Answer the question
In order to leave comments, you need to log in
Help setting up iptables
Please do not kick or downvote - I honestly smoked half the Internet before asking a question.
There is a VPS - CentOS under OpenVZ.
There is a simple iptables:
*filter
:FORWARD ACCEPT [0:0]
:INPUT DROP [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type any -j ACCEPT
-A INPUT -p udp -m udp --sport 53 -j ACCEPT
-A INPUT -p tcp -m tcp -m state --state ESTABLISHED,RELATED -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
COMMIT
IPTABLES_MODULES=""
> modprobe ip_conntrack
FATAL: Module ip_conntrack not found.
> modprobe ip_conntrack_ftp
FATAL: Module ip_conntrack_ftp not found.
> iptables -t filter -A INPUT -j LOG --log-prefix "DROP"
iptables: Unknown error 18446744073709551615
> wget http://ya.ru
Resolving ya.ru... 93.158.134.3, 93.158.134.203, 87.250.251.3, ...
Connecting to ya.ru|93.158.134.3|:80... failed: Connection timed out.
as well as passive FTP, and yum, etc. -A INPUT -p tcp -m tcp -m state --state ESTABLISHED,RELATED -j ACCEPT
and does not work, there are no ip_conntrack and ip_conntrack_ftp modules and they cannot be installed , because OpenVZ (?) see what exactly is dropping too. -A INPUT -p tcp -m tcp --tcp-flags SYN,ACK SYN -j ACCEPT
Does not help. Answer the question
In order to leave comments, you need to log in
Inside OpenVZ you cannot do modprobe. Ask the host to enable the modules you need.
do this:
view current rules: iptables -nL
# Keep state.
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
# http/https, smtp/smtps, pop3/pop3s, imap/imaps, ssh
$IPTABLES -A INPUT -p tcp -m multiport --dport 80,443,25,465,110,995,143,993,587,465,22 -j ACCEPT
# Loop device.
$IPTABLES -A INPUT -i lo -j ACCEPT
# Allow PING from remote hosts.
$IPTABLES -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
show the output of iptables -nL by the
way, there is also tcpdump - it helps a lot in debugging settings
In general, it seems to me that it worked out at random:
-A INPUT -p tcp -m tcp --tcp-flags ACK ACK -j ACCEPT
If someone understands, please tell me what I did, what it can threaten and what else needs to be added ?
The complete iptables now looks like this:
> /sbin/iptables -nL
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 255
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp state RELATED,ESTABLISHED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x10/0x10
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question