iptables.up.rules.stateless 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180
  1. # Well known ports 0:1023
  2. # Registered ports 1024:49151
  3. # Goldielocks zone 32768:65535
  4. # Dynamic/Private 49152:65535
  5. # Disables connection tracking in the raw table.
  6. *raw
  7. -A PREROUTING -j NOTRACK
  8. -A OUTPUT -j NOTRACK
  9. COMMIT
  10. *filter
  11. :INPUT ACCEPT [0:0]
  12. :FORWARD ACCEPT [0:0]
  13. :OUTPUT ACCEPT [0:0]
  14. :clutter - [0:0]
  15. # Local loopback
  16. -A INPUT ! -i lo -d 127.0.0.0/8 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped 127.0.0.0/8, from non localhost: " --log-level 7
  17. -A INPUT ! -i lo -d 127.0.0.0/8 -j DROP
  18. -A INPUT -i lo -j ACCEPT
  19. -A OUTPUT -o lo -j ACCEPT
  20. # Local docker
  21. #-A OUTPUT ! -o eth0 -s 172.18.0.0/13 -d 172.18.0.0/13 -j ACCEPT -m comment --comment "Internal docker"
  22. #-A FORWARD ! -o eth0 ! -i eth0 -s 172.18.0.1/13 -d 172.18.0.1/13 -j ACCEPT -m comment --comment "Internal docker"
  23. # ICMP: Ping
  24. -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
  25. -A INPUT -d 185.87.185.45 -p icmp -m icmp --icmp-type 0 -j ACCEPT
  26. -A OUTPUT -p icmp -j ACCEPT
  27. -A INPUT -d 185.87.185.45 -p icmp -j ACCEPT
  28. # FTP
  29. #-A OUTPUT -p tcp -m tcp --dport 21 -j ACCEPT
  30. #-A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 49152:65535 -j ACCEPT
  31. # SSH
  32. -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set --name SSH --mask 255.255.255.255 --rsource
  33. -A INPUT -p tcp -m tcp --dport 22 -m limit --limit 5/min -m recent --rcheck --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j LOG --log-prefix "iptalbes dropped SSH flood: "
  34. -A INPUT -p tcp -m tcp --dport 22 -m recent --update --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j DROP
  35. -A INPUT -s 86.83.121.29,185.66.250.42 -p tcp -m tcp --sport 1024:65535 --dport 22 -j ACCEPT
  36. #-A OUTPUT -p tcp -m tcp --dport 22 -j ACCEPT
  37. #-A FORWARD -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set --name SSH --mask 255.255.255.255 --rsource
  38. #-A FORWARD -p tcp -m tcp --dport 22 -m limit --limit 5/min -m recent --rcheck --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j LOG --log-prefix "iptalbes dropped SSH flood: "
  39. #-A FORWARD -p tcp -m tcp --dport 22 -m recent --update --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j DROP
  40. #-A FORWARD ! -o eth0 -d 172.18.0.0/13 -p tcp -m tcp --dport 22 -j ACCEPT
  41. # SMTP
  42. #-A OUTPUT -p tcp -m tcp --dport 25 -j ACCEPT
  43. #-A INPUT -p tcp -m tcp --dport 25 -j ACCEPT
  44. # WHOIS
  45. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 43 -j ACCEPT
  46. # DNS
  47. -A OUTPUT -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT
  48. # DHCP
  49. -A INPUT -i eth0 -d 255.255.255.255 -p udp -m udp --sport 67 --dport 68 -m limit --limit 5/min -j LOG --log-prefix "iptables allowed DHCP: " --log-level 7
  50. -A INPUT -i eth0 -d 255.255.255.255 -p udp -m udp --sport 67 --dport 68 -j ACCEPT
  51. -A OUTPUT -o eth0 -p udp -m udp --sport 68 --dport 67 -m limit --limit 5/min -j LOG --log-prefix "iptables allowed DHCP: " --log-level 7
  52. -A OUTPUT -o eth0 -p udp -m udp --sport 68 --dport 67 -j ACCEPT
  53. # HTTP & HTTPS
  54. #-A INPUT -p tcp -m tcp --dport 80 -m state --state NEW -m recent --set --name HTTP --rsource
  55. #-A INPUT -p tcp -m tcp --dport 80 -m recent --rcheck --seconds 10 --hitcount 20 --rttl --name HTTP --rsource -j LOG --log-prefix "iptables dropped HTTP flood: " --log-level 4
  56. #-A INPUT -p tcp -m tcp --dport 80 -m recent --update --seconds 10 --hitcount 20 --rttl --name HTTP --rsource -j DROP
  57. -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment "Tor Dir port"
  58. -A OUTPUT -d 45.79.136.0/24 -p tcp -m tcp --dport 80 -j REJECT -m comment --comment "WebIron complaint #YUL-135-74376"
  59. -A OUTPUT -p tcp -m tcp --dport 80 -j ACCEPT
  60. #-A INPUT -p tcp -m tcp --dport 443 -m state --state NEW -m recent --set --name HTTPS --rsource
  61. #-A INPUT -p tcp -m tcp --dport 443 -m recent --rcheck --seconds 10 --hitcount 20 --rttl --name HTTPS --rsource -j LOG --log-prefix "iptables dropped HTTPS flood: " --log-level 4
  62. #-A INPUT -p tcp -m tcp --dport 443 -m recent --update --seconds 10 --hitcount 20 --rttl --name HTTPS --rsource -j DROP
  63. -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment "Tor relay ORport"
  64. -A OUTPUT -p tcp -m tcp --dport 443 -j ACCEPT
  65. # NTP
  66. -A OUTPUT -p udp -m udp --dport 123 -j ACCEPT
  67. # IMAP
  68. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 143 -j ACCEPT
  69. # IMAPS
  70. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 993 -j ACCEPT
  71. # PIP
  72. #-A OUTPUT -d 185.31.17.223 -p tcp -m tcp --sport 32768:65535 --dport 443 -j ACCEPT -m comment --comment "pip"
  73. # SMTPS
  74. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 465 -j ACCEPT -m comment --comment "SMTP SSL/TLS"
  75. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 587 -j ACCEPT -m comment --comment "STARTTLS"
  76. # Socks5
  77. -A INPUT -s 86.83.121.29 -p tcp -m tcp --dport 1080 -j ACCEPT
  78. # OpenVPN
  79. -A INPUT -p udp -m udp --dport 1194 -j ACCEPT -m comment --comment "OpenVPN"
  80. -A INPUT -i tun0 -j ACCEPT
  81. -A OUTPUT -o tun0 -j ACCEPT
  82. -A INPUT -s 86.83.121.29 -j ACCEPT
  83. # XMPP
  84. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 5223 -j ACCEPT -m comment --comment "xmpps"
  85. -A OUTPUT -p udp -m udp --sport 32768:65535 --dport 1900 -j ACCEPT -m comment --comment "xmpp?"
  86. # Multicast DNS
  87. -A OUTPUT -p udp -m udp --sport 5353 --dport 5353 -j clutter
  88. -A OUTPUT -d 244.0.0.1 -j clutter -m comment --comment "Multicast DNS"
  89. -A INPUT -d 224.0.0.1 -j clutter -m comment --comment "Multicast DNS"
  90. # IRC
  91. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 6667 -j ACCEPT
  92. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 6697 -j ACCEPT -m comment --comment "ircs"
  93. # Privoxy
  94. -A INPUT -p tcp -m tcp --dport 8118 -j ACCEPT -m comment --comment "Privoxy"
  95. # Bitcoin
  96. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 8333 -j ACCEPT -m comment --comment "Bitcoin"
  97. # Tor
  98. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 8000 -j ACCEPT -m comment --comment "Tor"
  99. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 9001:9002 -j ACCEPT -m comment --comment "Tor"
  100. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 9030:9031 -j ACCEPT -m comment --comment "Tor"
  101. # OpenPGP HTTP Key servers
  102. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 11371 -j ACCEPT -m comment --comment "OpenPGP hkp HTTP key servers"
  103. # Torrents
  104. #-A OUTPUT -p udp -m udp --sport 51413 -j ACCEPT -m comment --comment "Torrents"
  105. #-A INPUT -p udp -m udp --dport 51413 -j ACCEPT -m comment --comment "Torrents"
  106. # Traceroute
  107. -A OUTPUT -p udp -m udp --sport 32768:65535 --dport 6881:33534 -j ACCEPT -m comment --comment "Traceroute"
  108. # CloudFlare. Why see http://www.crimeflare.com/cfblock.html
  109. #-A INPUT -s 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped cloudflare: " --log-level 7
  110. #-A INPUT -s 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -j DROP -m comment --comment "CloudFlare http://www.crimeflare.com/cfblock.html"
  111. #-A OUTPUT -d 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped cloudflare: " --log-level 7
  112. #-A OUTPUT -d 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -j REJECT -m comment --comment "CloudFlare http://www.crimeflare.com/cfblock.html"
  113. # Attacks, crawls, scans, etc
  114. -A INPUT -p icmp -j clutter
  115. -A INPUT -s 0.0.0.0 -d 255.255.255.255 -j clutter -m comment --comment "Broadcast messages"
  116. -A INPUT -p udp -m udp --dport 19 -j clutter -m comment --comment "Character generator, looping to echo = DDoS"
  117. -A INPUT -p tcp -m tcp --dport 23 -j clutter
  118. -A INPUT -p udp -m udp --dport 53 -j clutter
  119. -A INPUT -p udp -m udp --dport 111 -j clutter -m comment --comment "Probe/fingerprint Nix OS"
  120. -A INPUT -p tcp -m tcp --dport 445 -j clutter -m comment --comment "MS-DS active directory"
  121. -A INPUT -p tcp -m tcp --dport 2323 -j clutter -m comment --comment "3d-nfsd"
  122. -A INPUT -p udp -m udp --dport 5060 -j clutter
  123. -A INPUT -p tcp -m tcp --dport 3389 -j clutter -m comment --comment "MS terminal server RDP"
  124. #-A INPUT -d 255.255.255.255 -p tcp -m tcp --sport 67 --dport 68 -j clutter -m comment --comment "DHCP"
  125. #-A INPUT -m iprange --dst-range 185.66.250.254-185.66.250.255 -j clutter
  126. #-A INPUT -m mac --mac-source d4:ca:6d:74:87:0d -j clutter
  127. #-A INPUT -p udp -m udp --dport 3076 -j clutter -m comment --comment "orbix-config"
  128. # Default policy
  129. -A INPUT -p tcp ! --syn -j ACCEPT -m comment --comment "Allow already established incoming TCP connections"
  130. -A INPUT -p udp -j ACCEPT -m comment --comment "Allow all incoming UDP connections because we do not use connection tracking"
  131. -A OUTPUT -p tcp -m tcp --tcp-flags ACK,RST ACK,RST --dport 1024:65535 -j ACCEPT -m comment --comment "Allow egress tcp 1024<, as statefull checking is to expensive on a Tor exit node."
  132. #-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  133. #-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  134. # Log & drop
  135. -A INPUT -m limit --limit 5/min -j LOG --log-prefix "iptables dropped: " --log-level 7
  136. -A INPUT -j DROP
  137. -A FORWARD -m limit --limit 5/min -j LOG --log-prefix "iptables forward dropped: " --log-level 7
  138. -A FORWARD -j DROP
  139. #-A OUTPUT -m limit --limit 5/min -j LOG --log-prefix "iptables rejected: " --log-level 7
  140. #-A OUTPUT -j REJECT --reject-with icmp-port-unreachable
  141. -A OUTPUT -j ACCEPT
  142. -A clutter -m limit --limit 5/min -j LOG --log-prefix "iptables clutter dropped: " --log-level 7
  143. -A clutter -j DROP
  144. COMMIT