABLES(8)
>
> BTW, what is the diffence between mport and multiport modules?
Mport is obsoleted according to :
http://www.netfilter.org/projects/patch-o-matic/pom-obsolete.html
Searching the Netfilter site I read that mport was to be combined with
multiport :
http://www.netfilter.org/documentation/conferences/nf-workshop-2004-summ
ary.html (mport TODO: combine with multiport). So, I think this work has
been done.
Gr,
Rob
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: iptables rules
2005-10-21 13:46 ` Realos
2005-10-21 16:03 ` Rob Sterenborg
@ 2005-10-21 16:19 ` Jörg Harmuth
1 sibling, 0 replies; 20+ messages in thread
From: Jörg Harmuth @ 2005-10-21 16:19 UTC (permalink / raw)
To: netfilter
Realos wrote:
> Jörg Harmuth wanted us to know:
>
>
>> I see. You are referring to -m mport --port*s* (by the way, there is a
>> typo or are you referring to another module ?), which is different from
>> -m multiport --port*s* port[...] - which I was referring to. Your rule was
>>
>> ... -m multiport --ports 22,23,24,25 -j ACCEPT
>>
>> So I looked for multiport.
>
> There seems to be an inconsistence between man pages Jörg Harmuth has installed
> and of some other people (the original poster and myself at least).
>
> man iptables:
>
> mport
> ...
> --ports port[,port[,port...]]
> Match if the both the source and destination ports are
> equal to each other and to one of the given
> ports.
>
> multiport
> ...
> used in conjunction with -p tcp or -p udp.
> rts port[,port[,port...]]
> Match if the both the source and destination ports
> are equal to each other and to one of the given
> ports.
>
> Mar 09, 2002 IPTABLES(8)
>
> BTW, what is the diffence between mport and multiport modules?
>
>
Hmm, interesting. I looked again and I see:
man iptables:
mport
--ports port[,port[,port...]]
Match if the both the source and destination ports are
equal to each other and to one of the given ports.
multiport
--ports [!] port[,port[,port:port...]]
Match if either the source or destination ports are
equal to one of the given ports.
My iptables is a self compiled 1.3.3 running on Sarge, one box with
kernel 2.4.31 the other box with kernel 2.6.13.1. May be an iptables
version issue ?
Have a nice time,
Joerg
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: iptables rules
2005-09-15 15:22 ` iptables rules Peggy Kam
2005-09-15 15:26 ` Jörg Harmuth
@ 2005-09-15 15:33 ` Jörg Harmuth
1 sibling, 0 replies; 20+ messages in thread
From: Jörg Harmuth @ 2005-09-15 15:33 UTC (permalink / raw)
To: netfilter
For the sake of completeness :)
Peggy Kam wrote:
> Hi,
>
> I have defined the following firewall rule in iptables:
>
> iptables -I FORWARD -s 192.168.22.102 -d 192.168.1.112 -p tcp -m tcp -m
> multiport --ports 22,23,24,25 -j ACCEPT
>
> why were the packets able to get to 192.168.1.112 on port 22 when the
> packets does not even come from ports 22,23,24 or 25?
man iptables:
multiport
...
--ports [!] port[,port[,port:port...]]
Match if either the source or destination
ports are equal to one
of the given ports.
So, this is expected behavior, provided that there are no other rules
in the way.
HTH,
Joerg
!DSPAM:43299390313231087616080!
^ permalink raw reply [flat|nested] 20+ messages in thread
* RE: Iptables rules...
@ 2002-09-09 4:06 Didier Hung Wan Luk
0 siblings, 0 replies; 20+ messages in thread
From: Didier Hung Wan Luk @ 2002-09-09 4:06 UTC (permalink / raw)
To: Antony Stone, Netfilter Mailing List
Thanks :-))
Didier Hung Wan Luk
FRCI, Sibotie House
L'Anse Courtois
Pailles
Tel: 230-2869636
Fax: 230-2869629
-----Original Message-----
From: Antony Stone [mailto:Antony@Soft-Solutions.co.uk]
Sent: Saturday, September 07, 2002 2:37 PM
To: Netfilter Mailing List
Subject: Re: Iptables rules...
On Saturday 07 September 2002 10:39 am, Didier Hung Wan Luk wrote:
> Hi All,
>
>
> I am new to firewall/iptables can someone help me to clear up some concepts
> about firewalling?
>
> If my default rule for the input chain of my external interface is DROP
> need I again specify to DROP packets in the INPUT chain of my external
> interface?
There is only one INPUT chain. The rules and the default policy apply to
all interfaces.
> #My Default rule
> iptables -P INPUT DROP
>
> #Drop all attempts on my ext. interface trough port 6000:6063
>
> iptables -A INPUT -i ppp0 -p tcp --dport 6000:6063 -j DROP
>
> If I am right I think that I need not include a rule again saying to drop
> packets to my 6000;6063 ports since I do not have a rule saying to accept
> connections on these ports...
If you have a default DROP policy, then you should not (normally) need to
specify any DROP rules. If you do not have a rule ACCEPTing certain
packets, then they will be DROPped by default. That is what the policy is
for.
For example:
iptables -P INPUT DROP
iptables -A INPUT -p tcp --dport 80 -j ACCEPT
will drop SMTP traffic on port 25, because there is no rule ACCEPTing it.
These rules will also drop POP3, IMAP, FTP, IDENT....... everything except
HTTP.
Antony.
--
90% of network problems are routing problems.
9 of the remaining 10% are routing problems in the other direction.
The remaining 1% might be something else, but check the routing anyway.
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: Iptables rules...
