Re: Sintaxi completa de iptables

2020-11-14 Thread Alex Muntada
Hola Narcis > Algú té bones referències de iptables? Fa temps vaig comprar aquest llibret (91 pàgines) que trobo molt pràctic tot i ser del 2004: https://www.oreilly.com/library/view/linux-iptables-pocket/9780596801861/ Salut, Alex -- ⢀⣴⠾⠻⢶⣦⠀ ⣾⠁⢠⠒⠀⣿⡁ Alex Muntada ⢿⡄⠘⠷⠚⠋ Deb

Sintaxi completa de iptables

2020-11-14 Thread Narcis Garcia
Bon dia, Arreu trobo guies per a encaminar el trànsit de xarxa d'una manera o una altra a través de GNU/Linux, utilitzant iptables. Però no trobo cap manual complet amb TOTES les comandes i TOTES les opcions del programa iptables. A cada guia em descobreixen alguna cosa més, i no sé a què atenir

Re: Sintaxi completa de iptables

2020-11-14 Thread Daniel
Perquè vols fer servir iptables 'a pelo'?. Jo faig servir shorewall (https://shorewall.org/Documentation_Index.html) que em sembla un interface molt més simple, però n'hi ha d'altres. La sortida es també iptables, però és més fàcil estructurar les regles. Daniel El 14/11/20 a les 19:03

Re: Stretch => Buster: iptables

2020-11-06 Thread Jesper Dybdal
On 2020-11-06 11:43, Sven Hartge wrote: Jesper Dybdal wrote: * The CT target, to add the ftp helper.  I fixed that by adding a bit of native nft with the nft command after all the iptables(-nft) commands. For the sake of the archive and people looking at this thread hoping for some insight

Re: Stretch => Buster: iptables

2020-11-06 Thread Sven Hartge
Jesper Dybdal wrote: > * The CT target, to add the ftp helper.  I fixed that by adding a bit of > native nft with the nft command after all the iptables(-nft) commands. For the sake of the archive and people looking at this thread hoping for some insight, please post your native nft rul

Re: Stretch => Buster: iptables

2020-11-06 Thread Jesper Dybdal
On 2020-10-16 12:25, I wrote: I have a lot of iptables rules. Is it correctly understood that the upgrade to Buster will automatically install iptables-nft, and that iptablés-nft provides complete and compatible support for the functionality of the old iptables command, so I can expect my

Re: Stretch => Buster: iptables

2020-10-16 Thread Pierre-Elliott Bécue
Le vendredi 16 octobre 2020 à 14:12:55+0200, Jesper Dybdal a écrit : > > On 2020-10-16 12:35, Reco wrote: > > Barring some kernel bugs - yes. > > For instance, I've seen kernel panics because of simple: > > > > iptables -A INPUT -m conntrack --ctstate INVAL

Re: Stretch => Buster: iptables

2020-10-16 Thread Jesper Dybdal
On 2020-10-16 12:35, Reco wrote: Barring some kernel bugs - yes. For instance, I've seen kernel panics because of simple: iptables -A INPUT -m conntrack --ctstate INVALID -j DROP Aargh!   I had not realized that I would have to be prepared for kernel panics during the upgrade, so I really

Re: Stretch => Buster: iptables

2020-10-16 Thread Reco
Hi. On Fri, Oct 16, 2020 at 12:25:23PM +0200, Jesper Dybdal wrote: > I have a lot of iptables rules. > > Is it correctly understood that the upgrade to Buster will automatically > install iptables-nft, and that iptablés-nft provides complete and compatibl

Stretch => Buster: iptables

2020-10-16 Thread Jesper Dybdal
I have a lot of iptables rules. Is it correctly understood that the upgrade to Buster will automatically install iptables-nft, and that iptablés-nft provides complete and compatible support for the functionality of the old iptables command, so I can expect my iptables scripts to just work

Re: stretch vs iptables auto-start

2020-08-24 Thread Gene Heskett
d that was eating > > > up my bandwidth allocation on a slow net connection. > > > > > > Is there a tut someplace to guide one in converting from iptables > > > to this newer nftables? I'm assumeing its a similar utility. > > > > Sure, but I h

Re: stretch vs iptables auto-start

2020-08-24 Thread Andrew Cater
> > network spiders and bots that think they have to mirror my several > > giga-byte site, 2 or 3 times a day. And that was eating up my bandwidth > > allocation on a slow net connection. > > > > Is there a tut someplace to guide one in converting from iptables to

Re: stretch vs iptables auto-start

2020-08-24 Thread deloptes
gt; Is there a tut someplace to guide one in converting from iptables to this > newer nftables? I'm assumeing its a similar utility. Sure, but I have not looked into ... I only read there will be a couple of years transition period and somehow a compatibility layer is or can be used. Perhaps som

Re: stretch vs iptables auto-start

2020-08-24 Thread Greg Wooledge
You're just inventing incorrect explanations for whatever behavior you're seeing that you don't understand. If an /etc/rc.local file exists and has the execute bit turned on, it is executed AS ROOT at BOOT TIME, before there is any "logged in user". > that has hidden the iptables stuff from

Re: stretch vs iptables auto-start

2020-08-24 Thread Gene Heskett
On Monday 24 August 2020 04:45:01 Andrei POPESCU wrote: > On Du, 23 aug 20, 21:34:12, Gene Heskett wrote: > > On Sunday 23 August 2020 15:45:22 Joe wrote: > > > My server iptables is inherited from, I think, sarge, so it's > > > probably not done optimally today. I

Re: stretch vs iptables auto-start

2020-08-24 Thread Andrei POPESCU
On Du, 23 aug 20, 21:34:12, Gene Heskett wrote: > On Sunday 23 August 2020 15:45:22 Joe wrote: > > > > My server iptables is inherited from, I think, sarge, so it's probably > > not done optimally today. It's an init script run from /etc/rcS.d. > > Ah,/etc/rc

Re: stretch vs iptables auto-start

2020-08-24 Thread Joe
On Sun, 23 Aug 2020 21:34:12 -0400 Gene Heskett wrote: > On Sunday 23 August 2020 15:45:22 Joe wrote: > > > > > My server iptables is inherited from, I think, sarge, so it's > > probably not done optimally today. It's an init script run from > > /etc/rcS.d. &

Re: stretch vs iptables auto-start

2020-08-24 Thread Tixy
On Sun, 2020-08-23 at 14:26 -0400, Gene Heskett wrote: > Greetings all; > > Since the big conversion of file structs vs who owns what, which > apparently includes running rc.local as the logged in user and not > as > root, that has hidden the iptables stuff from everybod

Re: stretch vs iptables auto-start

2020-08-23 Thread Gene Heskett
On Sunday 23 August 2020 16:10:10 deloptes wrote: > Hi Gene, > > Gene Heskett wrote: > > Since the big conversion of file structs vs who owns what, which > > apparently includes running rc.local as the logged in user and not > > as root, that has hidden the iptables st

Re: stretch vs iptables auto-start

2020-08-23 Thread Gene Heskett
ser and not > > as root, that has hidden the iptables stuff from everybody but root > > since its not now in the users $PATH. > > > > So what is the best way to assure this stuff gets started during a > > reboot or restart of X? Stuff that s/b running regardless of any X &

Re: stretch vs iptables auto-start

2020-08-23 Thread deloptes
Hi Gene, Gene Heskett wrote: > Since the big conversion of file structs vs who owns what, which > apparently includes running rc.local as the logged in user and not as > root, that has hidden the iptables stuff from everybody but root since > its not now in the users $PATH. >

Re: stretch vs iptables auto-start

2020-08-23 Thread Joe
On Sun, 23 Aug 2020 14:26:19 -0400 Gene Heskett wrote: > Greetings all; > > Since the big conversion of file structs vs who owns what, which > apparently includes running rc.local as the logged in user and not as > root, that has hidden the iptables stuff from everybody but r

stretch vs iptables auto-start

2020-08-23 Thread Gene Heskett
Greetings all; Since the big conversion of file structs vs who owns what, which apparently includes running rc.local as the logged in user and not as root, that has hidden the iptables stuff from everybody but root since its not now in the users $PATH. So what is the best way to assure

Re: potential iptables problem

2020-07-04 Thread Gene Heskett
s to be translated to > an ipv4 address somehow, and I may have inadvertently blocked it with > an iptables rule in my war against the robots that were burning up my > upload bandwidth. > > How do I go about determiniing that KCKB's ip address? Or, how is > that determined? > > Thanks.

Re: potential iptables problem

2020-07-04 Thread Andy Smith
up. > I use the gkrellm weather pluggin to get me an uptodate weather report > from the nearby airports call sign, but this has to be translated to an > ipv4 address somehow, and I may have inadvertently blocked it with an > iptables rule in my war against the robots that were burning

Re: potential iptables problem

2020-07-04 Thread Henning Follmann
s to be translated to an > ipv4 address somehow, and I may have inadvertently blocked it with an > iptables rule in my war against the robots that were burning up my > upload bandwidth. > > How do I go about determiniing that KCKB's ip address? Or, how is that > determined

potential iptables problem

2020-07-04 Thread Gene Heskett
it with an iptables rule in my war against the robots that were burning up my upload bandwidth. How do I go about determiniing that KCKB's ip address? Or, how is that determined? Thanks. Cheers, Gene Heskett -- "There are four boxes to be used in defense of liberty: soap, ballot, jury, and

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Andrei POPESCU
On Sb, 20 iun 20, 14:37:34, Tom Browder wrote: > > I have no love for iptables and very little experience with it. So it seems > I should remove the iptables package and install the nftables one. And I'll > look into firewalld which I tried briefly some years ago. In case you are

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Tom Browder
On Sat, Jun 20, 2020 at 12:44 Ben Lavender wrote: > Personally I'd learn nf_tables because that's the way forward and if you > stick to it's CLI then the better. > Thanks, Ben. -Tom

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Tom Browder
On Sat, Jun 20, 2020 at 10:48 wrote: > Hi, > ... > Actually, as explained on https://wiki.debian.org/nftables, Buster uses > an "iptables-nft layer (i.e, using iptables syntax with the nf_tables > kernel subsystem). This also affects ip6tables, arptables and ebtables.

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Ben Lavender
, wrote: > I see it's recommended that Buster users use nftables, but the default > installation still uses iptables! > > I need to change ports on my new remote server to allow http and https > traffic, but should I keep using iptables? Or should I remove iptables > and inst

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread l0f4r0
Hi, 20 juin 2020 à 16:24 de tom.brow...@gmail.com: > I see it's recommended that Buster users use nftables, but the default > installation still uses iptables! > True & false. Actually, as explained on https://wiki.debian.org/nftables, Buster uses an "iptables-nft layer (i

What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Tom Browder
I see it's recommended that Buster users use nftables, but the default installation still uses iptables! I need to change ports on my new remote server to allow http and https traffic, but should I keep using iptables? Or should I remove iptables and install nftables first? If I keep iptables

Re: iptables ou nftables ?

2020-06-10 Thread Francois Meyer
Merci à tous pour les réponses. La réécriture avec nftables m'obligera à repenser mes règles iptables, au fond ce n'est pas plus mal. François

Re: iptables ou nftables ?

2020-06-07 Thread G2PC
>> Comment appréhender la phrase : " Iptables n'est plus qu'une façade ? " >> Je dois crépir ou décrépir mes configurations Iptables ? > Depuis Debian Buster, iptables (+ip6tables+arptables+ebtables) utilise > nftables comme back-end. > C'est le module kerne

Re: iptables ou nftables ?

2020-06-07 Thread Jean-Marc
Sun, 7 Jun 2020 14:23:20 +0200 G2PC écrivait : > > > nftables est le nouveau standard de contrôle du trafic réseau. > > Sur une Debian Testing, iptables n'est plus qu'une façade pour nftables. > > C'est le cas depuis Debian Buster (stable actuelle). > > Co

Re: iptables ou nftables ?

2020-06-07 Thread G2PC
> nftables est le nouveau standard de contrôle du traffic réseau. > Sur une Debian Testing, iptables n'est plus qu'une façade pour nftables. > C'est le cas depuis Debian Buster (stable actuelle). Comment appréhender la phrase : " Iptables n'est plus qu'une façade ? " Je dois

Re: iptables ou nftables ?

2020-06-07 Thread Jean-Marc
Wed, 27 May 2020 18:00:41 +0200 Francois Meyer écrivait : > Bonjour à tous > > Je vois que iptables est "remplacé" par nftables. > > C'est pour un portable de travail sous testing. Mon ancien avait > iptables et toutes les règles qui me vont bien. > > Je n'

Re: iptables ou nftables ?

2020-06-07 Thread Jean-Marc
Wed, 27 May 2020 18:00:41 +0200 Francois Meyer écrivait : > Bonjour à tous Bonjour François, > Je vois que iptables est "remplacé" par nftables. Je vois que ta quetion est restée sans réponse. > C'est pour un portable de travail sous testing. Mon ancien avait > iptable

Recherche de fainéant pour recommander Iptables / Netfilter au SILL

2020-05-31 Thread G2PC
Recherche de fainéant pour recommander Iptables / Netfilter au SILL ( Fainéant / Référent ) J'ai testé le dépôt du SILL hier, pour une recherche sur Iptables / Firewall / pare-feu, car je cherchais un outil d'analyse de log, et, je n'ai rien trouvé. J'ai constaté que une seule réponse est

iptables ou nftables ?

2020-05-27 Thread Francois Meyer
Bonjour à tous Je vois que iptables est "remplacé" par nftables. C'est pour un portable de travail sous testing. Mon ancien avait iptables et toutes les règles qui me vont bien. Je n'ai pas tellement envie d'apprendre une nouvelle syntaxe. Ne ferais-je pas mieux d'installer ipta

Re: iptables traag in reverse dns

2020-03-30 Thread Richard Lucassen
k geen NXDOMAIN ;-) > Maar inderdaad: ik doe normaal ook -nL > > Zie bij iptables sowieso altijd liever IP's dan dns namen. Ik weet niet beter :) -- richard lucassen http://contact.xaq.nl/

Re: iptables traag in reverse dns

2020-03-30 Thread mj
Hoi! On 3/30/20 2:16 PM, Richard Lucassen wrote: Gebruik iptables -nL dan heb je dat reverse lookup gezeur niet. Er zijn altijd figuren die de boel niet op orde hebben en bovendien gaat -n vele malen sneller, ook al werkt de DNS. Maar is het punt niet dat ook wanneer lieden hun DNS niet op

Re: iptables traag in reverse dns

2020-03-30 Thread mj
achter elkaar "iptables -L", en tien keer even langzaam op de IP's. Ook nadat ik de cache eerst 'geladen' heb met "host 45.142.195.2" MJ

Re: iptables traag in reverse dns

2020-03-30 Thread mj
Hoi, On 3/30/20 2:43 PM, Richard Lucassen wrote: Ik heb wel op een firewall met 3000 rules dat de -L blijft hangen op een server die niet werkt: $ host 198.17.62.23 ;; connection timed out; no servers could be reached Dat is helemaal geen antwoord. Het 17.198.in-addr.arpa domein heeft geen

Re: iptables traag in reverse dns

2020-03-30 Thread Richard Lucassen
On Mon, 30 Mar 2020 14:33:32 +0200 Richard Lucassen wrote: > > Echter: beide "not founds" zijn instant. > > En ook als je dat na die "host " doet? Dan zit de NXDOMAIN in de > cache. Ik heb wel op een firewall met 3000 rules dat de -L blijft hangen op een server die niet werkt: $ host

Re: iptables traag in reverse dns

2020-03-30 Thread Richard Lucassen
On Mon, 30 Mar 2020 12:51:54 +0200 mj wrote: > Weet iemand waar ik iets zou kunnen checken? Hier geprobeerd, de eerste keer 3 sec, de tweede keer (cache) net zo snel als -n -- richard lucassen http://contact.xaq.nl/

Re: iptables traag in reverse dns

2020-03-30 Thread Richard Lucassen
On Mon, 30 Mar 2020 12:51:54 +0200 mj wrote: > Maar: ik verwacht dus dat er op dat systeem een probleem is mbt dns > resolving. Dus verwacht dat het volgnde ook traag is: > > > root@server:/etc# host 45.142.195.2 > > Host 2.195.142.45.in-addr.arpa. not found: 3(NXDOMAIN) > > root@server:/etc#

Re: iptables traag in reverse dns

2020-03-30 Thread Richard Lucassen
On Mon, 30 Mar 2020 12:51:54 +0200 mj wrote: > Ik zie op een machine dat iptables -L output blijft hangen op IP > adressen: Gebruik iptables -nL dan heb je dat reverse lookup gezeur niet. Er zijn altijd figuren die de boel niet op orde hebben en bovendien gaat -n vele malen sneller,

Re: iptables traag in reverse dns

2020-03-30 Thread Geert Stappers
On Mon, Mar 30, 2020 at 12:51:54PM +0200, mj wrote: > Hoi, > > Ik zie op een machine dat iptables -L output blijft hangen op IP adressen: > > > target prot opt source destination > **5 sec delay > > REJECT all -- 45.142.195.2

iptables traag in reverse dns

2020-03-30 Thread mj
Hoi, Ik zie op een machine dat iptables -L output blijft hangen op IP adressen: target prot opt source destination **5 sec delay REJECT all -- 45.142.195.2 anywhere reject-with icmp-port-unreachable REJECT all -- ip-38-66.ZervDNS

RE: ifup && iptables error

2020-03-23 Thread Bonno Bloksma
Hi, [] > Right, your basic problem is that your interfaces are now names > enp7s0 > and > wlp6s0 > > not eth0 and wifi0 or whatever they used to be. > > Fix them in /etc/network/interfaces, double check your iptables rules > are either using the new names or don'

Re: ifup && iptables error

2020-03-20 Thread songbird
c/network/interfaces" >> > failed. > > Right, your basic problem is that your interfaces are now names > enp7s0 > and > wlp6s0 > > not eth0 and wifi0 or whatever they used to be. > > Fix them in /etc/network/interfaces, double check your iptables > rules are either using the new names or don't mention interfaces > at all, and you should be relatively happy. or boot with the param to the kernel net.ifnames=0 songbird

Re: ifup && iptables error

2020-03-20 Thread Dan Ritter
are now names enp7s0 and wlp6s0 not eth0 and wifi0 or whatever they used to be. Fix them in /etc/network/interfaces, double check your iptables rules are either using the new names or don't mention interfaces at all, and you should be relatively happy. -dsr-

Re: ifup && iptables error

2020-03-20 Thread William Torrez Corea
Cleaning up temporary files > [ ok ] Setting up ALSA...done. > [ ok ] Setting sensors limits...done. > [] Loading netfilter rules...run-parts: executing > /usr/share/netfilter-persistent/plugins.d/15-ip4tables start > Bad argument `COMMIT' > Error occurred at line: 4 > Try `ipta

Re: ifup && iptables error

2020-03-18 Thread Dan Ritter
William Torrez Corea wrote: > Still don't get results positive. Now, i get the following message: > > Internet Systems Consortium DHCP Client 4.4.1 > Copyright 2004-2018 Internet Systems Consortium. > All rights reserved. > For info, please visit https://www.isc.org/software/dhcp/ > > can't

Re: ifup && iptables error

2020-03-17 Thread William Torrez Corea
.done. > [ ok ] Setting sensors limits...done. > [] Loading netfilter rules...run-parts: executing > /usr/share/netfilter-persistent/plugins.d/15-ip4tables start > Bad argument `COMMIT' > Error occurred at line: 4 > Try `iptables-restore -h' or 'iptables-restore --help' for more

Re: ifup && iptables error

2020-02-27 Thread Reco
Hi. On Wed, Feb 26, 2020 at 09:20:34PM +, William Torrez Corea wrote: > Exactly, i wan't reformulate the question. > > What should I change there to get these errors disappear? > > I'm trying to change some values for example in > > /etc/iptables/rule

Re: ifup && iptables error

2020-02-26 Thread William Torrez Corea
Exactly, i wan't reformulate the question. What should I change there to get these errors disappear? I'm trying to change some values for example in /etc/iptables/rules.v6 # Generated by xtables-save v1.8.2 on Mon Aug 5 19:42:00 2019 *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT

Re: ifup && iptables error

2020-02-25 Thread Reco
> /usr/share/netfilter-persistent/plugins.d/15-ip4tables start > Bad argument `COMMIT' > Error occurred at line: 4 And whatever is in /etc/iptables/rules.v4 - it's not a valid output of iptables-save. Now, to answer the question "what should I change there to get these errors disappear&quo

Re: ifup && iptables error

2020-02-25 Thread deloptes
William Torrez Corea wrote: > [] Loading netfilter rules...run-parts: executing > /usr/share/netfilter-persistent/plugins.d/15-ip4tables start > Bad argument `COMMIT' > Error occurred at line: 4 > Try `iptables-restore -h' or 'iptables-restore --help' for more > information.

ifup && iptables error

2020-02-25 Thread William Torrez Corea
. [ ok ] Cleaning up temporary files [ ok ] Setting up ALSA...done. [ ok ] Setting sensors limits...done. [] Loading netfilter rules...run-parts: executing /usr/share/netfilter-persistent/plugins.d/15-ip4tables start Bad argument `COMMIT' Error occurred at line: 4 Try `iptables-restore -

[solved] ufw and iptables not playing nice in testing with recent upgrade

2020-02-15 Thread songbird
iptables 1.8.4-3 landed in unstable and iptables/ufw now works. thanks! :) songbird

Re: ufw and iptables not playing nice in testing with recent upgrade

2020-02-13 Thread tv.deb...@googlemail.com
to partially downgrade to get a working connection again. put my hold back on iptables. i'd had a hold on it for a while due to reported errors. no idea why i decided i should try to let it go through this morning. i'm kinda tied up for a few weeks... Maybe similar. Yesterday, after dist-upgrade

Re: ufw and iptables not playing nice in testing with recent upgrade

2020-02-13 Thread songbird
>>> so was able to partially downgrade to get a working connection >>> again. >>> >>>put my hold back on iptables. i'd had a hold on it for >>> a while due to reported errors. no idea why i decided i >>> should try to let it go through

Re: ufw and iptables not playing nice in testing with recent upgrade

2020-02-11 Thread tv.deb...@googlemail.com
on iptables. i'd had a hold on it for a while due to reported errors. no idea why i decided i should try to let it go through this morning. i'm kinda tied up for a few weeks... Maybe similar. Yesterday, after dist-upgrade and reboot the network interface seemed not to be working (for instance, none

Re: ufw and iptables not playing nice in testing with recent upgrade

2020-02-11 Thread riveravaldez
On 2/11/20, songbird wrote: > something in there didn't work today when i applied > the upgrade. > > i don't have time to debug or file reports at the moment, > so was able to partially downgrade to get a working connection > again. > > put my hold back on i

ufw and iptables not playing nice in testing with recent upgrade

2020-02-11 Thread songbird
something in there didn't work today when i applied the upgrade. i don't have time to debug or file reports at the moment, so was able to partially downgrade to get a working connection again. put my hold back on iptables. i'd had a hold on it for a while due to reported errors. no idea

Re: iptables DROP before PREROUTING

2020-01-09 Thread Jim Popovitch
On Fri, 2020-01-10 at 01:52 +0500, Alexander V. Makartsev wrote: > > The answer to your question, I believe, should look like this: > "iptables -I FORWARD -s 23.132.208.0/24 -j DROP" Thanks! That is what I am looking for. To be clear, I'm doing something much more complex,

Re: iptables DROP before PREROUTING

2020-01-09 Thread Alexander V. Makartsev
On 10.01.2020 00:46, Jim Popovitch wrote: > Hello! > > Is there a way to have iptables DROP before PREROUTING. > > Consider this bit of rules on a home firewall, where 24.126.xx.yy is my > home external IP address. > > - > iptables -P INPUT DROP > iptabl

Re: iptables DROP before PREROUTING

2020-01-09 Thread Reco
Hi. On Thu, Jan 09, 2020 at 02:46:25PM -0500, Jim Popovitch wrote: > Is there a way to have iptables DROP before PREROUTING. What you meant is "before PREROUTING in nat". It's an important bit, see below. > What I want to do is prevent 23.132.208.0/24 from accessing a

iptables DROP before PREROUTING

2020-01-09 Thread Jim Popovitch
Hello! Is there a way to have iptables DROP before PREROUTING. Consider this bit of rules on a home firewall, where 24.126.xx.yy is my home external IP address. - iptables -P INPUT DROP iptables -P OUTPUT ACCEPT iptables -A INPUT -i lo -j ACCEPT iptables -A OUTPUT -o lo -j ACCEPT

Re: iptables e syslog

2020-01-02 Thread paulo bruck
Procure por iptables TEE https://superuser.com/questions/853077/iptables-duplicate-traffic-to-another-ip Em qui., 2 de jan. de 2020 às 09:44, Helio Loureiro escreveu: > O que vc quer fazer parece ser um loadbalancer. iptables não faz. Vc > precisa de algo como nginx ou apache webserv

Re: iptables e syslog

2020-01-02 Thread Helio Loureiro
O que vc quer fazer parece ser um loadbalancer. iptables não faz. Vc precisa de algo como nginx ou apache webserver pra fazer isso com reverse proxy. ./helio On Wed, Dec 18, 2019, 01:28 Caio Ferreira wrote: > Lista > > Através do iptables, no computador gateway da rede eu

iptables e syslog

2019-12-17 Thread Caio Ferreira
Lista Através do iptables, no computador gateway da rede eu consegui redirecionar o tráfego para um determinado IP e porta de um host da rede. Eu queria saber se seria possível através do iptables fazer uma cópia dos dados para um segundo IP e porta. Esse segundo host é um servidor de log

Re: iptables, routing problems

2019-12-16 Thread Richard Hector
On 17/12/19 5:06 pm, Richard Hector wrote: > Hi all, > > I've got a networking issue that's confusing me. Got it, I think. I had previously been applying rules before switching to iptables-legacy - so I'd been adding nftables rules. Then I switched, without flushing (or rebooting)

iptables, routing problems

2019-12-16 Thread Richard Hector
(in the iptables output) that the packet is going through the interface I expect (enp4s0.1441) Any ideas? I suspect it's something silly I've just failed to spot ... Note that yesterday, when I was on site, I wasn't trying this, but had similar problems with traffic going out - dns packets were being accepted

Re: [Solved] iptables firewall and web sites not loading

2019-12-10 Thread Pascal Hambourg
Le 10/12/2019 à 20:13, nektarios a écrit : Pascal Hambourg wrote: Maybe a "MTU black hole" issue with PPPoE. Workarounds : - lower the MTU on the client side to 1492 - add a "TCPMSS --clamp-to-pmtu" iptables rule on the router (...) The tip you gave me really did the jo

[Solved] iptables firewall and web sites not loading

2019-12-10 Thread nektarios
On Tue, 10 Dec 2019 09:26:46 + Nektarios Katakis wrote: > On Tue, 10 Dec 2019 07:22:05 +0100 > Pascal Hambourg wrote: > > > Le 10/12/2019 à 00:01, Nektarios Katakis a écrit : > > > > > > I am running an iptables firewall on an openwrt router I ve

Re: iptables firewall and web sites not loading

2019-12-10 Thread Nektarios Katakis
On Tue, 10 Dec 2019 07:22:05 +0100 Pascal Hambourg wrote: > Le 10/12/2019 à 00:01, Nektarios Katakis a écrit : > > > > I am running an iptables firewall on an openwrt router I ve got. > > Which acts as Firewall/gateway and performs NATing for my internal > > netwo

Re: iptables firewall and web sites not loading

2019-12-09 Thread Pascal Hambourg
Le 10/12/2019 à 00:01, Nektarios Katakis a écrit : I am running an iptables firewall on an openwrt router I ve got. Which acts as Firewall/gateway and performs NATing for my internal network - debian PCs and android phones. All good but specific web sites are not loading for the machines

Re: iptables firewall and web sites not loading

2019-12-09 Thread john doe
On 12/10/2019 12:01 AM, Nektarios Katakis wrote: > Hello, > > I am running an iptables firewall on an openwrt router I ve got. Which > acts as Firewall/gateway and performs NATing for my internal network - > debian PCs and android phones. > > All good but specific web

iptables firewall and web sites not loading

2019-12-09 Thread Nektarios Katakis
Hello, I am running an iptables firewall on an openwrt router I ve got. Which acts as Firewall/gateway and performs NATing for my internal network - debian PCs and android phones. All good but specific web sites are not loading for the machines that are sitting behind the home router. When

Re: Iptables at boot, was fail2ban for apache2

2019-12-02 Thread Gene Heskett
On Monday 02 December 2019 07:46:22 Alessandro Vesely wrote: > On Mon 02/Dec/2019 10:35:26 +0100 Andrei POPESCU wrote: > > You might want to install iptables-persistent, otherwise you'll have > > to roll-out your own solution. > > I'm not using iptables-persistent, but

Re: Iptables at boot, was fail2ban for apache2

2019-12-02 Thread Greg Wooledge
On Mon, Dec 02, 2019 at 01:46:22PM +0100, Alessandro Vesely wrote: > ### BEGIN INIT INFO > # Provides: netfilter-persistent > # Required-Start:mountkernfs $remote_fs > # Required-Stop: $remote_fs > # Default-Start: S > # Default-Stop: 0 1 6 > # Short-Description: Load

Re: Iptables at boot, was fail2ban for apache2

2019-12-02 Thread Reco
On Mon, Dec 02, 2019 at 01:46:22PM +0100, Alessandro Vesely wrote: > On Mon 02/Dec/2019 10:35:26 +0100 Andrei POPESCU wrote: > > > > You might want to install iptables-persistent, otherwise you'll have to > > roll-out your own solution. > > I'm not using iptables-

Iptables at boot, was fail2ban for apache2

2019-12-02 Thread Alessandro Vesely
On Mon 02/Dec/2019 10:35:26 +0100 Andrei POPESCU wrote: > > You might want to install iptables-persistent, otherwise you'll have to > roll-out your own solution. I'm not using iptables-persistent, but just looked at it out of curiosity. Its LSB: ### BEGIN INIT INFO #

Re: was: fail2ban for apache2, now iptables help

2019-12-02 Thread Gene Heskett
On Monday 02 December 2019 04:35:26 Andrei POPESCU wrote: > On Du, 01 dec 19, 22:28:43, Gene Heskett wrote: > > It, iptables, did not get restarted on the fresh boot, so obviously > > the systemd manager hasn't been informed to start iptables, > > reloading from /etc

Re: Is it a bug that the iptable_filter module isn't loaded automatically with Debian 10 iptables-nft?

2019-10-28 Thread Pascal Hambourg
Le 28/10/2019 à 09:14, Andy Smith a écrit : I will take a guess that the switching of the iptables commands to use the nftables framework has somehow caused this iptable_filter module to not be loaded even though the firewall still works. Correct. Is it a bug that loading rules

Is it a bug that the iptable_filter module isn't loaded automatically with Debian 10 iptables-nft?

2019-10-28 Thread Andy Smith
of the tables that are currently active ('filter', 'mangle', etc). On my Debian 10 hosts, this file is empty even though they have active rules loaded by iptables. I then noticed that on my Debian 9 hosts, the modules iptable_filter and ip6table_filter are loaded as soon as a rule is added to any

Re: iptables DROP

2019-10-16 Thread Lic. Domingo Varela Yahuitl
Iptables -I INPUT -s IP -j RETURN Saludos Cordiales Domingo Varela Y. From: Roberto José Blandino Cisneros Sent: Tuesday, October 15, 2019 2:43:36 PM To: Debian ayuda Subject: Re: iptables DROP Cuando agregas una ip si existe una sesión no se aplicará la regla

Re: iptables DROP

2019-10-15 Thread Matias Mucciolo
- Original Message - From: "Roberto José Blandino Cisneros" To: "Debian ayuda" Sent: Tuesday, October 15, 2019 4:43:36 PM Subject: Re: iptables DROP Cuando agregas una ip si existe una sesión no se aplicará la regla hasta que el ip intente acceder nuevamente, esto

Re: iptables DROP

2019-10-15 Thread Roberto José Blandino Cisneros
Cuando agregas una ip si existe una sesión no se aplicará la regla hasta que el ip intente acceder nuevamente, esto da la sensación que iptables no hace su trabajo. Para ello basta cortar la sesión reiniciando el servicio al que esta accediendo y luego ya el ip no podrá acceder al servicio al que

Re: Faut t'il bloquer le Multicast - IGMP avec Iptables

2019-10-12 Thread Pascal Hambourg
Le 10/10/2019 à 19:58, G2PC a écrit : Voilà, cette partie a été traitée. J'ai également remplacé : -A INPUT -p tcp --sport 49152:65534 --dport 49152:65534 -m state --state ESTABLISHED,RELATED,NEW -j ACCEPT par -A INPUT -p tcp --sport 49152:65534 --dport 49152:65534 -m state --state

Re: Faut t'il bloquer le Multicast - IGMP avec Iptables

2019-10-10 Thread G2PC
e protocole NDP qui > reprend, entre autre, le rôle d'ARP en IPv4 et qui s'appuie sur de > l'ICMPv6. Autant en IPv4 tu ne peux pas bloquer l'ARP avec iptables, > autant en IPv6 c'est assez facile de se couper les pattes en bloquant > NDP ou plutôt en oubliant de l'autoriser > NDP re

Re: iptables DROP

2019-10-10 Thread miguel angel gonzalez
>Hola, > >tengo un problema con iptables, > >me está entrando tráfico que no es deseable desde una ip y > >por más que filtro no hay manera, ¿alguna idea? > > > >iptables -A INPUT -s IP_a_bloquear -j DROP > > > >Reviso la regla y está guardada. > > &g

Re: iptables DROP

2019-10-10 Thread Ramses
El 10 de octubre de 2019 16:14:19 CEST, miguel angel gonzalez escribió: >Hola, >tengo un problema con iptables, >me está entrando tráfico que no es deseable desde una ip y >por más que filtro no hay manera, ¿alguna idea? > >iptables -A INPUT -s IP_a_bloquear -j DROP > &g

Re: iptables DROP

2019-10-10 Thread Alba Ferri
Tienes el log del iptables habilitado? Igual podrías sacar info de ahí... Slds, El jue., 10 oct. 2019 a las 16:14, miguel angel gonzalez (< mangelgonza...@gmail.com>) escribió: > Hola, > tengo un problema con iptables, > me está entrando tráfico que no es deseable desde una ip

iptables DROP

2019-10-10 Thread miguel angel gonzalez
Hola, tengo un problema con iptables, me está entrando tráfico que no es deseable desde una ip y por más que filtro no hay manera, ¿alguna idea? iptables -A INPUT -s IP_a_bloquear -j DROP Reviso la regla y está guardada. Muchas gracias. -- /m.a.

Re: iptables why rejects this output?

2019-10-08 Thread BAGI Ákos
on obscurity, you do not have a security in the first place. Your INPUT rules can be probed. Your FORWARD rules aren't relevant to your problem. Your OUTPUT rules are, and they do nothing to protect you from the hostile Internet. So if you're asking why a certain iptables rule produces a certain kernel

<    1   2   3   4   5   6   7   8   9   10   >