Jeff wrote:
You need to move these DROP and LOG rules up so they come before the ACCEPT rules. Otherwise the packets may have already been accepted.
Ok, I've now edited the script so it looks like this
IPTABLES="/sbin/iptables"
#Flush everything, start from scratch $IPTABLES -F
#Set default policies to DROP $IPTABLES -P INPUT DROP $IPTABLES -P FORWARD DROP
#Add DENY people here
$IPTABLES -A INPUT -s blocked.ip.address.here -j DROP
This should drop anything coming into the host for the blocked IP. Are you trying to block packets being forwarded to another box? The INPUT chain only sees packets destined for the firewall host itself. If you are trying to filter packets that are forwarded you need to use the FORWARD chain.
#Allow all lo traffic $IPTABLES -A INPUT -i lo -s 0.0.0.0/0 -d 0.0.0.0/0 -j ACCEPT
#Allow all related and established connections $IPTABLES -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
#Set default OUTPUT policy to ACCEPT $IPTABLES -P OUTPUT ACCEPT
# Open ports for server/services $IPTABLES -A INPUT -p tcp --dport 20 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 21 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 22 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 25 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 37 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 43 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 53 -j ACCEPT $IPTABLES -A INPUT -p udp --dport 53 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 80 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 110 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 113 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 143 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 443 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 465 -j ACCEPT $IPTABLES -A INPUT -p udp --dport 465 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 873 -j ACCEPT $IPTABLES -A INPUT -p udp --dport 873 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 993 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 995 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 2082 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 2083 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 2086 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 2087 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 2089 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 2095 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 3306 -j ACCEPT $IPTABLES -A INPUT -p tcp --dport 6666 -j ACCEPT
#Enable Blogger support (non-standards compliant piece of dogshit that it is) $IPTABLES -A INPUT -s 66.102.15.83 -j ACCEPT $IPTABLES -A INPUT -s 216.34.7.186 -j ACCEPT
#Add passive-mode people here #$IPTABLES -A INPUT -s xxx.xxx.xxx.xxx -j ACCEPT
#Logging $IPTABLES -A INPUT -j LOG --log-prefix "INPUTDEFAULT: "
#Save rules iptables-save > /etc/sysconfig/iptables
#Restart for rules to take effect service iptables restart
However, I am still able to connect from blocked.ip.address.here
Try running iptables -L -n -v -x -Z . Make sure that the rules are listed correctly and that you don't have rules in other tables that might interfere with the filtering.
Jeff