On Sat, Jan 05, 2013 at 11:57:10AM +, Mick wrote
It will, but only partially. It seems that the list is long and it
is getting longer and longer! Check this out:
whois -h whois.radb.net -- '-i origin AS32934' | grep ^route
(as advised by
On Wed, Jan 02, 2013 at 11:32:58PM -0500, Michael Orlitzky wrote
On 12/30/2012 10:21 PM, Walter Dnes wrote:
[0:0] -A FECESBOOK -j LOG --log-prefix FECESBOOK: --log-level 6
[0:0] -A FECESBOOK -j DROP
[0:0] -A INPUT -s 192.168.123.248/29 -i eth0 -j ACCEPT
[0:0] -A INPUT -s 169.254.0.0/16 -i
On Fri, Jan 4, 2013 at 3:17 PM, Walter Dnes waltd...@waltdnes.org wrote:
On Wed, Jan 02, 2013 at 11:32:58PM -0500, Michael Orlitzky wrote
On 12/30/2012 10:21 PM, Walter Dnes wrote:
[0:0] -A FECESBOOK -j LOG --log-prefix FECESBOOK: --log-level 6
[0:0] -A FECESBOOK -j DROP
[0:0] -A INPUT -s
On Fri, Jan 04, 2013 at 03:27:59PM -0500, Michael Mol wrote
On Fri, Jan 4, 2013 at 3:17 PM, Walter Dnes waltd...@waltdnes.org wrote:
The mere fact that you haven't manually typed in...
http://www.facebook.com/blah_blah_blah does not mean you're not
connecting to it.
But all that's
On Jan 4, 2013 8:33 PM, Walter Dnes waltd...@waltdnes.org wrote:
On Fri, Jan 04, 2013 at 03:27:59PM -0500, Michael Mol wrote
On Fri, Jan 4, 2013 at 3:17 PM, Walter Dnes waltd...@waltdnes.org
wrote:
The mere fact that you haven't manually typed in...
On 12/30/12 22:21, Walter Dnes wrote:
OK, here is version 2. I had an excellent adventure along the way.
I'm doing the upgrade on our servers right now, and there's another
possible gotcha: the newer iptables (requiring conntrack) requires
NETFILTER_XT_MATCH_CONNTRACK support in the kernel.
On Jan 3, 2013 4:40 AM, Michael Orlitzky mich...@orlitzky.com wrote:
On 12/30/12 22:21, Walter Dnes wrote:
OK, here is version 2. I had an excellent adventure along the way.
I'm doing the upgrade on our servers right now, and there's another
possible gotcha: the newer iptables
On 12/30/2012 10:21 PM, Walter Dnes wrote:
[0:0] -A FECESBOOK -j LOG --log-prefix FECESBOOK: --log-level 6
[0:0] -A FECESBOOK -j DROP
[0:0] -A INPUT -s 192.168.123.248/29 -i eth0 -j ACCEPT
[0:0] -A INPUT -s 169.254.0.0/16 -i eth0 -j ACCEPT
[0:0] -A INPUT -i lo -j ACCEPT
[0:0] -A INPUT -m
On 12/29/2012 01:32 PM, Walter Dnes wrote:
Two questions I'm not sure about.
1) I run a desktop, and use passive ftp. Is there any need for me to
accept RELATED packets?
Probably not, I think the server needs it though.
2) Does a -j LOG return to the chain it was called from, or does
2) Does a -j LOG return to the chain it was called from, or does it do
an implicit DROP?
It returns to spot where it was called from.
Yep, so you could create a new chain to drop and log;
/sbin/iptables -N logdrop
/sbin/iptables -A logdrop -j LOG --log-prefix 'DROP '
/sbin/iptables -A
OK, here is version 2. I had an excellent adventure along the way.
* At the very last line (COMMIT), iptables-restore said it failed, but
no clue whatsoever as to why.
* I copied the rules file to a scratch-file, and converted it to a bash
script that called iptables each time.
* This
Two questions I'm not sure about.
1) I run a desktop, and use passive ftp. Is there any need for me to
accept RELATED packets?
2) Does a -j LOG return to the chain it was called from, or does it do
an implicit DROP?
--
Walter Dnes waltd...@waltdnes.org
I don't run desktop environments; I
On 29-Dec-12 19:32, Walter Dnes wrote:
1) I run a desktop, and use passive ftp. Is there any need for me to
accept RELATED packets?
No, but you must take care of related connections. Even passive
ftp opens command (1023 - 21) and data (1023 - 1023) channel.
BTW, icmp-error (i.e. host
On Fri, Dec 28, 2012 at 01:07:11AM -0500, Michael Orlitzky wrote
On 12/27/2012 10:59 PM, Walter Dnes wrote:
Here's my revised Paranoia Plus ruleset. Any comments? Because I'm
behind a NAT-ing ADSL router/modem, many of my rules rarely see hits.
However, I do have a backup dialup
Walter Dnes wrote:
On Fri, Dec 28, 2012 at 01:07:11AM -0500, Michael Orlitzky wrote
On 12/27/2012 10:59 PM, Walter Dnes wrote:
Here's my revised Paranoia Plus ruleset. Any comments? Because I'm
behind a NAT-ing ADSL router/modem, many of my rules rarely see hits.
However, I do have a
Michael Orlitzky mich...@orlitzky.com writes:
The 'conntrack' module is supposed to be a superset of 'state', so most
things should be compatible. You really have two warnings there; the
first is for the state - conntrack switch, and the second is because
you're missing the --state flag in
On 12/27/12 06:28, Graham Murray wrote:
Michael Orlitzky mich...@orlitzky.com writes:
The 'conntrack' module is supposed to be a superset of 'state', so most
things should be compatible. You really have two warnings there; the
first is for the state - conntrack switch, and the second is
Michael Orlitzky wrote:
My first -m state rule is,
iptables -A INPUT -p ALL -m state \
--state ESTABLISHED,RELATED -j ACCEPT
That was mine, too (you can omit -p in this case, can't you?).
And if what you say is true, I'd be in deep shit if it reset to,
iptables -A INPUT -p ALL -m
On 12/27/12 12:52, Matthias Hanft wrote:
Michael Orlitzky wrote:
My first -m state rule is,
iptables -A INPUT -p ALL -m state \
--state ESTABLISHED,RELATED -j ACCEPT
That was mine, too (you can omit -p in this case, can't you?).
Yeah, it just makes the indentation line up in my
On Thu, Dec 27, 2012 at 11:28:15AM +, Graham Murray wrote
The problem is not really the OP's fault. The problem is that if you
have tables with the form -m state --state XXX at the point you
upgrade, iptables-save (quite possibly called automatically by
/etc/init.d/iptables stop) will
On 12/27/2012 06:11 PM, Walter Dnes wrote:
On Thu, Dec 27, 2012 at 11:28:15AM +, Graham Murray wrote
The problem is not really the OP's fault. The problem is that if you
have tables with the form -m state --state XXX at the point you
upgrade, iptables-save (quite possibly called
On Thu, Dec 27, 2012 at 06:50:07PM -0500, Michael Orlitzky wrote
Once you've upgraded, you should be able to add all of your old --state
rules normally, albeit with a warning. The new iptables will translate
them to conntrack rules, and you can `/etc/init.d/iptables save` the result.
The
On 12/27/2012 10:59 PM, Walter Dnes wrote:
Here's my revised Paranoia Plus ruleset. Any comments? Because I'm
behind a NAT-ing ADSL router/modem, many of my rules rarely see hits.
However, I do have a backup dialup connection in case of problems, so
most of my rules don't specify the
I'm sure I made more than one typo, but the ALLOWED_ICMP below
definitely needs a dollar sign.
for ok_icmp in ALLOWED_ICMP; do
iptables -A ICMP_IN -p icmp --icmp-type ${ok_icmp} -j ACCEPT
done
Many years ago, I understood IPCHAINS, and the first versions of
IPTABLES. However, IPTABLES has followed the example of Larry Wall's
Practical Extraction and Reporting Language
and turned into a pseudo-OS that I barely comprehend. Some rules
that I added many years ago were designed to reject
On 12/26/2012 07:47 PM, Walter Dnes wrote:
Many years ago, I understood IPCHAINS, and the first versions of
IPTABLES. However, IPTABLES has followed the example of Larry Wall's
Practical Extraction and Reporting Language
and turned into a pseudo-OS that I barely comprehend. Some rules
26 matches
Mail list logo