免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 999 | 回复: 0
打印 上一主题 下一主题

Basic Iptables - Debian/RedHat (转) [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2006-03-05 12:02 |只看该作者 |倒序浏览
如以前有人贴过就请删除吧!

http://www.howtoforge.com/linux_iptables_sarge




  1. The System
  2. Debian Sarge 3.1 Vanilla 2.6.12.4 kernel from mirrors.kernel.org iptables administration utility version 1.2.11-10




  3. Preparation
  4. This How-To is performed on a Debian Sarge 3.1 box, though the commands and syntax should work for any linux distro. Before you can configure iptables, you first must ensure that it has been compiled into the kernel, and that you have the proper userland utilities installed.


  5. You should have a config file from when the kernel was compiled. Grep'ing it for "CONFIG_IP_NF" should produce '=y' or '=m' for most of the lines/options. Here you see that "CONFIG_IP_NF_IPTABLES" was compiled as a kernel module.



  6. # cat /boot/config-2.4.30 | grep -i "CONFIG_IP_NF"

  7. CONFIG_IP_NF_CONNTRACK=m
  8. CONFIG_IP_NF_FTP=m
  9. CONFIG_IP_NF_AMANDA=m
  10. CONFIG_IP_NF_TFTP=m
  11. CONFIG_IP_NF_IRC=m
  12. CONFIG_IP_NF_QUEUE=m
  13. CONFIG_IP_NF_IPTABLES=m
  14. CONFIG_IP_NF_MATCH_LIMIT=m
  15. CONFIG_IP_NF_MATCH_MAC=m
  16. CONFIG_IP_NF_MATCH_PKTTYPE=m
  17. CONFIG_IP_NF_MATCH_MARK=m
  18. CONFIG_IP_NF_MATCH_MULTIPORT=m
  19. CONFIG_IP_NF_MATCH_TOS=m
  20. CONFIG_IP_NF_MATCH_RECENT=m
  21. CONFIG_IP_NF_MATCH_ECN=m
  22. CONFIG_IP_NF_MATCH_DSCP=m
  23. CONFIG_IP_NF_MATCH_AH_ESP=m
  24. CONFIG_IP_NF_MATCH_LENGTH=m
  25. CONFIG_IP_NF_MATCH_TTL=m
  26. CONFIG_IP_NF_MATCH_TCPMSS=m
  27. CONFIG_IP_NF_MATCH_HELPER=m
  28. CONFIG_IP_NF_MATCH_STATE=m
  29. CONFIG_IP_NF_MATCH_CONNTRACK=m
  30. CONFIG_IP_NF_MATCH_UNCLEAN=m
  31. CONFIG_IP_NF_MATCH_OWNER=m
  32. CONFIG_IP_NF_FILTER=m
  33. CONFIG_IP_NF_TARGET_REJECT=m
  34. CONFIG_IP_NF_TARGET_MIRROR=m
  35. CONFIG_IP_NF_NAT=m
  36. CONFIG_IP_NF_NAT_NEEDED=y
  37. CONFIG_IP_NF_TARGET_MASQUERADE=m
  38. CONFIG_IP_NF_TARGET_REDIRECT=m
  39. CONFIG_IP_NF_NAT_AMANDA=m
  40. CONFIG_IP_NF_NAT_SNMP_BASIC=m
  41. CONFIG_IP_NF_NAT_IRC=m
  42. CONFIG_IP_NF_NAT_FTP=m
  43. CONFIG_IP_NF_NAT_TFTP=m
  44. CONFIG_IP_NF_MANGLE=m
  45. CONFIG_IP_NF_TARGET_TOS=m
  46. CONFIG_IP_NF_TARGET_ECN=m
  47. CONFIG_IP_NF_TARGET_DSCP=m
  48. CONFIG_IP_NF_TARGET_MARK=m
  49. CONFIG_IP_NF_TARGET_LOG=m
  50. CONFIG_IP_NF_TARGET_ULOG=m
  51. CONFIG_IP_NF_TARGET_TCPMSS=m
  52. CONFIG_IP_NF_ARPTABLES=m
  53. CONFIG_IP_NF_ARPFILTER=m
  54. CONFIG_IP_NF_ARP_MANGLE=m
  55. CONFIG_IP_NF_COMPAT_IPCHAINS=m
  56. CONFIG_IP_NF_NAT_NEEDED=y
  57. CONFIG_IP_NF_COMPAT_IPFWADM=m
  58. CONFIG_IP_NF_NAT_NEEDED=y


  59. This isn't all that necessary, since you'll find out real quick whether iptables works or not once we try to add some rules.


  60. You can check whether you have the iptables administration utility installed by executing:

  61. # dpkg -l iptables
  62. iptables 1.2.11-10 Linux kernel 2.4+ iptables administration to

  63. ...or for rpm based distro:

  64. # rpm -qa | grep iptablesiptables-xxxxx

  65. ...or you can just see if the binary is there!

  66. # which iptables
  67. /sbin/iptables


  68. If the utility is missing you can install it like so:

  69. APT

  70. # apt-get update && apt-get install iptables

  71. RPM

  72. # rpm -Uvh iptables-xxxx.rpm
  73. Preparing ################################# [100%]




  74. The Main Files



  75. Debian
  76. /etc/init.d/iptables – INIT script to start|stop|restart the service (and save rulesets). This file is no longer default as of Sarge but you can still get it (I'll show you).
  77. /var/lib/iptables – Debian's home for the 'active' and 'inactive' iptables-save counter files (i.e. The saved rulesets). On RedHat you would find the saved rules in '/etc/sysconfig/iptables'.
  78. /var/lib/iptables/active – Active Counters (more on that later)
  79. /var/lib/iptables/inactive – Inactive Counters
  80. /sbin/iptables – The administration utility/binary.



  81. RedHat
  82. /etc/init.d/iptables – INIT script to start|stop|restart the service (and save rulesets).
  83. /etc/sysconfig/iptables – RedHat's file for the iptables-save counter files (i.e. The saved rulesets).
  84. /sbin/iptables – The administration utility/binary.



  85. A Little About IPTables

  86. To see what rulesets we currently have in place, execute:

  87. # iptables --list
  88. Chain INPUT (policy ACCEPT)
  89. target prot opt source destination

  90. Chain FORWARD (policy ACCEPT)
  91. target prot opt source destination

  92. Chain OUTPUT (policy ACCEPT)
  93. target prot opt source destination


  94. This is what you will see when there are no rule sets in place. Looking at this we see 3 'Chains'.




  95. INPUT - Holds rules for traffic directed at this server.
  96. FORWARD – Holds rules for traffic that will be forwarding on to an IP behind this server (i.e. If this box serves as a firewall for other servers).
  97. OUTPUT – Holds rules for traffic that is coming from this server out to the internet.


  98. Mainly we will be dealing with traffic directed at this server, and will be issuing rules for the INPUT Chain. When traffic passes through the kernel, it determines a “TARGET” based on whether the packet matches a rule or not. General targets are:




  99. ACCEPT – Traffic is accepted for delivery.
  100. REJECT – Traffic is rejected, sending a packet back to the sending host.
  101. DROP - The traffic is dropped. Nothing is sent back to the sending host.




  102. Configuring Rule Sets

  103. So, lets get down to it. Its important to note that the order in which rules are appended is very important. For example, if your first rule is to deny everything... then no matter what you specifically allow, it will be denied.


  104. Also to note is that nothing you do is saved on disk until you execute 'iptables-save' (or use the init script to save). All counters/rulesets are in memory. Once the server reboots, or you execute 'iptables --flush' everything you've worked on is gone. Personally I work out of a bash script file called 'iptables-rules.sh', which allows me to keep everything organized and commented. If I make a mistake, I have no worries if I just want to flush all the rules out, I just go right back to my bash script and start editing again, save it out and execute the script (this however will not run at startup... that will be covered in the next section).


  105. Its very important that if you are working on this server remotely through ssh, that you make every effort to not lock yourself out. Therefore, our first rule will be to ensure that no matter what, I can still access ssh from my IP address.



  106. # iptables -A INPUT -s 192.168.1.10 -d 10.1.15.1 -p tcp --dport 22 -j ACCEPT



  107. Lets break that down:

  108. -A => Tells iptables to 'append' this rule to the INPUT Chain
  109. -s => Source Address. This rule only pertains to traffic coming FROM this IP. Substitute with the IP address you are SSHing from.
  110. -d => Destination Address. This rule only pertains to traffic going TO this IP. Substitute with the IP of this server.
  111. -p => Protocol. Specifying traffic which is TCP.
  112. --dport => Destination Port. Specifying traffic which is for TCP Port 22 (SSH)
  113. -j => Jump. If everything in this rule matches then 'jump' to ACCEPT



  114. Next, we will want to use some standard rules for general network traffic. This goes a bit beyond the basic stuff, however iptables can determine the 'state' that a packet is in. This has to do with standard TCP communication. For example, the 3 way handshake between two hosts when transmitting data.




  115. NEW => Server1 connects to Server2 issuing a SYN (Synchronize) packet.
  116. RELATED => Server 2 receives the SYN packet, and then responds with a SYN-ACK (Synchronize Acknowledgment) packet.
  117. ESTABLISHED => Server 1 receives the SYN-ACK packet and then responds with the final ACK (Acknowledgment) packet.


  118. After this 3 way handshake is complete, the traffic is now ESTABLISHED. In order for this type of TCP communication, something similar to these three rules are necessary:



  119. # iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
  120. # iptables -A FORWARD -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
  121. # iptables -A OUTPUT -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
  122. The last rule obviously allows any traffic the leave the server.



  123. Now that we have our basics set in place, lets see what iptables lists for our rulesets:

  124. # iptables --list
  125. Chain INPUT (policy ACCEPT)
  126. target prot opt source destination

  127. ACCEPT tcp -- 192.168.1.10 10.1.15.1 tcp dpt:ssh
  128. ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED

  129. Chain FORWARD (policy ACCEPT)
  130. target prot opt source destination
  131. ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED

  132. Chain OUTPUT (policy ACCEPT)
  133. target prot opt source destination
  134. ACCEPT all -- anywhere anywhere state NEW,RELATED,ESTABLISHED


  135. From here you can add whatever rules you like. If your running a basic webserver, you'll probably need something similar to:


  136. INIVIDUAL REJECTS FIRST:

  137. -----------------------------------------------------------------------

  138. BAD GUYS (Block Source IP Address):
  139. # iptables -A INPUT -s 172.34.5.8 -j DROP

  140. NO SPAMMERS (notice the use of FQDN):
  141. # iptables -A INPUT -s mail.spammer.org -d 10.1.15.1 -p tcp --dport 25 -j REJECT

  142. -----------------------------------------------------------------------


  143. THEN OPEN IT UP:-----------------------------------------------------------------------

  144. MYSQL (Allow Remote Access To Particular IP):
  145. # iptables -A INPUT -s 172.50.3.45 -d 10.1.15.1 -p tcp --dport 3306 -j ACCEPT

  146. SSH:
  147. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 22 -j ACCEPT

  148. Sendmail/Postfix:
  149. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 25 -j ACCEPT

  150. FTP: (Notice how you can specify a range of ports 20-21)
  151. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 20:21 -j ACCEPT

  152. Passive FTP Ports Maybe: (Again, specifying ports 50000 through 50050 in one rule)
  153. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 50000:50050 -j ACCEPT

  154. HTTP/Apache
  155. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 80 -j ACCEPT

  156. SSL/Apache
  157. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 443 -j ACCEPT

  158. IMAP
  159. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 143 -j ACCEPT

  160. IMAPS
  161. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 993 -j ACCEPT

  162. POP3
  163. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 110 -j ACCEPT

  164. POP3S
  165. # iptables -A INPUT -d 10.1.15.1 -p tcp --dport 995 -j ACCEPT

  166. Any Traffic From Localhost:
  167. # iptables -A INPUT -d 10.1.15.1 -s 127.0.0.1 -j ACCEPT

  168. ICMP/Ping:
  169. # iptables -A INPUT -d 10.1.15.1 -p icmp -j ACCEPT-----------------------------------------------------------------------



  170. GLOBAL REJECTS LAST:

  171. -----------------------------------------------------------------------

  172. Reject everything else to that IP:

  173. # iptables -A INPUT -d 10.1.15.1 -j REJECT

  174. Or, reject everything else coming through to any IP:
  175. # iptables -A INPUT -j REJECT
  176. # iptables -A FORWARD -j REJECT-----------------------------------------------------------------------


  177. Notice the we do the global REJECT lines last! These must be last.




  178. Saving Rule Sets

  179. With the init scripts, saving rule sets is quite easy. Once you are happy with your config, just do one of the following:




  180. The Debian Way
  181. The old style init script is no longer in Sarge by default, but it is still around for legacy use. I believe the new way is to use ' /etc/network/if-up.d' and '/etc/network/if-down.d' for iptables scripts (but I don't like that).


  182. You can grab the legacy INIT script this way:

  183. # gunzip /usr/share/doc/iptables/examples/oldinitdscript.gz -c > /etc/init.d/iptables
  184. # chmod +x /etc/init.d/iptables
  185. # mkdir /var/lib/iptables
  186. # chmod 700 /var/lib/iptables
  187. Now that you have the script in place you can do the needful.




  188. Active Rules
  189. The Active rules are those loaded when starting iptables:

  190. # /etc/init.d/iptables save active
  191. Saving iptables ruleset: save "active" with counters.
  192. This saves your rules in /var/lib/iptables/active




  193. Inactive Rules
  194. You can also configure a second set of rules for when you stop iptables called 'inactive'. Iptables doesn't actually “stop”, it just flushes out the rule sets that are in place and then loads the 'inactive' rules.



  195. # /etc/init.d/iptables stop
  196. Loading iptables ruleset: load "inactive"

  197. Therefore, you can set your 'inactive' rules, and then save them with:

  198. # /etc/init.d/iptables save inactive
  199. Saving iptables ruleset: save "inactive" with counters.



  200. The RedHat Way
  201. The RedHat INIT script is very similar. You can use it to start and stop iptables, as well as save rule sets.


  202. To save your active rules execute the following:

  203. # /etc/init.d/iptables save
  204. This will save your rules to '/etc/sysconfig/iptables'.


  205. When you start iptables, the rules are read from '/etc/sysconfig/iptables':

  206. # /etc/init.d/iptables start
  207. Starting iptables [OK]

  208. And when you stop iptables, all rules are flushed:

  209. # /etc/init.d/iptables stop
  210. Stopping iptables [OK]




  211. Manual Save and Restore
  212. You can also manually use the iptables-save and iptables-restore utilities like so:




  213. Save the rules to a files
  214. # iptables-save > /root/iptables-save.out



  215. Restore the rules
  216. # iptables-restore -c /root/iptables-save.out
  217. The -c tells iptables-restore that this is file was created using iptables-save, which outputs the rules as “counters”.





  218. Conclusion
  219. And there you go, iptables at its very basic. The uses of iptables are too numerous to even start truly doing a howto on them. However, for basic security and understanding of IPTables, I hope this might have helped you. If there is anything I could add, please feel free to email me.


复制代码
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP