Bom dia Jeferson,

sim, ja fiz um teste colocando em /etc/init.d

Me parece que esta funcionando legal, mas não sei fazer testes de ataques para verificar a funcionalidade.

[]s

Bom dia Wilson,

Você vai colocar no /etc/init.d/ o script?

Abraços

Em 20 de março de 2012 11:18, Wilson Bom<[email protected]>  escreveu:

Bom dia Pessoal,

Estou tentando instalar firewall e gostaria da opinião dos senhores a
respeito do script abaixo.

------------------------------**--------


#! /bin/bash

case "$1" in
start)

    ###############
    # TITULO ABRE #
    ###############
    echo "Iniciando a Configuração do Firewall"

    ########################
    # Zera todas as Regras #
    ########################
    echo "Regras Zeradas"
      iptables -F

    ##############################**##########
    # Bloqueia tudo, nada entra e nada sai #
    ##############################**##########
    echo "Fechando tudo"
      iptables -P INPUT DROP
      iptables -P FORWARD DROP
      iptables -P OUTPUT DROP

    ##############################**##############################**
################
    # Impede ataques DoS a maquina limitando a quantidade de respostas do
ping #
    ##############################**##############################**
################
    #echo "Previne ataques DoS"
    #  iptables -A INPUT -p icmp --icmp-type echo-request -m limit --limit
1/s -j ACCEPT

    ##############################**###
    # Bloqieia completamente o ping #
    ##############################**###
    echo "Bloqueia o pings"
      iptables -A INPUT -p icmp --icmp-type echo-request -j DROP

    ##########################
    # Politicas de segurança #
    ##########################
    echo "Implementação de politicas de segurança"
      echo 0>  /proc/sys/net/ipv4/conf/all/**accept_source_route # Impede
falsear pacote
      echo 0>  /proc/sys/net/ipv4/conf/all/**accept_redirects # Perigo de
descobrimento de rotas de roteamento (desativar em roteador)
      echo 1>  /proc/sys/net/ipv4/icmp_echo_**ignore_broadcasts # Risco de
DoS
      echo 1>  /proc/sys/net/ipv4/tcp_**syncookies # Só inicia a conexão
quando recebe a confirmação, diminuindo a banda gasta
      echo 1>  /proc/sys/net/ipv4/conf/**default/rp_filter # Faz o
firewall responder apenas a placa de rede que recebeu o pacote
      iptables -A INPUT -m state --state INVALID -j DROP # Elimina os
pacotes invalidos

    ##############################**###
    # Libera conexoes estabelecidas #
    ##############################**###
    echo "Liberando conexões estabelecidas"
      iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
      iptables -A FORWARD -m state --state RELATED,ESTABLISHED,NEW -j ACCEPT
      iptables -A OUTPUT -m state --state RELATED,ESTABLISHED,NEW -j ACCEPT
      iptables -A INPUT -i lo -j ACCEPT

    ##############################**##############################**
###########################
    # Libera o acesso via SSH e Limita o número de tentativas de acesso a 4
a cada minuto #
    ##############################**##############################**
###########################
    echo "Liberando o SSH"
      iptables -I INPUT -p tcp --dport 22 -i eth0 -m state --state NEW -m
recent --update --seconds 60 --hitcount 4 -j DROP
      iptables -A INPUT -p tcp --dport 22 -j ACCEPT
      iptables -A INPUT -p udp --dport 22 -j ACCEPT

    ##################
    # Libera o Samba #
    ##################
    echo "Liberando o Samba"
      iptables -A INPUT -p tcp --dport 137:139 -j ACCEPT
      iptables -A INPUT -p udp --dport 137:139 -j ACCEPT

    ###################
    # Libera o Apache #
    ###################
    echo "Liberando o Apache"
      iptables -A INPUT -p tcp --dport 80 -j ACCEPT

    ################
    # TITULO FECHA #
    ################
    echo "Configuração do Firewall Concluida."

;;

stop)
     echo "Finalizando o Firewall"
     rm -rf /var/lock/subsys/firewall

     # ------------------------------**------------------------------**
-----
     # Remove todas as regras existentes
     # ------------------------------**------------------------------**
-----
       iptables -F
       iptables -X
       iptables -t mangle -F
     # ------------------------------**------------------------------**
-----
     # Reseta as politicas padrões, aceitar tudo
     # ------------------------------**------------------------------**
-----
       iptables -P INPUT   ACCEPT
       iptables -P OUTPUT  ACCEPT
       iptables -P FORWARD ACCEPT

;;

restart|reload)
       $0 stop
       $0 start
     ;;

*)
   echo "Selecione uma opção valida {start|stop|status|restart|**reload}"
   exit 1

esac

exit 0


--

Wilson Bom


  Serprodata Informática Ltda.
  Av. Marcelino Pires, 1405 - Sala 216
  79800-004 - Dourados - MS
  (067) 3421-3343 - 8407-4808 - 8407-8808

  Messenger: [email protected]

  E-mail...: [email protected]
            [email protected]
            [email protected]
            [email protected]



  Ubuntu Lucid Lynx 10.04 - 2.6.32-25 #44
  Linux Counter: 292553
  Dataflex 3.2 Linux - Dataflex 3.2 MS-Dos





--
Mais sobre o Ubuntu em português: 
http://www.ubuntu-br.org/**comece<http://www.ubuntu-br.org/comece>

Lista de discussão Ubuntu Brasil
Histórico, descadastramento e outras opções:
https://lists.ubuntu.com/**mailman/listinfo/ubuntu-br<https://lists.ubuntu.com/mailman/listinfo/ubuntu-br>



--
Wilson Bom


 Serprodata Informática Ltda.
 Av. Marcelino Pires, 1405 - Sala 216
 79800-004 - Dourados - MS
 (067) 3421-3343 - 8407-4808 - 8407-8808

 Messenger: [email protected]

 E-mail...: [email protected]
            [email protected]
            [email protected]
            [email protected]



 Ubuntu Lucid Lynx 10.04 - 2.6.32-25 #44
 Linux Counter: 292553
 Dataflex 3.2 Linux - Dataflex 3.2 MS-Dos





--
Mais sobre o Ubuntu em português: http://www.ubuntu-br.org/comece

Lista de discussão Ubuntu Brasil
Histórico, descadastramento e outras opções:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-br

Responder a