Re: Stateful firewalling for fun and profit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have some details and quibbles, Dax.

First there is no iptables DENY rule. This is now "DROP". From the
netfilter web site: "The DENY target is now DROP, finally." This
rule simply drops the packet on the floor and does nothing at all
with it.

Second, more amplification of the above from the netfilter web site
regarding REJECT, now an optional module:
> REJECT
> This module has the same effect as `DROP', except that the sender
> is sent an ICMP `port unreachable' error message. Note that the
> ICMP error message is not sent if (see RFC 1122):
> 
> * The packet being filtered was an ICMP error message in the first
>   place, or some unknown ICMP type. 
> * The packet being filtered was a non-head fragment. 
> * We've sent too many ICMP error messages to that destination
>   recently (see /proc/sys/net/ipv4/icmp_ratelimit). 
> 
> REJECT also takes a `--reject-with' optional argument which alters
> the reply packet used: see the manual page."

This may be the root of the misunderstanding about this issue.
(It MAY be that bowing to pressure from the cromagnon community
DENY may be a valid synonym for DROP. DROP is, however, the
proper symantics.)

{^_^}

----- Original Message ----- 
From: "Dax Kelson" <dax@gurulabs.com>

> IMO, the following stateful rules work well and simplify things a great
> deal when using a default DENY policy.
> 
> iptables -P INPUT DENY
> iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

....



-- 
Psyche-list mailing list
Psyche-list@redhat.com
https://listman.redhat.com/mailman/listinfo/psyche-list

[Index of Archives]     [Fedora General Discussion]     [Red Hat General Discussion]     [Centos]     [Kernel]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat 9]     [Gimp]     [Yosemite News]

  Powered by Linux