Re: Policy Misunderstanding: RTFM Guidance Requested.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Alistair,

Thanks for the reply.  I appreciate you taking a look and providing comments.
I want to ask you about some of these "Really Bad Thing"(s)

> > It runs Gentoo Linux, kernel 2.4.26 and iptables 1.2.10.
> 
>         Yumm ...Gentoo -- good stuff

Definitely yes.  I switched from Slackware which I will always be fond
of, but Gentoo has so much to offer.  I'll leave it there because one
could write for days about portage and optimizations.

> 
> > I thought I had seen others on this list discuss starting with a
> > completely closed router that denies all traffic - INPUT, OUTPUT, and
> > FORWARD; filter, nat, and mangle.

>         Set POLICY for INPUT OUTPUT and FORWARD to DROP in filter only.
>         If you start setting the POLICY for nat and mangle tables to DROP, things
>         will misbehave badly.  And be hard to debug. -- there are those that
>         disagree, and have success doing things like this but in general and
>         for a home router, it is in many folks eyes a (tm) Really Bad Thing (tm).

This comment pricks up my ears/eyes.  Why is this so, and do you have
links to discussions on this topic.

>         There is a wonderful fellow named Oskar Andreasson who has written a
> wonderful set of tutorials, and even provides some elemental scripts as
> guidelines
>         http://iptables-tutorial.frozentux.net/
> 
>         Read and enjoy

Thanks for pointer.  I've got a Firefox tab open to it right now. 
Looks very good.  Now let's see if I can absorb it.

> >
> > echo "   Enabling forwarding.."
> > echo "1" > /proc/sys/net/ipv4/ip_forward
> 
>         Urk
>           Do this at the *end* of the script. -- just a good habit to NOT turn on
> forwarding until all the rules are loaded to handle it.

That sounds like a very good idea to me.  Noted for edit this evening.

> >
> > echo "   Set the filter/nat/mangle packet Matching Table Policy."
> > $IPTABLES -t filter -P INPUT DROP
> > $IPTABLES -t filter -P OUTPUT DROP
> > $IPTABLES -t filter -P FORWARD DROP
> 
> The above are a (tm) Good Thing (tm)

Yes, this is the kind of thing that I want - start from complete
lockdown, and then open only one thing at a time until I can do
everything that I want on the network and maintain everything else in
lockdown.

> 
> > $IPTABLES -t nat -P PREROUTING DROP
> > $IPTABLES -t nat -P POSTROUTING DROP
> > $IPTABLES -t nat -P OUTPUT DROP
> > $IPTABLES -t mangle -P INPUT DROP
> > $IPTABLES -t mangle -P OUTPUT DROP
> > $IPTABLES -t mangle -P FORWARD DROP
> > $IPTABLES -t mangle -P PREROUTING DROP
> > $IPTABLES -t mangle -P POSTROUTING DROP
> 
> In general the above are a (tm) Really Bad Thing (tm)

As previously requested above, why are these policies bad/unworkable?
Any info. and links discussing these iptables fundamentals would be
greatly valued.

> >
> > echo "   INPUT/OUTPUT Rules for Routerbox."
> > $IPTABLES -t filter -A INPUT -j ACCEPT
> > $IPTABLES -t filter -A OUTPUT -j ACCEPT
> 
> Uhhh ... I hope these are only here because yer having problems --
>    These above two rules are a (tm) Really Bad Thing (tm)
>         (they basically allow everything in and out -- *ouch*)

You got it.  This is the rule of a man willing to submit his machines
to a world of hostility in a desperate attempt to get
some-packet/any-packet  through the routerbox.

> >
> > echo "   FORWARD Rules for data allowed IN and OUT of the LAN."
> > $IPTABLES -t filter -A FORWARD -i eth0 -o eth1 -m state --state
> > ESTABLISHED,RELATED -j ACCEPT
> 
> Repeat the above rule for filter INPUT

Ahh, I see what you are getting at.  Will do.

> 
> > $IPTABLES -t filter -A FORWARD -i eth0 -o eth1 -m state --state NEW -j
> > ACCEPT
> 
> The above rule is a (tm) Really Bad Thing (tm)
>         (basically allows everything into yer lan *ouch*)

Indeed, you are witnessing further desperation after hours of
scratching my head and muttering to myself.  :-)


> >
> > echo "   Do not respond to remote Pings."
> > $IPTABLES -t filter -A INPUT -p icmp --icmp-type echo-request -j DROP
> Umm .. You *might* want to set this to deny ping requests from the outside,
> rather than dropping them all .. .unless you don't trust users on the inside.
> *grin*

I'm not quite sure I follow here.  How does this affect users behind
the firewall on the home LAN.

Thanks again for your thoughtful response.
I'd hope you can spare some further time to respond.

Mike


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux