Hello,

Pol Hallen a écrit :
> 
> This is my full iptables config:
> 
> iptables -F
> iptables -t nat -F
> iptables -t mangle -F
> iptables -X

OK.

> iptables -P OUTPUT ACCEPT

Should be DROP as well.

> iptables -P FORWARD DROP
> iptables -P INPUT DROP

OK.

> iptables -A INPUT -f -j DROP

Useless. IPv4 connection tracking (needed by the 'state' match)
reassembles packets so iptables won't see any fragments.

> iptables -A INPUT -m state --state INVALID -j DROP

Useless if policy is already DROP and further rules accept only state
NEW, ESTABLISHED or RELATED.

> iptables -A OUTPUT -f -j DROP

See above.

> iptables -A OUTPUT -m state --state INVALID -j DROP

See above.

> iptables -A INPUT -i lo -j ACCEPT

OK.

> iptables -A OUTPUT -o lo -j ACCEPT

Useless if policy is left to ACCEPT.

> iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

OK.

> iptables -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT

Useless if policy is left to ACCEPT.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51d02d80.7020...@plouf.fr.eu.org

Reply via email to