1
0

iptables.up.rules 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165
  1. # Well known ports 0:1023
  2. # Registered ports 1024:49151
  3. # Goldielocks zone 32768:65535
  4. # Dynamic/Private 49152:65535
  5. #
  6. # WAN 86.83.121.29
  7. # vps 185.66.250.42
  8. # tor-exit 185.87.185.45
  9. *filter
  10. :INPUT ACCEPT [0:0]
  11. :FORWARD ACCEPT [0:0]
  12. :OUTPUT ACCEPT [0:0]
  13. :clutter - [0:0]
  14. # Local loopback
  15. -A INPUT ! -i lo -d 127.0.0.0/8 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped 127.0.0.0/8, from non localhost: " --log-level 7
  16. -A INPUT ! -i lo -d 127.0.0.0/8 -j DROP
  17. -A INPUT -i lo -j ACCEPT
  18. -A OUTPUT -o lo -j ACCEPT
  19. # Active connections
  20. -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  21. -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
  22. # Ping
  23. -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
  24. # FTP
  25. #-A OUTPUT -p tcp -m tcp --dport 21 -j ACCEPT
  26. #-A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 49152:65535 -j ACCEPT
  27. # SSH
  28. -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set --name SSH --mask 255.255.255.255 --rsource
  29. -A INPUT -p tcp -m tcp --dport 22 -m limit --limit 5/min -m recent --rcheck --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j LOG --log-prefix "iptalbes dropped SSH flood: "
  30. -A INPUT -p tcp -m tcp --dport 22 -m recent --update --seconds 40 --hitcount 4 --rttl --name SSH --mask 255.255.255.255 --rsource -j DROP
  31. -A INPUT -p tcp -m tcp --sport 1024:65535 --dport 22 -j ACCEPT
  32. -A OUTPUT -p tcp -m tcp --dport 22 -j ACCEPT
  33. #SMTP(S)
  34. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 25 -j ACCEPT
  35. # WHOIS
  36. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 43 -j ACCEPT
  37. # DNS
  38. -A OUTPUT -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT
  39. # DHCP
  40. #-A INPUT -i eth0 -d 255.255.255.255 -p udp -m udp --sport 67 --dport 68 -m limit --limit 5/min -j LOG --log-prefix "iptables allowed DHCP: " --log-level 7
  41. #-A INPUT -i eth0 -d 255.255.255.255 -p udp -m udp --sport 67 --dport 68 -j ACCEPT
  42. #-A OUTPUT -o eth0 -p udp -m udp --sport 68 --dport 67 -m limit --limit 5/min -j LOG --log-prefix "iptables allowed DHCP: " --log-level 7
  43. #-A OUTPUT -o eth0 -p udp -m udp --sport 68 --dport 67 -j ACCEPT
  44. # HTTP & HTTPS
  45. -A INPUT -p tcp -m tcp --dport 80 -m state --state NEW -m recent --set --name HTTP --rsource
  46. -A INPUT -p tcp -m tcp --dport 80 -m recent --rcheck --seconds 30 --hitcount 20 --rttl --name HTTP --rsource -j LOG --log-prefix "iptables dropped HTTP flood: " --log-level 4
  47. -A INPUT -p tcp -m tcp --dport 80 -m recent --update --seconds 30 --hitcount 20 --rttl --name HTTP --rsource -j DROP
  48. -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -m comment --comment "Tor dir port"
  49. -A OUTPUT -p tcp -m tcp --dport 80 -j ACCEPT
  50. -A INPUT -p tcp -m tcp --dport 443 -m state --state NEW -m recent --set --name HTTPS --rsource
  51. -A INPUT -p tcp -m tcp --dport 443 -m recent --rcheck --seconds 30 --hitcount 20 --rttl --name HTTPS --rsource -j LOG --log-prefix "iptables dropped HTTPS flood: " --log-level 4
  52. -A INPUT -p tcp -m tcp --dport 443 -m recent --update --seconds 30 --hitcount 20 --rttl --name HTTPS --rsource -j DROP
  53. -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -m comment --comment "Tor OR port"
  54. -A OUTPUT -p tcp -m tcp --dport 443 -j ACCEPT
  55. # NTP
  56. -A OUTPUT -p udp -m udp --dport 123 -j ACCEPT
  57. # IMAPs
  58. #-A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 143 -j ACCEPT
  59. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 993 -j ACCEPT
  60. # PIP
  61. #-A OUTPUT -d 185.31.17.223 -p tcp -m tcp --sport 32768:65535 --dport 443 -j ACCEPT -m comment --comment "pip"
  62. # SMTPs
  63. #-A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 587 -j ACCEPT
  64. # Socks5
  65. #-A OUTPUT -p tcp -m tcp --sport 57448:65535 --dport 1080 -j ACCEPT
  66. # OpenVPN
  67. -A OUTPUT -p udp -m udp --dport 1194 -j ACCEPT -m comment --comment "OpenVPN"
  68. -A OUTPUT -d 224.0.0.252 -p udp -m udp --sport 5355 --dport 5355 -j ACCEPT -m comment --comment "OpenVPN"
  69. -A INPUT -d 224.0.0.252 -p udp -m udp --sport 5355 --dport 5355 -j ACCEPT -m comment --comment "OpenVPN"
  70. -A INPUT -d 224.0.0.1 -m pkttype --pkt-type multicast --protocol igmp -j ACCEPT -m comment --comment "OpenVPN"
  71. -A OUTPUT -d 224.0.0.22 --protocol igmp -j ACCEPT -m comment --comment "OpenVPN"
  72. -A INPUT -s 185.87.185.45 -p tcp -m tcp --sport 8118 --dport 57642
  73. # OpenVPN
  74. #-A OUTPUT -p udp -m udp --sport 32768:65535 --dport 1194 -j ACCEPT
  75. #-A OUTPUT ! -o enp3s0 -p tcp -m tcp --sport 32768:65535 --dport 1024:65535 -j ACCEPT -m comment --comment "OpenVPN tunnel"
  76. #-A OUTPUT ! -o enp3s0 -p tcp -m tcp --sport 443 --dport 4063:65535 -j ACCEPT
  77. # XMPP
  78. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 5223 -j ACCEPT -m comment --comment "xmpps"
  79. -A OUTPUT -p udp -m udp --sport 32768:65535 --dport 1900 -j ACCEPT -m comment --comment "xmpp?"
  80. # Multicast DNS
  81. -A OUTPUT -p udp -m udp --sport 5353 --dport 5353 -j clutter
  82. -A OUTPUT -d 244.0.0.1 -j clutter -m comment --comment "Multicast DNS"
  83. -A INPUT -d 224.0.0.1 -j clutter -m comment --comment "Multicast DNS"
  84. # IRC
  85. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 6667 -j ACCEPT
  86. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 6697 -j ACCEPT -m comment --comment "ircs"
  87. # Privoxy
  88. -A OUTPUT -p tcp -m tcp --dport 8118 -j ACCEPT -m comment --comment "Privoxy"
  89. # Bitcoin
  90. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 8333 -j ACCEPT -m comment --comment "Bitcoin"
  91. # MagnaVersum Gogs git SSH
  92. -A OUTPUT -d 138.201.205.221 -p tcp -m tcp --sport 32768:65535 --dport 10022 -j ACCEPT -m comment --comment "MagnaVersum Gogs git SSH"
  93. # OpenPGP HTTP Key servers
  94. -A OUTPUT -p tcp -m tcp --sport 32768:65535 --dport 11371 -j ACCEPT -m comment --comment "OpenPGP HTTP key servers"
  95. # Torrents
  96. -A OUTPUT -p udp -m udp --sport 51413 -j ACCEPT -m comment --comment "Torrents"
  97. -A OUTPUT -p tcp -m tcp --dport 51413 -j ACCEPT -m comment --comment "Torrents"
  98. -A OUTPUT -p tcp -m tcp --sport 51413 --dport 1024:65535 -j ACCEPT -m comment --comment "Torrents"
  99. -A INPUT -p udp -m udp --dport 51413 -j ACCEPT -m comment --comment "Torrents"
  100. -A INPUT -p tcp -m tcp --dport 51413 -j ACCEPT -m comment --comment "Torrents"
  101. # Traceroute
  102. -A OUTPUT -p udp -m udp --sport 32768:65535 --dport 6881:33534 -j ACCEPT -m comment --comment "Traceroute"
  103. # CloudFlare. Why see http://www.crimeflare.com/cfblock.html
  104. #-A INPUT -s 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped: " --log-level 7
  105. #-A INPUT -s 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -j DROP -m comment --comment "CloudFlare http://www.crimeflare.com/cfblock.html"
  106. #-A OUTPUT -d 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -m limit --limit 5/min -j LOG --log-prefix "iptables dropped: " --log-level 7
  107. #-A OUTPUT -d 103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,104.16.0.0/12,108.162.192.0/18,131.0.72.0/22,141.101.64.0/18,162.158.0.0/15,172.64.0.0/13,173.245.48.0/20,188.114.96.0/20,190.93.240.0/20,197.234.240.0/22,198.41.128.0/17,199.27.128.0/21 -j REJECT -m comment --comment "CloudFlare http://www.crimeflare.com/cfblock.html"
  108. # Attacks, crawls, scans, etc to clutter chain
  109. -A INPUT -p icmp -j clutter
  110. -A INPUT -s 0.0.0.0 -d 255.255.255.255 -j clutter -m comment --comment "Broadcast messages"
  111. -A INPUT -p udp -m udp --dport 19 -j clutter -m comment --comment "Character generator, looping to echo = DDoS"
  112. -A INPUT -p tcp -m tcp --dport 23 -j clutter
  113. -A INPUT -p udp -m udp --dport 53 -j clutter
  114. -A INPUT -p udp -m udp --dport 111 -j clutter -m comment --comment "Probe/fingerprint Nix OS"
  115. -A INPUT -p tcp -m tcp --dport 445 -j clutter -m comment --comment "MS-DS active directory"
  116. -A INPUT -p tcp -m tcp --dport 2323 -j clutter -m comment --comment "3d-nfsd"
  117. -A INPUT -p udp -m udp --dport 5060 -j clutter
  118. -A INPUT -p tcp -m tcp --dport 3389 -j clutter -m comment --comment "MS terminal server RDP"
  119. #-A INPUT -d 255.255.255.255 -p tcp -m tcp --sport 67 --dport 68 -j clutter -m comment --comment "DHCP"
  120. #-A INPUT -m iprange --dst-range 185.66.250.254-185.66.250.255 -j clutter
  121. #-A INPUT -m mac --mac-source d4:ca:6d:74:87:0d -j clutter
  122. #-A INPUT -p udp -m udp --dport 3076 -j clutter -m comment --comment "orbix-config"
  123. # Log & drop
  124. -A INPUT -m limit --limit 5/min -j LOG --log-prefix "iptables dropped: " --log-level 7
  125. -A INPUT -j DROP
  126. -A FORWARD -m limit --limit 5/min -j LOG --log-prefix "iptables dropped: " --log-level 7
  127. -A FORWARD -j DROP
  128. -A OUTPUT -m limit --limit 5/min -j LOG --log-prefix "iptables rejected: " --log-level 7
  129. -A OUTPUT -j REJECT --reject-with icmp-port-unreachable
  130. -A clutter -m limit --limit 5/min -j LOG --log-prefix "iptables clutter dropped: " --log-level 7
  131. -A clutter -j DROP
  132. COMMIT