Re: DROP policy, serious vulnerability?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 03/19/15 12:13, Neal Murphy wrote:
On Thursday, March 19, 2015 01:51:44 AM dE wrote:
Hi!

I'm using the drop policy for iptables using the following --

iptables -P INPUT DROP
iptables -P OUTPUT DROP
iptables -P FORWARD DROP
iptables -A INPUT -p tcp -j ACCEPT
iptables -A INPUT -p udp -j ACCEPT
iptables -A INPUT -p tcp ! -i lo -m multiport --dports 0:79,81:65535 -m
state --state NEW -j DROP

Unfortunately, in this configuration, none of the ports get blocks.

This implies that after an ACCEPT, further rules are not matched. Is
this a bug or intended by design?

If this is by design, how am I supposed to use modules like connlimit
with DROP policy.
By design. Once a packet is accepted, no more rules are processed. To do
otherwise would be akin to continuing to execute a program after an exit()
statement.

In a mathmetical sense, netfilter rules are not commutative. Nor are they
sorted into a most-specific to most-general order.

Rules are processed in the order in which they are added. Because you added a
rule that ACCEPTS all TCP packets before the rule that REJECTs certain TCP
packets, the prior rule always fires on TCP packets and the latter rule never
fires.

If you want to affect specific packets, you must add such rules before you add
the broader-reaching rules. Or you must insert such rules ahead of the broader
rules.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Ok, thanks everyone for the quick response!

Hope this help others too.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux