1
0

iptables.up.rules.stateless 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. # Well known ports 0:1023
  2. # Registered ports 1024:49151
  3. # Goldielocks zone 32768:65535
  4. # Dynamic/Private 49152:65535
  5. # Disables connection tracking in the raw table.
  6. *raw
  7. -A PREROUTING -j NOTRACK
  8. -A OUTPUT -j NOTRACK
  9. COMMIT
  10. *filter
  11. :INPUT ACCEPT [0:0]
  12. :FORWARD ACCEPT [0:0]
  13. :OUTPUT ACCEPT [0:0]
  14. :clutter - [0:0]
  15. # Local loopback
  16. -A INPUT ! -i lo -d 127.0.0.0/8 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped 127.0.0.0/8, from non localhost: " --log-level 7
  17. -A INPUT ! -i lo -d 127.0.0.0/8 -j DROP
  18. -A INPUT -i lo -j ACCEPT
  19. -A OUTPUT -o lo -j ACCEPT
  20. # Local docker
  21. #-A OUTPUT ! -o eth0 -s 172.18.0.0/13 -d 172.18.0.0/13 -j ACCEPT -m comment --comment "Internal docker"
  22. #-A FORWARD ! -o eth0 ! -i eth0 -s 172.18.0.1/13 -d 172.18.0.1/13 -j ACCEPT -m comment --comment "Internal docker"
  23. # ICMP: Ping
  24. -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
  25. -A INPUT -d 185.87.185.45 -p icmp -m icmp --icmp-type 0 -j ACCEPT
  26. -A OUTPUT -p icmp -j ACCEPT
  27. -A INPUT -d 185.87.185.45 -p icmp -j ACCEPT
  28. # SSH
  29. -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set --name SSH --mask 255.255.255.255 --rsource
  30. -A INPUT -p tcp -m tcp --dport 22 -m limit --limit 5/min -m recent --rcheck --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j LOG --log-prefix "iptalbes dropped SSH flood: "
  31. -A INPUT -p tcp -m tcp --dport 22 -m recent --update --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j DROP
  32. -A INPUT -s 86.83.121.29,185.66.250.42 -p tcp -m tcp --sport 1024:65535 --dport 22 -j ACCEPT
  33. #-A OUTPUT -p tcp -m tcp --dport 22 -j ACCEPT
  34. #-A FORWARD -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set --name SSH --mask 255.255.255.255 --rsource
  35. #-A FORWARD -p tcp -m tcp --dport 22 -m limit --limit 5/min -m recent --rcheck --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j LOG --log-prefix "iptalbes dropped SSH flood: "
  36. #-A FORWARD -p tcp -m tcp --dport 22 -m recent --update --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j DROP
  37. #-A FORWARD ! -o eth0 -d 172.18.0.0/13 -p tcp -m tcp --dport 22 -j ACCEPT
  38. # WHOIS
  39. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 43 -j ACCEPT
  40. # DNS
  41. -A INPUT -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT
  42. -A OUTPUT -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT
  43. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 53 -j ACCEPT
  44. # DHCP
  45. -A INPUT -i eth0 -d 255.255.255.255 -p udp -m udp --sport 67 --dport 68 -m limit --limit 5/min -j LOG --log-prefix "iptables allowed DHCP: " --log-level 7
  46. -A INPUT -i eth0 -d 255.255.255.255 -p udp -m udp --sport 67 --dport 68 -j ACCEPT
  47. -A OUTPUT -o eth0 -p udp -m udp --sport 68 --dport 67 -m limit --limit 5/min -j LOG --log-prefix "iptables allowed DHCP: " --log-level 7
  48. -A OUTPUT -o eth0 -p udp -m udp --sport 68 --dport 67 -j ACCEPT
  49. # HTTP & HTTPS
  50. #-A INPUT -p tcp -m tcp --dport 80 -m state --state NEW -m recent --set --name HTTP --rsource
  51. #-A INPUT -p tcp -m tcp --dport 80 -m recent --rcheck --seconds 10 --hitcount 20 --rttl --name HTTP --rsource -j LOG --log-prefix "iptables dropped HTTP flood: " --log-level 4
  52. #-A INPUT -p tcp -m tcp --dport 80 -m recent --update --seconds 10 --hitcount 20 --rttl --name HTTP --rsource -j DROP
  53. -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment "Tor Dir port"
  54. -A OUTPUT -d 45.79.136.0/24 -p tcp -m tcp --dport 80 -j REJECT -m comment --comment "WebIron complaint #YUL-135-74376"
  55. -A OUTPUT -p tcp -m tcp --dport 80 -j ACCEPT
  56. #-A INPUT -p tcp -m tcp --dport 443 -m state --state NEW -m recent --set --name HTTPS --rsource
  57. #-A INPUT -p tcp -m tcp --dport 443 -m recent --rcheck --seconds 10 --hitcount 20 --rttl --name HTTPS --rsource -j LOG --log-prefix "iptables dropped HTTPS flood: " --log-level 4
  58. #-A INPUT -p tcp -m tcp --dport 443 -m recent --update --seconds 10 --hitcount 20 --rttl --name HTTPS --rsource -j DROP
  59. -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment "Tor relay ORport"
  60. -A OUTPUT -p tcp -m tcp --dport 443 -j ACCEPT
  61. # NTP
  62. -A OUTPUT -p udp -m udp --dport 123 -j ACCEPT
  63. # IMAP
  64. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 143 -j ACCEPT
  65. # IMAPS
  66. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 993 -j ACCEPT
  67. # PIP
  68. #-A OUTPUT -d 185.31.17.223 -p tcp -m tcp --sport 32768:65535 --dport 443 -j ACCEPT -m comment --comment "pip"
  69. # SMTPS
  70. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 465 -j ACCEPT -m comment --comment "SMTP SSL/TLS"
  71. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 587 -j ACCEPT -m comment --comment "STARTTLS"
  72. # Socks5
  73. -A INPUT -s 86.83.121.29 -p tcp -m tcp --dport 1080 -j ACCEPT
  74. # OpenVPN
  75. -A INPUT -p udp -m udp --dport 1194 -j ACCEPT -m comment --comment "OpenVPN"
  76. -A INPUT -i tun0 -j ACCEPT
  77. -A OUTPUT -o tun0 -j ACCEPT
  78. -A INPUT -s 86.83.121.29 -j ACCEPT
  79. # XMPP
  80. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 5223 -j ACCEPT -m comment --comment "xmpps"
  81. -A OUTPUT -p udp -m udp --sport 32768:65535 --dport 1900 -j ACCEPT -m comment --comment "xmpp?"
  82. # Multicast DNS
  83. -A OUTPUT -p udp -m udp --sport 5353 --dport 5353 -j clutter
  84. -A OUTPUT -d 244.0.0.1 -j clutter -m comment --comment "Multicast DNS"
  85. -A INPUT -d 224.0.0.1 -j clutter -m comment --comment "Multicast DNS"
  86. # IRC
  87. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 6667 -j ACCEPT
  88. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 6697 -j ACCEPT -m comment --comment "ircs"
  89. # Privoxy
  90. -A INPUT -p tcp -m tcp --dport 8118 -j ACCEPT -m comment --comment "Privoxy"
  91. # Bitcoin
  92. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 8333 -j ACCEPT -m comment --comment "Bitcoin"
  93. # Tor
  94. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 8000 -j ACCEPT -m comment --comment "Tor"
  95. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 9001:9002 -j ACCEPT -m comment --comment "Tor"
  96. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 9030:9031 -j ACCEPT -m comment --comment "Tor"
  97. # OpenPGP HTTP Key servers
  98. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 11371 -j ACCEPT -m comment --comment "OpenPGP hkp HTTP key servers"
  99. # Torrents
  100. #-A OUTPUT -p udp -m udp --sport 51413 -j ACCEPT -m comment --comment "Torrents"
  101. #-A INPUT -p udp -m udp --dport 51413 -j ACCEPT -m comment --comment "Torrents"
  102. # Traceroute
  103. -A OUTPUT -p udp -m udp --sport 32768:65535 --dport 6881:33534 -j ACCEPT -m comment --comment "Traceroute"
  104. # Attacks, crawls, scans, etc
  105. -A INPUT -p icmp -j clutter
  106. -A INPUT -s 0.0.0.0 -d 255.255.255.255 -j clutter -m comment --comment "Broadcast messages"
  107. -A INPUT -p udp -m udp --dport 19 -j clutter -m comment --comment "Character generator, looping to echo = DDoS"
  108. -A INPUT -p tcp -m tcp --dport 23 -j clutter
  109. -A INPUT -p udp -m udp --dport 53 -j clutter
  110. -A INPUT -p udp -m udp --dport 111 -j clutter -m comment --comment "Probe/fingerprint Nix OS"
  111. -A INPUT -p tcp -m tcp --dport 445 -j clutter -m comment --comment "MS-DS active directory"
  112. -A INPUT -p tcp -m tcp --dport 2323 -j clutter -m comment --comment "3d-nfsd"
  113. -A INPUT -p udp -m udp --dport 5060 -j clutter
  114. -A INPUT -p tcp -m tcp --dport 3389 -j clutter -m comment --comment "MS terminal server RDP"
  115. #-A INPUT -d 255.255.255.255 -p tcp -m tcp --sport 67 --dport 68 -j clutter -m comment --comment "DHCP"
  116. #-A INPUT -m iprange --dst-range 185.66.250.254-185.66.250.255 -j clutter
  117. #-A INPUT -m mac --mac-source d4:ca:6d:74:87:0d -j clutter
  118. #-A INPUT -p udp -m udp --dport 3076 -j clutter -m comment --comment "orbix-config"
  119. # Default policy
  120. -A INPUT -p tcp ! --syn -j ACCEPT -m comment --comment "Allow already established incoming TCP connections"
  121. -A INPUT -p udp -j ACCEPT -m comment --comment "Allow all incoming UDP connections because we do not use connection tracking"
  122. -A OUTPUT -p tcp -m tcp --tcp-flags ACK,RST ACK,RST --dport 1024:65535 -j ACCEPT -m comment --comment "Allow egress tcp 1024<, as statefull checking is to expensive on a Tor exit node."
  123. #-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  124. #-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  125. # Log & drop
  126. -A INPUT -m limit --limit 5/min -j LOG --log-prefix "iptables dropped: " --log-level 7
  127. -A INPUT -j DROP
  128. -A FORWARD -m limit --limit 5/min -j LOG --log-prefix "iptables forward dropped: " --log-level 7
  129. -A FORWARD -j DROP
  130. #-A OUTPUT -m limit --limit 5/min -j LOG --log-prefix "iptables rejected: " --log-level 7
  131. #-A OUTPUT -j REJECT --reject-with icmp-port-unreachable
  132. -A OUTPUT -j ACCEPT
  133. -A clutter -m limit --limit 5/min -j LOG --log-prefix "iptables clutter dropped: " --log-level 7
  134. -A clutter -j DROP
  135. COMMIT