Re: droping too many ports

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Askar wrote:
hi all

what if I do (and im doing this from last two hours ;))

iptables -A FORWARD -p tcp --dport 31000:65500 -j DROP
iptables -A FORWARD -p udp --dport 31000:65500 -j DROP

[snip]

iptables -L -nvx  gives too many counts whenever I checked, especailly
numbers are very high for UDP "udp --dport 31000:65500 -j DROP"

Depending on your other rules this might not be good idea. Here's an example why. If client connects to say your web server, it may look something like this:


 client sport 54321 to server dport 80     for incoming packets
 server sport 80    to client dport 54321  for outgoing packets

As you can guess by now, your rules are blocking outgoing packets of an perfectly legal connection.

BTW, you should really consider setting default policy to DROP, and allow only what you need.

--
Aleksandar Milivojevic <amilivojevic@xxxxxx>    Pollard Banknote Limited
Systems Administrator                           1499 Buffalo Place
Tel: (204) 474-2323 ext 276                     Winnipeg, MB  R3T 1L7


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux