RE: tool to search within cidr blocks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I think with all the times we loaded and unloaded our iptables configs and
using the type executed by command line, then through iptables-save etc that
we trashed iptables hence it was blocking IP's we weren't expecting.
For right now I think the reboot did it....

Thanks for all your help!

Joey

> -----Original Message-----
> From: netfilter-owner@xxxxxxxxxxxxxxx
[mailto:netfilter-owner@xxxxxxxxxxxxxxx]
> On Behalf Of Grant Taylor
> Sent: Friday, October 24, 2008 1:02 AM
> To: Mail List - Netfilter
> Subject: Re: tool to search within cidr blocks
> 
> On 10/23/2008 11:14 PM, Joey wrote:
> > Hey Grant,
> 
> *wave*
> 
> > Here is what I can tell you.
> > I run iptables -F which is supposed to clear everything.
> 
> *nod*
> 
> > I then load my config and what you see as a result of that load is what
you
> > see in the iptables-save result.
> 
> Ok...  Do the pages you linked to before reflect what is below, or is
> what you have below a small subset of the over all config?
> 
> > I have a script that builds the iptables-save.cfg file from a file
> > containing IP numbers only.
> 
> I gathered that is what you were doing.  I don't see any thing wrong
> with doing that either.
> 
> > When I build the script you can see that certain things happen based on
the
> > fact that I am reading in values and building each "chain" in order, so
you
> > won't see all the defining of the chains at the top like the
iptables-save
> > version.
> 
> *nod*
> 
> > Now I could be missing something somewhere in my declarations, but the
code
> > is working in general.  I see IP's being blocked, as you can see I do a
lot
> > of logging to insure I know what's going on.
> 
> Yep.
> 
> > The chains for fail2ban are built and managed by that app so I don't
mess
> > with them.
> 
> Ah.
> 
> > I completely rebooted the box prior to doing the below.  Normally I
never
> > rebooted the box, but new kernel came out so I figured we will start
from a
> > clean slate.
> 
> I tend to do the same.
> 
> > I did a reduced list test:
> > ----------------------------------------------------
> > My quick file which is created by my app:
> > *filter
> > :INPUT ACCEPT [0:0]
> > :FORWARD ACCEPT [0:0]
> > :OUTPUT ACCEPT [0:0]
> > :SMTP_TRAFFIC - [0:0]
> > -A INPUT -p tcp --dport 25 -m state --state NEW -j SMTP_TRAFFIC
> > :LOG_ASIAN - [0:0]
> > :CIDR-ASIAN - [0:0]
> > -A SMTP_TRAFFIC -j CIDR-ASIAN
> > -A LOG_ASIAN -j LOG --log-prefix "SPAM-BLOCK-CIDR-ASIAN"
> > -A LOG_ASIAN -j DROP
> > -A CIDR-ASIAN -s 58.14.0.0/15 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.16.0.0/13 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.24.0.0/15 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.29.0.0/16 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.30.0.0/15 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.32.0.0/11 -j LOG_ASIAN
> > COMMIT
> > ----------------------------------------------------
> > I executed iptables-restore < above-file
> 
> Is the above file your current config, or just a small portion of your
> config that you created for this test?  I don't see hardly any thing
> compared to your previous iptables-save file.
> 
> > ----------------------------------------------------
> > Executing iptables --list results in:
> > Chain INPUT (policy ACCEPT)
> > target     prot opt source               destination
> > SMTP_TRAFFIC  tcp  --  anywhere             anywhere            tcp
dpt:smtp
> > state NEW
> >
> > Chain FORWARD (policy ACCEPT)
> > target     prot opt source               destination
> >
> > Chain OUTPUT (policy ACCEPT)
> > target     prot opt source               destination
> >
> > Chain CIDR-ASIAN (1 references)
> > target     prot opt source               destination
> > LOG_ASIAN  all  --  58.14.0.0/15         anywhere
> > LOG_ASIAN  all  --  58.16.0.0/13         anywhere
> > LOG_ASIAN  all  --  58.24.0.0/15         anywhere
> > LOG_ASIAN  all  --  58.29.0.0/16         anywhere
> > LOG_ASIAN  all  --  58.30.0.0/15         anywhere
> > LOG_ASIAN  all  --  58.32.0.0/11         anywhere
> >
> > Chain LOG_ASIAN (6 references)
> > target     prot opt source               destination
> > LOG        all  --  anywhere             anywhere            LOG level
> > warning prefix `SPAM-BLOCK-CIDR-ASIAN'
> > DROP       all  --  anywhere             anywhere
> >
> > Chain SMTP_TRAFFIC (1 references)
> > target     prot opt source               destination
> > CIDR-ASIAN  all  --  anywhere             anywhere
> > ----------------------------------------------------
> 
> This is what I would expect to see based on your iptables-save file above.
> 
> > Executing iptables-save resulted in:
> > # Generated by iptables-save v1.2.11 on Fri Oct 24 00:08:34 2008
> > *filter
> > :INPUT ACCEPT [1091:155172]
> > :FORWARD ACCEPT [0:0]
> > :OUTPUT ACCEPT [1287:150175]
> > :CIDR-ASIAN - [0:0]
> > :LOG_ASIAN - [0:0]
> > :SMTP_TRAFFIC - [0:0]
> > -A INPUT -p tcp -m tcp --dport 25 -m state --state NEW -j SMTP_TRAFFIC
> > -A CIDR-ASIAN -s 58.14.0.0/255.254.0.0 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.16.0.0/255.248.0.0 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.24.0.0/255.254.0.0 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.29.0.0/255.255.0.0 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.30.0.0/255.254.0.0 -j LOG_ASIAN
> > -A CIDR-ASIAN -s 58.32.0.0/255.224.0.0 -j LOG_ASIAN
> > -A LOG_ASIAN -j LOG --log-prefix "SPAM-BLOCK-CIDR-ASIAN"
> > -A LOG_ASIAN -j DROP
> > -A SMTP_TRAFFIC -j CIDR-ASIAN
> > COMMIT
> > # Completed on Fri Oct 24 00:08:34 2008
> > ----------------------------------------------------
> 
> Again, this is what I would expect to see based on your iptables-save
> file above.
> 
> > Let me know what you see or think...
> 
> Please try re-applying your iptables-save.cfg file from your previous
> post and let us know if your firewall is still blocking the 71.74.56.125
IP.
> 
> > Thanks!!!!!
> 
> You are welcome.
> 
> 
> 
> Grant. . . .
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux