On Friday 01 November 2002 4:48 pm, mailinglists@belfin.ch wrote: > Hi > > > I have been looking at several scripts checking the default > > policies on them. > > Some include items that others don't. Oscars tutorial > > doesn't cover all of > > these compared to Ziegler's book. I have been wondering if > > the following covers ALL built-in chains? > > iptables -P INPUT DROP > > iptables -P OUTPUT DROP > > iptables -P FORWARD DROP > > These will do the job (in most cases). > iptables -P INPUT DROP will stop everything trying to hit your bastion > host. iptables -P OUTPUT DROP will stop everything leaving your bastion > host. iptables -P FORWARD DROP will stop everything trying to get through > your bastion host. > These policies cover all network adatpers in your system. The above is a good summary, and good advice. > > Ziegler's book states that it should be this (it was never > > put in these > > words but this is what I am gathering from my reading): > > iptables -t nat -P PREROUTING DROP > > iptables -t nat -P OUTPUT DROP > > iptables -t nat -P POSTROUTING DROP > > iptables -t mangle -P PREROUTING DROP > > iptables -t mangle -P OUTPUT DROP > > iptables -t filter -P INPUT DROP > > iptables -t filter -P OUTPUT DROP > > iptables -t filter -P FORWARD DROP I regard these policies as a very bad idea. Definitely not something to be recommended in a book about building good firewalls. I have heard that Ziegler's book contains some errors, but if it contains the above recommendations for default policies I consider to be a very poor text indeed. > Of course you can do that. But this is multiple pleonasm. I.e. if you drop > PREROUTING you don't have to drop INPUT anymore. If your DROP Policy covers > every built-in chain you must write a rule for every DROPed chain to allow > a certain action. Your filter becomes unclear and thus, hard to read and > hard to manage. Actually, it is worse than that. If you are using netfilter's stateful inspection capabilities (and you should be) then setting the above policies on the nat and mangle tables will simply stop things from working. You should never set any default policy other than ACCEPT on a nat or mangle table. I sometimes think it was a bad idea even to make it possible. Antony. -- Abandon hope, all ye who enter here. You'll feel much better about things once you do.