firewall: set OUTPUT Policy to DROP and translate some comments.
This commit is contained in:
		
							parent
							
								
									5c5e0898d2
								
							
						
					
					
						commit
						c699ff9c4d
					
				
							
								
								
									
										57
									
								
								firewall
								
								
								
								
							
							
						
						
									
										57
									
								
								firewall
								
								
								
								
							|  | @ -6,8 +6,9 @@ | |||
| # Default-Start:     2 3 4 5 | ||||
| # Default-Stop:      0 1 6 | ||||
| # Short-Description: Firewall initscript | ||||
| # Description:       Script de parefeu avec iptables | ||||
| #   Pour tester ce script avant de l'appliquer, on peut utiliser la commande: | ||||
| # Description:       Firewall script for iptables | ||||
| #   To test the script you can just use 'test' arg: | ||||
| # ./firewall test | ||||
| # service firewall test | ||||
| # Doc: * http://openvz.org/Using_NAT_for_container_with_private_IPs | ||||
| #      * ... | ||||
|  | @ -17,12 +18,12 @@ | |||
| 
 | ||||
| # ********************************************************************************************** | ||||
| # | ||||
| # Variables globales | ||||
| # Global var | ||||
| # | ||||
| # ----------------------------------------------------------- | ||||
| # Emplacement de iptables | ||||
| # iptables path | ||||
| IPT="/sbin/iptables" | ||||
| # Durée en secondes pour le cas de test des règles du pare-feu | ||||
| # testing for XX seconds | ||||
| TIME=42 | ||||
| 
 | ||||
| #### Colors definition | ||||
|  | @ -37,48 +38,50 @@ fw_init() { | |||
|   ############# | ||||
|   ## KERNEL  ## | ||||
|   ############# | ||||
|   # active la protection Cookie TCP SYN | ||||
|   # Enable Cookie TCP SYN protection | ||||
|   echo 1 > /proc/sys/net/ipv4/tcp_syncookies | ||||
|   # Active la protection IP Spoofing | ||||
|   # Effectue une verification de l'adresse source | ||||
|   # Enable IP spoofing protection | ||||
|   # Check the ip source | ||||
|   for SYS in /proc/sys/net/ipv4/conf/*/rp_filter | ||||
|   do | ||||
|   echo 1 > ${SYS} | ||||
|   done | ||||
|   # Desactive l'ICMP Redirect | ||||
|   # Disable ICMP redirect | ||||
|   for SYS in /proc/sys/net/ipv4/conf/*/accept_redirects | ||||
|   do | ||||
|   echo 0 > ${SYS} | ||||
|   done | ||||
|   # Desactive les paquets Source-Routed | ||||
|   # Disable source-route packages | ||||
|   for SYS in /proc/sys/net/ipv4/conf/*/accept_source_route | ||||
|   do | ||||
|   echo 0 > ${SYS} | ||||
|   done | ||||
|   # Active l'ip forwarding | ||||
|   echo 1 > /proc/sys/net/ipv4/ip_forward | ||||
|   # Enable ip forwarding | ||||
|   #echo 1 > /proc/sys/net/ipv4/ip_forward | ||||
| 
 | ||||
| 
 | ||||
|   ############# | ||||
|   ## POLICY  ## | ||||
|   ############# | ||||
|   ## drop tout le traffic entrant, sortant et forwardé | ||||
| 
 | ||||
|   # drop all traffic | ||||
|   $IPT -P INPUT DROP | ||||
|   $IPT -P FORWARD DROP | ||||
|   #$IPT -P OUTPUT DROP | ||||
| #  $IPT -P INPUT ACCEPT | ||||
| #  $IPT -P FORWARD ACCEPT | ||||
|   $IPT -P OUTPUT ACCEPT | ||||
|   $IPT -P OUTPUT DROP | ||||
|   #$IPT -P INPUT ACCEPT | ||||
|   #$IPT -P FORWARD ACCEPT | ||||
|   #$IPT -P OUTPUT ACCEPT | ||||
| 
 | ||||
|   ############ | ||||
|   ##  BASE  ## | ||||
|   ############ | ||||
|   #### Dropper les nouvelles connections qui n'ont pas le flag syn | ||||
| 
 | ||||
|   # Drop all new connections without a syn flag | ||||
|   $IPT -t filter -A INPUT -j DROP -p tcp ! --syn -m state --state NEW | ||||
| 
 | ||||
|   # Interdire les connections locales qui ne viennent pas de locale | ||||
|   # Forbid local connections that doesn't come from localhost | ||||
|   $IPT -A INPUT -j REJECT ! -i lo -d 127.0.0.1/8 -m comment --comment "Reject lo not from lo" | ||||
|   # Autoriser loopback | ||||
|   # Allow loopback | ||||
|   $IPT -A INPUT -j ACCEPT -i lo -m comment --comment "Loopback in" | ||||
|   $IPT -A OUTPUT -j ACCEPT -o lo -m comment --comment "Loopback out" | ||||
| 
 | ||||
|  | @ -88,8 +91,8 @@ fw_init() { | |||
| 
 | ||||
|   #### ICMP request (Ping) | ||||
|   $IPT -A OUTPUT -j ACCEPT -p icmp -m state --state NEW -m comment --comment "ICMP out" | ||||
| } | ||||
| 
 | ||||
| } | ||||
| 
 | ||||
| fw_start() { | ||||
| 
 | ||||
|  | @ -264,7 +267,6 @@ fw_start() { | |||
| 
 | ||||
| } | ||||
| 
 | ||||
| 
 | ||||
| # Règles pour de log | ||||
| fw_log() { | ||||
| 
 | ||||
|  | @ -280,11 +282,11 @@ fw_log() { | |||
|   $IPT -A INPLOG -p icmp -m limit --limit 5/min -j LOG --log-prefix "Drop-IN [icmp]: " | ||||
| 
 | ||||
|   # LOG OUTPUT DROP PAQUET | ||||
|   #$IPT -N OUTLOG | ||||
|   #$IPT -A OUTPUT -j OUTLOG | ||||
|   #$IPT -A OUTLOG -p tcp -m limit --limit 5/min -j LOG --log-prefix "Drop-OUT [tcp]: " | ||||
|   #$IPT -A OUTLOG -p udp -m limit --limit 5/min -j LOG --log-prefix "Drop-OUT [udp]: " | ||||
|   #$IPT -A OUTLOG -p icmp -m limit --limit 5/min -j LOG --log-prefix "Drop-OUT [icmp]: " | ||||
|   $IPT -N OUTLOG | ||||
|   $IPT -A OUTPUT -j OUTLOG | ||||
|   $IPT -A OUTLOG -p tcp -m limit --limit 5/min -j LOG --log-prefix "Drop-OUT [tcp]: " | ||||
|   $IPT -A OUTLOG -p udp -m limit --limit 5/min -j LOG --log-prefix "Drop-OUT [udp]: " | ||||
|   $IPT -A OUTLOG -p icmp -m limit --limit 5/min -j LOG --log-prefix "Drop-OUT [icmp]: " | ||||
| 
 | ||||
|   # LOG FORWARD DROP PAQUET | ||||
|   $IPT -N FORLOG | ||||
|  | @ -410,4 +412,3 @@ exit 0 | |||
| 
 | ||||
| # Fin de la boucle principale | ||||
| # ----------------------------------------------------------- | ||||
| 
 | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue