On Sat, Feb 22, 2014 at 4:37 AM, Mart Frauenlob <mart.frauenlob@xxxxxxxxx> wrote: > > On 21.02.2014 23:36, Anthony Taylor wrote: >> >> I'm attempting to set up outbound filtering on a server to satisfy >> PCI requirements. Here is what I have so far: >> >> iptables -L OUTPUT -n --line-numbers Chain OUTPUT (policy ACCEPT) > > > policy of ACCEPT??? where's the filtering? > only ACCEPT rules below, you want logging only? Sorry I didn't explain. The last rule will be a DROP all, however for now in the interest of not breaking anything I'm logging results instead. > > use output of iptables -S .... -N is bad formatting for mail. also it > needs -v to be complete like for rule #1 (guess that's for the lo iface).. Here is the output of iptables -S OUTPUT -v iptables -S OUTPUT -v -P OUTPUT ACCEPT -c 5039 319910 -A OUTPUT -o lo -c 294541 22016298 -j ACCEPT -A OUTPUT -m state --state RELATED,ESTABLISHED -c 11077878 13836891689 -j ACCEPT -A OUTPUT -p icmp -m icmp --icmp-type 0 -c 0 0 -j ACCEPT -A OUTPUT -p icmp -m icmp --icmp-type 8 -c 193399 5415172 -j ACCEPT -A OUTPUT -p tcp -m tcp --dport 53 -c 0 0 -j ACCEPT -A OUTPUT -p udp -m udp --dport 53 -c 233937 16828408 -j ACCEPT -A OUTPUT -p tcp -m tcp --dport 43 -c 50 3000 -j ACCEPT -A OUTPUT -p tcp -m tcp --dport 25 -c 344 20640 -j ACCEPT -A OUTPUT -d 74.125.0.0/16 -p tcp -m tcp --dport 80 -c 1319 79140 -j ACCEPT -A OUTPUT -d 66.135.58.62/32 -p tcp -m tcp --dport 80 -c 153 9180 -j ACCEPT -A OUTPUT -d 192.0.80.244/32 -p tcp -m tcp --dport 80 -c 139 8340 -j ACCEPT -A OUTPUT -d 66.135.58.61/32 -p tcp -m tcp --dport 80 -c 112 6720 -j ACCEPT -A OUTPUT -d 192.0.80.246/32 -p tcp -m tcp --dport 80 -c 109 6540 -j ACCEPT -A OUTPUT -d 91.189.92.201/32 -p tcp -m tcp --dport 80 -c 0 0 -j ACCEPT -A OUTPUT -d 91.189.88.149/32 -p tcp -m tcp --dport 80 -c 0 0 -j ACCEPT -A OUTPUT -d 91.189.91.13/32 -p tcp -m tcp --dport 80 -c 3 180 -j ACCEPT -A OUTPUT -d 91.189.92.200/32 -p tcp -m tcp --dport 80 -c 0 0 -j ACCEPT -A OUTPUT -d 91.189.91.14/32 -p tcp -m tcp --dport 80 -c 2 120 -j ACCEPT -A OUTPUT -d 91.189.91.15/32 -p tcp -m tcp --dport 80 -c 7 420 -j ACCEPT -A OUTPUT -d 66.155.40.249/32 -p tcp -m tcp --dport 80 -c 0 0 -j ACCEPT -A OUTPUT -d 66.155.40.250/32 -p tcp -m tcp --dport 80 -c 0 0 -j ACCEPT -A OUTPUT -m state --state INVALID -c 10200 425557 -j DROP -A OUTPUT -c 5039 319910 -j LOG --log-prefix "fw-outbound: " >> >> My problem is I'm seeing some traffic that I'm not sure I should be >> seeing. I get periodically some traffic from source port 80. It's >> my understanding that rule 2 above would filter these out. When I >> try to access the webserver I don't get anything to show up in logs. >> Yet still I'm getting entries like these: >> <snip> > > > -m state --state INVALID -j DROP > look if they still come up... > also this might have influence: I have added this rule as you can see above, and although it seems to have stopped some of it, my 'phantom' traffic with source ports 80,443 still continues. > > nf_conntrack_tcp_be_liberal - BOOLEAN > 0 - disabled (default) > not 0 - enabled > > Be conservative in what you do, be liberal in what you accept > from others. > If it's non-zero, we mark only out of window RST segments as > INVALID. > > see: > Documentation/networking/nf_conntrack-sysctl.txt cat /proc/sys/net/netfilter/nf_conntrack_tcp_be_liberal 0 This appears to be disabled. > > I'd suggest to use ipset for all the IPs, ie: > > ipset create webservers hash:ip > ipset add webservers 91.189.92.201 > and so on > > iptables -A OUTPUT -m set --match-set webservers dst -p tcp --dport 80 -m state --state NEW -j ACCEPT I have looked into ipset. I will try to implement it shortly, but this won't help my problems unfortunately. > > Best regards > > Mart Thank you Mart for answering me. Anthony Taylor --------------------- http://www.fallsgeek.com (940)228-4580 Wichita Falls, TX Your connection for everything geek... -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html