Lonnie & Gene,

Below is the output you both requested. Since having the problem, I have 
modified the rules to replace the hostnames with static IP addresses and added 
my internal LAN to the adaptive ban whitelist. Also, although the Soekris box 
has multiple interfaces, I am only using the external interface since I am 
forced to use my current ISP's router, i.e., I no longer have networks 
connected to the internal interfaces of astlinux.

pbx ~ # iptables -nL |grep ACCEPT
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state ESTABLISHED
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state RELATED tcp 
dpts:1024:65535
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state RELATED udp 
dpts:1024:65535
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state ESTABLISHED
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state RELATED tcp 
dpts:1024:65535
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state RELATED udp 
dpts:1024:65535
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state ESTABLISHED
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: 
avg 20/sec burst 100
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: 
avg 20/sec burst 100
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp dpt:5060
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           udp spt:67 dpt:68
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:22
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:443
ACCEPT     udp  --  192.168.1.0/24       0.0.0.0/0           udp 
dpts:10000:10100
ACCEPT     udp  --  192.168.1.0/24       0.0.0.0/0           udp dpt:4569
ACCEPT     udp  --  192.168.1.0/24       0.0.0.0/0           udp dpt:5060
ACCEPT     udp  --  66.241.96.96         0.0.0.0/0           udp 
dpts:10000:10100
ACCEPT     udp  --  66.241.96.96         0.0.0.0/0           udp dpt:5060
ACCEPT     udp  --  xxx.xxx.xxx.xxx       0.0.0.0/0           udp dpt:4569
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: 
avg 20/sec burst 100
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           ctstate DNAT
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: 
avg 20/sec burst 100
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: 
avg 20/sec burst 100
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
pbx ~ #

pbx ~ # arno-iptables-firewall restart
Arno's Iptables Firewall Script v2.0.0a
-------------------------------------------------------------------------------
Stopping (user) plugins...
 SIP-VOIP plugin v0.3BETA
 SSH Brute-Force Protection plugin v1.1a
 Traffic-Shaper plugin v1.2.06-astlinux
 Adaptive Ban plugin v1.01 BETA
  Adaptive Ban - Stopping... Stopped.
Checking/probing Iptables modules:
 Loaded kernel module ip_tables.
 Loaded kernel module nf_conntrack.
 Loaded kernel module nf_conntrack_ftp.
 Loaded kernel module xt_conntrack.
 Loaded kernel module xt_limit.
 Loaded kernel module xt_state.
 Loaded kernel module xt_multiport.
 Loaded kernel module iptable_filter.
 Loaded kernel module iptable_mangle.
 Loaded kernel module ipt_REJECT.
 Loaded kernel module ipt_LOG.
 Loaded kernel module xt_TCPMSS.
 Loaded kernel module nf_nat_ftp.
 Loaded kernel module iptable_nat.
 Loaded kernel module ipt_MASQUERADE.
 Module check done...
Configuring general kernel parameters:
 Setting the max. amount of simultaneous connections to 16384
  net.nf_conntrack_max = 16384
  net.netfilter.nf_conntrack_acct = 1
Configuring kernel parameters:
 Disabling send redirects
  net.ipv4.conf.all.send_redirects = 0
  net.ipv4.conf.default.send_redirects = 0
  net.ipv4.conf.lo.send_redirects = 0
  net.ipv4.conf.eth0.send_redirects = 0
  net.ipv4.conf.eth3.send_redirects = 0
  net.ipv4.conf.br0.send_redirects = 0
 Enabling protection against source routed packets
  net.ipv4.conf.all.accept_source_route = 0
  net.ipv4.conf.default.accept_source_route = 0
  net.ipv4.conf.lo.accept_source_route = 0
  net.ipv4.conf.eth0.accept_source_route = 0
  net.ipv4.conf.eth3.accept_source_route = 0
  net.ipv4.conf.br0.accept_source_route = 0
  net.ipv4.icmp_echo_ignore_broadcasts = 1
  net.ipv4.icmp_ignore_bogus_error_responses = 1
 Enabling packet forwarding
  net.ipv4.conf.all.forwarding = 1
  net.ipv4.conf.default.forwarding = 1
  net.ipv4.conf.lo.forwarding = 1
  net.ipv4.conf.eth0.forwarding = 1
  net.ipv4.conf.eth3.forwarding = 1
  net.ipv4.conf.br0.forwarding = 1
 Setting some kernel performance options
  net.ipv4.tcp_window_scaling = 1
  net.ipv4.tcp_timestamps = 1
  net.ipv4.tcp_sack = 1
  net.ipv4.tcp_dsack = 1
  net.ipv4.tcp_fack = 1
  net.ipv4.tcp_low_latency = 0
 Enabling reduction of the DoS'ing ability
  net.ipv4.tcp_fin_timeout = 30
  net.ipv4.tcp_keepalive_time = 1800
  net.ipv4.tcp_syn_retries = 3
  net.ipv4.tcp_synack_retries = 2
  net.ipv4.tcp_rfc1337 = 1
  net.ipv4.ip_local_port_range = 32768 61000
 Enabling anti-spoof with rp_filter
  net.ipv4.conf.all.rp_filter = 1
  net.ipv4.conf.default.rp_filter = 1
  net.ipv4.conf.lo.rp_filter = 1
  net.ipv4.conf.eth0.rp_filter = 1
  net.ipv4.conf.eth3.rp_filter = 1
  net.ipv4.conf.br0.rp_filter = 1
  net.ipv4.icmp_echo_ignore_all = 0
 Enabling SYN-flood protection via SYN-cookies
  net.ipv4.tcp_syncookies = 1
 Disabling the logging of martians
  net.ipv4.conf.all.log_martians = 0
  net.ipv4.conf.default.log_martians = 0
  net.ipv4.conf.lo.log_martians = 0
  net.ipv4.conf.eth0.log_martians = 0
  net.ipv4.conf.eth3.log_martians = 0
  net.ipv4.conf.br0.log_martians = 0
 Disabling the acception of ICMP-redirect messages
  net.ipv4.conf.all.accept_redirects = 0
  net.ipv4.conf.default.accept_redirects = 0
  net.ipv4.conf.lo.accept_redirects = 0
  net.ipv4.conf.eth0.accept_redirects = 0
  net.ipv4.conf.eth3.accept_redirects = 0
  net.ipv4.conf.br0.accept_redirects = 0
 Setting default TTL=64
  net.ipv4.ip_default_ttl = 64
 Disabling ECN (Explicit Congestion Notification)
  net.ipv4.tcp_ecn = 0
 Enabling kernel support for dynamic IPs
  net.ipv4.ip_dynaddr = 1
 Enabling PMTU discovery
  net.ipv4.ip_no_pmtu_disc = 0
 Flushing route table
  net.ipv4.route.flush = 1
 Kernel setup done...
Reinitializing firewall chains
 Setting all default policies to DROP while "setting up firewall rules"
IPv4 mode selected, no IPv6 available
Using loglevel "info" for syslogd

Setting up firewall rules:
-------------------------------------------------------------------------------
Enabling setting the maximum packet size via MSS
Logging of stealth scans (nmap probes etc.) enabled
Logging of packets with bad TCP-flags enabled
Logging of INVALID TCP packets disabled
Logging of INVALID UDP packets disabled
Logging of INVALID ICMP packets disabled
Logging of fragmented packets enabled
Logging of access from reserved addresses disabled
Setting up antispoof for INTERNAL net(s): 192.168.168.0/24
Setting up antispoof for DMZ net(s): 192.168.169.0/24
Reading custom rules from /etc/arno-iptables-firewall/custom-rules
Checking for (user) plugins in /usr/share/arno-iptables-firewall/plugins...
 SIP-VOIP plugin v0.3BETA
  Loaded kernel module ip_nat.
  Using SIP UDP for 0/0 (INET) to port(s): 5060
  Loaded kernel module ip_conntrack_sip.
  Loaded kernel module ip_nat_sip.
 SSH Brute-Force Protection plugin v1.1a
  Loaded kernel module ipt_recent.
  Protecting TCP port(s): 22
 Traffic-Shaper plugin v1.2.06-astlinux
  Loaded kernel module ip_nat.
  Shaping as 30000/5000 kb/s using 'htb' for interface: eth0
 Adaptive Ban plugin v1.01 BETA
  Adaptive Ban - Whitelisting INTERNAL net(s): 192.168.168.0/24
  Adaptive Ban - Whitelisting host(s): 192.168.1.0/24
  File=/var/log/messages Time=10 Count=6 Types=sshd asterisk
 Loaded 4 plugin(s)...
Setting up external(INET) INPUT policy
 Logging of ICMP flooding enabled
 Enabling support for DHCP-assigned-IP (DHCP client)
 Logging of explicitly blocked hosts disabled
 Logging of denied local output connections enabled
 Allowing 0/0 for TCP port(s): 22
 Allowing 0/0 for TCP port(s): 443
 Allowing 192.168.1.0/24 for UDP port(s): 10000:10100
 Allowing 192.168.1.0/24 for UDP port(s): 4569
 Allowing 192.168.1.0/24 for UDP port(s): 5060
 Allowing 66.241.96.96 for UDP port(s): 10000:10100
 Allowing 66.241.96.96 for UDP port(s): 5060
 Allowing xxx.xxx.xxx.xxx for UDP port(s): 4569
 Packets will NOT be checked for private source addresses
 Allowing ANYHOST to send IPv4 ICMP-requests (ping)
 Logging of possible stealth scans enabled
 Logging of (other) packets to PRIVILEGED TCP ports enabled
 Logging of (other) packets to PRIVILEGED UDP ports enabled
 Logging of (other) packets to UNPRIVILEGED TCP ports enabled
 Logging of (other) packets to UNPRIVILEGED UDP ports enabled
 Logging of IPv4 IGMP packets disabled
 Enabling support for NAT local redirect
 Logging of dropped ICMP-request(ping) packets disabled
 Logging of dropped other ICMP packets enabled
 Logging of other IP protocols (non TCP/UDP/ICMP/IGMP) packets disabled
Setting up external(INET) OUTPUT policy
Applying external(INET) policy to interface: eth0 
(EXTERNAL_NET=192.168.1.201/24)
Setting up internal(LAN) INPUT policy
 Allowing ICMP-requests(ping)
 Allowing all (other) ports/protocols
Applying internal(LAN) policy to interface: br0
Setting up DMZ INPUT policy
 Allowing ICMP-requests(ping)
Applying DMZ policy to interface: eth3
Setting up DMZ FORWARD policy
 Logging of denied DMZ (forward) output connections enabled
 Logging of denied DMZ (forward) input connections enabled
 Setting up INET->DMZ policy
  Denying all other INET->DMZ packets
 Setting up DMZ->INET policy
  Allowing ICMP-requests(ping)
  Allowing all (other) TCP ports
  Allowing all (other) UDP ports
  Allowing all (other) protocols
 Setting up DMZ->LAN policy
Applying DMZ FORWARD policy to interface: eth3
Setting up internal(LAN) FORWARD policy
 Logging of denied LAN->INET FORWARD connections enabled
 Setting up LAN->INET policy
  Allowing ICMP-requests(ping)
  Allowing all (other) TCP ports
  Allowing all (other) UDP ports
  Allowing all (other) protocols
Applying internal(LAN) FORWARD policy to interface: br0
Enabling masquerading(NAT) via external interface(s): eth0
 Adding (internal) host(s): 192.168.168.0/24 192.168.169.0/24
Security is ENFORCED for external interface(s) in the FORWARD chain
 Logging of dropped FORWARD packets disabled

Mar 14 23:40:27 All firewall rules applied.
pbx ~ #

-----Original Message-----
From: Tom Mazzotta
Sent: Monday, March 14, 2011 10:26 PM
To: AstLinux Users Mailing List
Subject: Arno firewall problem

I am running astlinux-0.7.7 (Asterisk 1.4.40) on a Soekris box behind my ISP's 
cable router on my LAN. I am forwarding all SIP & RTP packets from this router 
to the external interface of astlinux. All of my phones connect to astlinux 
through the external interface of the Soekris box as well. Using Arno, I setup 
rules to allow inbound SIP/RTP from my LAN clients and my SIP provider. In the 
rules for the SIP provider, I used the hostname of their server as opposed to 
an IP address. While my system was booting, I saw the following messages 
displayed on the console:

------------------------------
 Allowing 0/0 for TCP port(s): 22
 Allowing 0/0 for TCP port(s): 443
 Allowing 192.168.1.0/24 for UDP port(s): 10000:10100
 Allowing 192.168.1.0/24 for UDP port(s): 4569
 Allowing 192.168.1.0/24 for UDP port(s): 5060
 Allowing inbound23.vitelity.net for UDP port(s): 10000:10100
/usr/sbin/iptables -A EXT_INPUT_CHAIN -i + -s inbound23.vitelity.net -d 0/0 -p 
udp --dport 10000:10100 -j ACCEPT
ERROR (2): iptables v1.4.9: host/network `inbound23.vitelity.net' not found
Try `iptables -h' or 'iptables --help' for more information.
 Allowing inbound23.vitelity.net for UDP port(s): 5060
/usr/sbin/iptables -A EXT_INPUT_CHAIN -i + -s inbound23.vitelity.net -d 0/0 -p 
udp --dport 5060 -j ACCEPT
ERROR (2): iptables v1.4.9: host/network `inbound23.vitelity.net' not found
Try `iptables -h' or 'iptables --help' for more information.

[cut]

Mar 14 19:57:22 WARNING: Not all firewall rules are applied.
------------------------------

There seems to be a problem using hostnames in the rules. Since then I have 
substituted the IP addresses in my rules to resolve the errors (although I 
would really prefer to use hostnames). However, it looks like Arno permitted 
SIP connections from ANY host, because the adaptive ban plugin logged the 
following messages to /var/log:

pbx log # cat messages
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"604"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"605"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"606"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"607"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"608"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"609"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"610"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"611"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"612"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"613"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"614"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
Mar  8 06:58:47 pbx local0.notice asterisk[2957]: NOTICE[2957]: 
chan_sip.c:16796 in handle_request_register: Registration from 
'"615"<sip:6...@192.168.1.xxx>' failed for '173.192.216.91' - No matching peer 
found
...

Apparently, my box was under attack by a system at 173.192.216.91.

So if hostnames are not supported in the Arno rules and those rules failed to 
execute, I would have thought that all SIP connections outside of my LAN would 
have been blocked, however, it seems that wasn't the case. Is this the expected 
behavior of the system or have I misconfigured something?


-tm

------------------------------------------------------------------------------
Colocation vs. Managed Hosting
A question and answer guide to determining the best fit
for your organization - today and in the future.
http://p.sf.net/sfu/internap-sfd2d
_______________________________________________
Astlinux-users mailing list
Astlinux-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/astlinux-users

Donations to support AstLinux are graciously accepted via PayPal to 
pay...@krisk.org.

Reply via email to