@ 2002-09-07 11:59 ashivale
0 siblings, 0 replies; 20+ messages in thread
From: ashivale @ 2002-09-07 11:59 UTC (permalink / raw)
To: Didier Hung Wan Luk; +Cc: Netfilter Mailing List
[-- Attachment #1: Type: text/plain, Size: 865 bytes --]
Hi,
The default policy you set is the default for all the packets in that chain. Hence you need not specify it again for the INPUT chain.
bye,
Amit
Didier Hung Wan Luk wrote:
> Hi All,
>
>
> I am new to firewall/iptables can someone help me to clear up some concepts about firewalling?
>
> If my default rule for the input chain of my external interface is DROP need I again specify to DROP packets in the INPUT chain of my external interface?
>
> i.e..
>
> #My Default rule
> iptables -P INPUT DROP
>
> #Drop all attempts on my ext. interface trough port 6000:6063
>
> iptables -A INPUT -i ppp0 -p tcp --dport 6000:6063 -j DROP
>
> If I am right I think that I need not include a rule again saying to drop packets to my 6000;6063 ports since I do not have a rule saying to accept connections on these ports...
>
> Thanks,
>
> Didier Hung Wan Luk
>
>
^ permalink raw reply [flat|nested] 20+ messages in thread
* Iptables rules...
@ 2002-09-07 9:39 Didier Hung Wan Luk
2002-09-07 10:36 ` Antony Stone
0 siblings, 1 reply; 20+ messages in thread
From: Didier Hung Wan Luk @ 2002-09-07 9:39 UTC (permalink / raw)
To: Netfilter Mailing List
Hi All,
I am new to firewall/iptables can someone help me to clear up some concepts about firewalling?
If my default rule for the input chain of my external interface is DROP need I again specify to DROP packets in the INPUT chain of my external interface?
i.e..
#My Default rule
iptables -P INPUT DROP
#Drop all attempts on my ext. interface trough port 6000:6063
iptables -A INPUT -i ppp0 -p tcp --dport 6000:6063 -j DROP
If I am right I think that I need not include a rule again saying to drop packets to my 6000;6063 ports since I do not have a rule saying to accept connections on these ports...
Thanks,
Didier Hung Wan Luk
^ permalink raw reply [flat|nested] 20+ messages in thread
* Re: Iptables rules...
2002-09-07 9:39 Didier Hung Wan Luk
@ 2002-09-07 10:36 ` Antony Stone
0 siblings, 0 replies; 20+ messages in thread
From: Antony Stone @ 2002-09-07 10:36 UTC (permalink / raw)
To: Netfilter Mailing List
On Saturday 07 September 2002 10:39 am, Didier Hung Wan Luk wrote:
> Hi All,
>
>
> I am new to firewall/iptables can someone help me to clear up some concepts
> about firewalling?
>
> If my default rule for the input chain of my external interface is DROP
> need I again specify to DROP packets in the INPUT chain of my external
> interface?
There is only one INPUT chain. The rules and the default policy apply to
all interfaces.
> #My Default rule
> iptables -P INPUT DROP
>
> #Drop all attempts on my ext. interface trough port 6000:6063
>
> iptables -A INPUT -i ppp0 -p tcp --dport 6000:6063 -j DROP
>
> If I am right I think that I need not include a rule again saying to drop
> packets to my 6000;6063 ports since I do not have a rule saying to accept
> connections on these ports...
If you have a default DROP policy, then you should not (normally) need to
specify any DROP rules. If you do not have a rule ACCEPTing certain
packets, then they will be DROPped by default. That is what the policy is
for.
For example:
iptables -P INPUT DROP
iptables -A INPUT -p tcp --dport 80 -j ACCEPT
will drop SMTP traffic on port 25, because there is no rule ACCEPTing it.
These rules will also drop POP3, IMAP, FTP, IDENT....... everything except
HTTP.
Antony.
--
90% of network problems are routing problems.
9 of the remaining 10% are routing problems in the other direction.
The remaining 1% might be something else, but check the routing anyway.
^ permalink raw reply [flat|nested] 20+ messages in thread
end of thread, other threads:[~2008-04-09 17:03 UTC | newest]
Thread overview: 20+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <47fc8b35.0e1f400a.4de1.0570@mx.google.com>
2008-04-09 9:53 ` Iptables Rules Jan Engelhardt
2008-04-09 17:01 ` Minh Cao
2008-04-09 17:03 ` Jan Engelhardt
2008-04-08 22:01 Minh Cao
2008-04-09 4:12 ` Jan Engelhardt
-- strict thread matches above, loose matches on Subject: below --
2007-09-22 18:57 Iptables rules Shams Fantar
2007-09-22 19:32 ` Eljas Alakulppi
2007-09-22 19:44 ` Mike Wright
2005-08-04 19:36 multiports Peggy Kam
2005-08-05 6:34 ` multiports Jan Engelhardt
2005-08-10 20:13 ` Maximum number of ports? Peggy Kam
2005-09-13 22:10 ` Maximum number of rules in iptables? Peggy Kam
2005-09-15 15:22 ` iptables rules Peggy Kam
2005-09-15 15:26 ` Jörg Harmuth
2005-09-15 15:37 ` Peggy Kam
2005-09-15 16:23 ` Jörg Harmuth
2005-10-21 13:46 ` Realos
2005-10-21 16:03 ` Rob Sterenborg
2005-10-21 16:19 ` Jörg Harmuth
2005-09-15 15:33 ` Jörg Harmuth
2002-09-09 4:06 Iptables rules Didier Hung Wan Luk
2002-09-07 11:59 ashivale
2002-09-07 9:39 Didier Hung Wan Luk
2002-09-07 10:36 ` Antony Stone
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox