Oskar Andreasson - Iptables Tutorial 1.2.2
Здесь есть возможность читать онлайн «Oskar Andreasson - Iptables Tutorial 1.2.2» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Интернет, на русском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:Iptables Tutorial 1.2.2
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:4 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 80
- 1
- 2
- 3
- 4
- 5
Iptables Tutorial 1.2.2: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Iptables Tutorial 1.2.2»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
Iptables Tutorial 1.2.2 — читать онлайн бесплатно полную книгу (весь текст) целиком
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Iptables Tutorial 1.2.2», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
iptables -A bad_tcp_packets -p tcp --tcp-flags SYN,ACK SYN,ACK \
-m state --state NEW -j REJECT --reject-with tcp-reset
The chance of being [O] in this scenario should be relatively small, but these rules should be safe in almost all cases. Except when you run several redundant firewalls which will often take over packets or streams from each other. In such case, some connections may be blocked, even though they are legit. This rule may actually also allow a few portscans to see our firewall as well, but they should not be able to tell much more than that.
Internet Service Providers who use assigned IP addresses
I have added this since a friend of mine told me something I have totally forgotten. Certain stupid Internet Service Providers use IP addresses assigned by IANA for their local networks on which you connect to. For example, the Swedish Internet Service Provider and phone monopoly Telia uses this approach for example on their DNS servers, which uses the 10.x.x.x IP address range. A common problem that you may run into when writing your scripts, is that you do not allow connections from any IP addresses in the 10.x.x.x range to yourself, because of spoofing possibilities. Well, here is unfortunately an example where you actually might have to lift a bit on those rules. You might just insert an ACCEPT rule above the spoof section to allow traffic from those DNS servers, or you could just comment out that part of the script. This is how it might look:
/usr/local/sbin/iptables -t nat -I PREROUTING -i eth1 -s \
10.0.0.1/32 -j ACCEPT
I would like to take my moment to bitch at these Internet Service Providers. These IP address ranges are not assigned for you to use for dumb stuff like this, at least not to my knowledge. For large corporate sites it is more than o.k., or your own home network, but you are not supposed to force us to open up ourselves just because of some whim of yours. You are large Internet providers, and if you can't afford buying some 3-4 IP addresses for your DNS servers, I have a very hard time trusting you.
Letting DHCP requests through iptables
This is a fairly simple task really, once you get to know how DHCP works, however, you must be a little bit cautious with what you do let in and what you do not let in. First of all, we should know that DHCP works over the UDP protocol. Hence, this is the first thing to look for. Second, we should check which interface we get and send the request from. For example, if our eth0 interface is set up with DHCP, we should not allow DHCP requests on eth1. To make the rule a bit more specific, we only allow the actual UDP ports used by DHCP, which should be ports 67 and 68. These are the criteria that we choose to match packets on, and that we allow. The rule would now look like this:
$IPTABLES -I INPUT -i $LAN_IFACE -p udp --dport 67:68 --sport \
67:68 -j ACCEPT
Do note that we allow all traffic to and from UDP port 67 and 68 now, however, this should not be such a huge problem since it only allows requests from hosts doing the connection from port 67 or 68 as well. This rule could, of course, be even more restrictive, but it should be enough to actually accept all DHCP requests and updates without opening up too large of holes. If you are concerned, this rule could of course be made even more restrictive.
mIRC DCC problems
mIRC uses a special setting which allows it to connect through a firewall and to make DCC connections work properly without the firewall knowing about it. If this option is used together with iptables and specifically the ip_conntrack_irc and ip_nat_irc modules, it will simply not work. The problem is that mIRC will automatically NAT the inside of the packets for you, and when the packet reaches the firewall, the firewall will simply not know how and what to do with it. mIRC does not expect the firewall to be smart enough to take care of this by itself by simply querying the IRC server for its IP address and sending DCC requests with that address instead.
Turning on the "I am behind a firewall" configuration option and using the ip_conntrack_irc and ip_nat_irc modules will result in Netfilter creating log entries with the following content "Forged DCC send packet".
The simplest possible solution is to just uncheck that configuration option in mIRC and let iptables do the work. This means, that you should tell mIRC specifically that it is not behind a firewall.
Appendix C. ICMP types
This is a complete listing of all ICMP types. Note the reference pointing to the RFC or person who introduced the type and code. For a complete and absolute up to date listing of all ICMP types and codes, look at the icmp-parametersdocument at Internet Assigned Numbers Authority .
NoteIptables and netfilter uses ICMP type 255 internally since it is not reserved for any real usage, and most likely will never have any real usage. If you set a rule to match iptables -A INPUT -p icmp --icmp-type 255 -j DROP, this will DROP all ICMP packets. It is in other words used to match all ICMP types.
Table C-1. ICMP types
TYPE | CODE | Description | Query | Error | Reference |
---|---|---|---|---|---|
0 | 0 | Echo Reply | x | RFC792 | |
3 | 0 | Network Unreachable | x | RFC792 | |
3 | 1 | Host Unreachable | x | RFC792 | |
3 | 2 | Protocol Unreachable | x | RFC792 | |
3 | 3 | Port Unreachable | x | RFC792 | |
3 | 4 | Fragmentation needed but no frag. bit set | x | RFC792 | |
3 | 5 | Source routing failed | x | RFC792 | |
3 | 6 | Destination network unknown | x | RFC792 | |
3 | 7 | Destination host unknown | x | RFC792 | |
3 | 8 | Source host isolated (obsolete) | x | RFC792 | |
3 | 9 | Destination network administratively prohibited | x | RFC792 | |
3 | 10 | Destination host administratively prohibited | x | RFC792 | |
3 | 11 | Network unreachable for TOS | x | RFC792 | |
3 | 12 | Host unreachable for TOS | x | RFC792 | |
3 | 13 | Communication administratively prohibited by filtering | x | RFC1812 | |
3 | 14 | Host precedence violation | x | RFC1812 | |
3 | 15 | Precedence cutoff in effect | x | RFC1812 | |
4 | 0 | Source quench | RFC792 | ||
5 | 0 | Redirect for network | RFC792 | ||
5 | 1 | Redirect for host | |||
5 | 2 | Redirect for TOS and network | RFC792 | ||
5 | 3 | Redirect for TOS and host | RFC792 | ||
8 | 0 | Echo request | x | RFC792 | |
9 | 0 | Router advertisement - Normal router advertisement | RFC1256 | ||
9 | 16 | Router advertisement - Does not route common traffic | RFC2002 | ||
10 | 0 | Route selection | RFC1256 | ||
11 | 0 | TTL equals 0 during transit | x | RFC792 | |
11 | 1 | TTL equals 0 during reassembly | x | RFC792 | |
12 | 0 | IP header bad (catchall error) | x | RFC792 | |
12 | 1 | Required options missing | x | RFC1108 | |
12 | 2 | IP Header bad length | x | RFC792 | |
13 | 0 | Timestamp request (obsolete) | x | RFC792 | |
14 | Timestamp reply (obsolete) | x | RFC792 | ||
15 | 0 | Information request (obsolete) | x | RFC792 | |
16 | 0 | Information reply (obsolete) | x | RFC792 | |
17 | 0 | Address mask request | x | RFC950 | |
18 | 0 | Address mask reply | x | RFC950 | |
20-29 | Reserved for robustness experiment | Zaw-Sing Su | |||
30 | 0 | Traceroute | x | RFC1393 | |
31 | 0 | Datagram Conversion Error | x | RFC1475 | |
32 | 0 | Mobile Host Redirect | David Johnson | ||
33 | 0 | IPv6 Where-Are-You | x | Bill Simpson | |
34 | 0 | IPv6 I-Am-Here | x | Bill Simpson | |
35 | 0 | Mobile Registration Request | x | Bill Simpson | |
36 | 0 | Mobile Registration Reply | x | Bill Simpson | |
39 | 0 | SKIP | Tom Markson | ||
40 | 0 | Photuris | RFC2521 |
Appendix D. TCP options
Интервал:
Закладка:
Похожие книги на «Iptables Tutorial 1.2.2»
Представляем Вашему вниманию похожие книги на «Iptables Tutorial 1.2.2» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «Iptables Tutorial 1.2.2» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.