1
0

iptables.up.rules.statefull 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155
  1. # Well known ports 0:1023
  2. # Registered ports 1024:49151
  3. # Goldielocks zone 32768:65535
  4. # Dynamic/Private 49152:65535
  5. #
  6. *filter
  7. :INPUT ACCEPT [0:0]
  8. :FORWARD ACCEPT [0:0]
  9. :OUTPUT ACCEPT [0:0]
  10. :clutter - [0:0]
  11. # Local loopback
  12. -A INPUT ! -i lo -d 127.0.0.0/8 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped 127.0.0.0/8, from non localhost: " --log-level 7
  13. -A INPUT ! -i lo -d 127.0.0.0/8 -j DROP
  14. -A INPUT -i lo -j ACCEPT
  15. -A OUTPUT -o lo -j ACCEPT
  16. # Local docker
  17. #-A OUTPUT ! -o eth0 -s 172.18.0.0/13 -d 172.18.0.0/13 -j ACCEPT -m comment --comment "Internal docker"
  18. #-A FORWARD ! -o eth0 ! -i eth0 -s 172.18.0.1/13 -d 172.18.0.1/13 -j ACCEPT -m comment --comment "Internal docker"
  19. # ICMP: Ping
  20. -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
  21. # FTP
  22. #-A OUTPUT -p tcp -m tcp --dport 21 -j ACCEPT
  23. #-A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 49152:65535 -j ACCEPT
  24. # SSH
  25. -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set --name SSH --mask 255.255.255.255 --rsource
  26. -A INPUT -p tcp -m tcp --dport 22 -m limit --limit 5/min -m recent --rcheck --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j LOG --log-prefix "iptalbes dropped SSH flood: "
  27. -A INPUT -p tcp -m tcp --dport 22 -m recent --update --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j DROP
  28. -A INPUT -s 86.83.121.29,185.66.250.42 -p tcp -m tcp --sport 1024:65535 --dport 22 -j ACCEPT
  29. #-A OUTPUT -p tcp -m tcp --dport 22 -j ACCEPT
  30. #-A FORWARD -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set --name SSH --mask 255.255.255.255 --rsource
  31. #-A FORWARD -p tcp -m tcp --dport 22 -m limit --limit 5/min -m recent --rcheck --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j LOG --log-prefix "iptalbes dropped SSH flood: "
  32. #-A FORWARD -p tcp -m tcp --dport 22 -m recent --update --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j DROP
  33. #-A FORWARD ! -o eth0 -d 172.18.0.0/13 -p tcp -m tcp --dport 22 -j ACCEPT
  34. # SMTP
  35. #-A OUTPUT -p tcp -m tcp --dport 25 -j ACCEPT
  36. #-A INPUT -p tcp -m tcp --dport 25 -j ACCEPT
  37. # WHOIS
  38. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 43 -j ACCEPT
  39. # DNS
  40. -A OUTPUT -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT
  41. # DHCP
  42. -A INPUT -i eth0 -d 255.255.255.255 -p udp -m udp --sport 67 --dport 68 -m limit --limit 5/min -j LOG --log-prefix "iptables allowed DHCP: " --log-level 7
  43. -A INPUT -i eth0 -d 255.255.255.255 -p udp -m udp --sport 67 --dport 68 -j ACCEPT
  44. -A OUTPUT -o eth0 -p udp -m udp --sport 68 --dport 67 -m limit --limit 5/min -j LOG --log-prefix "iptables allowed DHCP: " --log-level 7
  45. -A OUTPUT -o eth0 -p udp -m udp --sport 68 --dport 67 -j ACCEPT
  46. # HTTP & HTTPS
  47. #-A INPUT -p tcp -m tcp --dport 80 -m state --state NEW -m recent --set --name HTTP --rsource
  48. #-A INPUT -p tcp -m tcp --dport 80 -m recent --rcheck --seconds 10 --hitcount 20 --rttl --name HTTP --rsource -j LOG --log-prefix "iptables dropped HTTP flood: " --log-level 4
  49. #-A INPUT -p tcp -m tcp --dport 80 -m recent --update --seconds 10 --hitcount 20 --rttl --name HTTP --rsource -j DROP
  50. -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment "Tor Dir port"
  51. -A OUTPUT -p tcp -m tcp --dport 80 -j ACCEPT
  52. #-A INPUT -p tcp -m tcp --dport 443 -m state --state NEW -m recent --set --name HTTPS --rsource
  53. #-A INPUT -p tcp -m tcp --dport 443 -m recent --rcheck --seconds 10 --hitcount 20 --rttl --name HTTPS --rsource -j LOG --log-prefix "iptables dropped HTTPS flood: " --log-level 4
  54. #-A INPUT -p tcp -m tcp --dport 443 -m recent --update --seconds 10 --hitcount 20 --rttl --name HTTPS --rsource -j DROP
  55. -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment "Tor relay ORport"
  56. -A OUTPUT -p tcp -m tcp --dport 443 -j ACCEPT
  57. # NTP
  58. -A OUTPUT -p udp -m udp --dport 123 -j ACCEPT
  59. # IMAP
  60. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 143 -j ACCEPT
  61. # IMAPS
  62. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 993 -j ACCEPT
  63. # PIP
  64. #-A OUTPUT -d 185.31.17.223 -p tcp -m tcp --sport 32768:65535 --dport 443 -j ACCEPT -m comment --comment "pip"
  65. # SMTPS
  66. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 465 -j ACCEPT -m comment --comment "SMTP SSL/TLS"
  67. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 587 -j ACCEPT -m comment --comment "STARTTLS"
  68. # XMPP
  69. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 5223 -j ACCEPT -m comment --comment "xmpps"
  70. -A OUTPUT -p udp -m udp --sport 32768:65535 --dport 1900 -j ACCEPT -m comment --comment "xmpp?"
  71. # Multicast DNS
  72. -A OUTPUT -p udp -m udp --sport 5353 --dport 5353 -j clutter
  73. -A OUTPUT -d 244.0.0.1 -j clutter -m comment --comment "Multicast DNS"
  74. -A INPUT -d 224.0.0.1 -j clutter -m comment --comment "Multicast DNS"
  75. # IRC
  76. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 6667 -j ACCEPT
  77. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 6697 -j ACCEPT -m comment --comment "ircs"
  78. # Bitcoin
  79. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 8333 -j ACCEPT -m comment --comment "Bitcoin"
  80. # Tor
  81. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 8000 -j ACCEPT -m comment --comment "Tor"
  82. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 9001:9002 -j ACCEPT -m comment --comment "Tor"
  83. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 9030:9031 -j ACCEPT -m comment --comment "Tor"
  84. # OpenPGP HTTP Key servers
  85. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 11371 -j ACCEPT -m comment --comment "OpenPGP hkp HTTP key servers"
  86. # Torrents
  87. #-A OUTPUT -p udp -m udp --sport 51413 -j ACCEPT -m comment --comment "Torrents"
  88. #-A INPUT -p udp -m udp --dport 51413 -j ACCEPT -m comment --comment "Torrents"
  89. # Traceroute
  90. -A OUTPUT -p udp -m udp --sport 32768:65535 --dport 6881:33534 -j ACCEPT -m comment --comment "Traceroute"
  91. # CloudFlare. Why see http://www.crimeflare.com/cfblock.html
  92. #-A INPUT -s 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped cloudflare: " --log-level 7
  93. #-A INPUT -s 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -j DROP -m comment --comment "CloudFlare http://www.crimeflare.com/cfblock.html"
  94. #-A OUTPUT -d 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped cloudflare: " --log-level 7
  95. #-A OUTPUT -d 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -j REJECT -m comment --comment "CloudFlare http://www.crimeflare.com/cfblock.html"
  96. # Attacks, crawls, scans, etc
  97. -A INPUT -p icmp -j clutter
  98. -A INPUT -s 0.0.0.0 -d 255.255.255.255 -j clutter -m comment --comment "Broadcast messages"
  99. -A INPUT -p udp -m udp --dport 19 -j clutter -m comment --comment "Character generator, looping to echo = DDoS"
  100. -A INPUT -p tcp -m tcp --dport 23 -j clutter
  101. -A INPUT -p udp -m udp --dport 53 -j clutter
  102. -A INPUT -p udp -m udp --dport 111 -j clutter -m comment --comment "Probe/fingerprint Nix OS"
  103. -A INPUT -p tcp -m tcp --dport 445 -j clutter -m comment --comment "MS-DS active directory"
  104. -A INPUT -p tcp -m tcp --dport 2323 -j clutter -m comment --comment "3d-nfsd"
  105. -A INPUT -p udp -m udp --dport 5060 -j clutter
  106. -A INPUT -p tcp -m tcp --dport 3389 -j clutter -m comment --comment "MS terminal server RDP"
  107. #-A INPUT -d 255.255.255.255 -p tcp -m tcp --sport 67 --dport 68 -j clutter -m comment --comment "DHCP"
  108. #-A INPUT -m iprange --dst-range 185.66.250.254-185.66.250.255 -j clutter
  109. #-A INPUT -m mac --mac-source d4:ca:6d:74:87:0d -j clutter
  110. #-A INPUT -p udp -m udp --dport 3076 -j clutter -m comment --comment "orbix-config"
  111. # Active connections
  112. -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  113. -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  114. # Log & drop
  115. -A INPUT -m limit --limit 5/min -j LOG --log-prefix "iptables dropped: " --log-level 7
  116. -A INPUT -j DROP
  117. -A FORWARD -m limit --limit 5/min -j LOG --log-prefix "iptables dropped: " --log-level 7
  118. -A FORWARD -j DROP
  119. -A OUTPUT -m limit --limit 5/min -j LOG --log-prefix "iptables rejected: " --log-level 7
  120. -A OUTPUT -j REJECT --reject-with icmp-port-unreachable
  121. -A clutter -m limit --limit 5/min -j LOG --log-prefix "iptables clutter dropped: " --log-level 7
  122. -A clutter -j DROP
  123. COMMIT