Your list generation is probably slowing down, trying to resolve the IPs 
to names.

Try "iptables -L -n" and see if that helps.

On Tue, 25 Jun 2002, Josep M. wrote:

> Hello.
> 
> I installed rh7.2 and iptables,I never used iptables before and I had done my script 
>for one machine only
> and when  i execute "iptables -L" is terrible slow,maybe one line per minute for 
>list all rules
> in a pII350 with 320RAM and more of 180 RAM free and only me as terminal user,no X 
>loaded!!
> 
> I would like know is this is usual,ipchains was very quickly listing rules!!
> 
> I have all packages updated till yesterday.
> 
> Josep
> 
> PS: this is the script,i planned add nat in some days,so is usual if You see 
>forwarding rules enabled.
> 
> 
> #
> ###!###/###bin/sh
> #
> # Falta SSL POP3S
> #
> #
> # Load the ip_tables module
> echo Loading ip_tables module.
> ###/sbin/modprobe ip_tables || exit 1 
> /sbin/depmod -a 
> /sbin/modprobe ip_tables 
> /sbin/modprobe ip_conntrack 
> /sbin/modprobe ipt_LOG 
> /sbin/modprobe ipt_REJECT 
> /sbin/modprobe ipt_MASQUERADE 
> /sbin/modprobe ip_nat_ftp 
> /sbin/modprobe ip_nat_irc 
> /sbin/modprobe ipt_owner 
> /sbin/modprobe ip_conntrack_ftp 
> /sbin/modprobe ip_conntrack_irc
> # I let the kernel dynamically load the other modules
> IPTABLES="/sbin/iptables"
> #Time to clean house
> #Clear out any existing firewall rules, and any chains that might have
> #been created
> $IPTABLES -F
> $IPTABLES -F INPUT
> $IPTABLES -F OUTPUT
> $IPTABLES -F FORWARD
> $IPTABLES -F -t mangle
> $IPTABLES -F -t nat
> $IPTABLES -X
> #Setup our policies
> $IPTABLES -P INPUT DROP
> $IPTABLES -P OUTPUT ACCEPT
> $IPTABLES -P FORWARD DROP
> #$IPTABLES -P FORWARD ACCEPT
> #This enables ip forwarding, and thus by extension, NAT
> #Turn this on if you're going to be doing NAT or Masquerading
> #echo 1 > /proc/sys/net/ipv4/ip_forward
> 
> #We use the limit commands to cap the rate at which it alerts to 15
> #log messages per minute
> $IPTABLES -N firewall
> $IPTABLES -A firewall -m limit --limit 15/minute -j LOG --log-prefix FIREWALL-BLOCK:
> $IPTABLES -A firewall -j DROP
> #Now, our dropwall chain, for the final catchall filter
> $IPTABLES -N dropwall
> $IPTABLES -A dropwall -m limit --limit 15/minute -j LOG --log-prefix FIREWALL-DROP:
> $IPTABLES -A dropwall -j DROP
> #Our "hey, them's some bad tcp flags!" chain
> $IPTABLES -N badflags
> $IPTABLES -A badflags -m limit --limit 15/minute -j LOG --log-prefix 
>FIREWALL-BADFLAGS:
> $IPTABLES -A badflags -j DROP
> #And our silent logging chain
> $IPTABLES -N silent
> $IPTABLES -A silent -j DROP
> # Create a table for watching some accepting rules
> $IPTABLES --new watch 2>/dev/null
> $IPTABLES -A watch -m limit --limit 1/second -j LOG --log-level warn --log-prefix 
>FIREWALL-ICMP-WATCH:
> $IPTABLES -A watch -j ACCEPT
> #Accept ourselves (loopback interface), 'cause we're all warm and friendly
> $IPTABLES -A INPUT -i lo -j ACCEPT
> ************ this example sucks. need to add rules to flush and clear chains first
> #
> # These rules block a number of reserved networks.
> # For example 10.* is used for non routable internal networks
> # For example 224.* and up is used for multi-cast
> # We use drop since these networks are not active and the response
> # will go nowhere
> #
> $IPTABLES -A INPUT -s 0.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 1.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 2.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 5.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 7.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 10.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 23.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 27.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 31.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 36.0.0.0/254.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 39.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 41.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 42.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 58.0.0.0/254.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 60.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 68.0.0.0/252.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 72.0.0.0/248.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 82.0.0.0/254.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 84.0.0.0/252.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 88.0.0.0/248.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 96.0.0.0/224.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 197.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 219.0.0.0/255.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 220.0.0.0/252.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> $IPTABLES -A INPUT -s 224.0.0.0/224.0.0.0 -d 0.0.0.0/0.0.0.0 -i eth0 -j DROP
> #
> ## Special chain KEEP_STATE to handle incoming, outgoing, and
> ## established connections.
> $IPTABLES -N KEEP_STATE
> $IPTABLES -F KEEP_STATE
> 
> ## DROP packets associated with an "INVALID" connection.
> $IPTABLES -A KEEP_STATE -m state --state INVALID -j DROP
> #
> #
> ## UNCLEAN match target, somewhat experimental at this point.
> #        $IPTABLES -A KEEP_STATE -m unclean -j DROP
> #
> # ACCEPT packets which are related to an established connection.
> $IPTABLES -A KEEP_STATE -m state --state RELATED,ESTABLISHED -j ACCEPT
> #
> #Closed Ports.We donīt want people from outside in our machine:)
> #
> #Samba use this ports.
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p tcp --dport 137:139 -j DROP
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p udp --dport 137:139 -j DROP
> 
> #Drop those nasty packets!
> #These are all TCP flag combinations that should never, ever occur in the
> #wild. All of these are illegal combinations that are used to attack a box
> #in various ways, so we just drop them and log them here.
> $IPTABLES -A INPUT -p tcp --tcp-flags ALL FIN,URG,PSH -j badflags
> $IPTABLES -A INPUT -p tcp --tcp-flags ALL ALL -j badflags
> $IPTABLES -A INPUT -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j badflags
> $IPTABLES -A INPUT -p tcp --tcp-flags ALL NONE -j badflags
> $IPTABLES -A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -j badflags
> $IPTABLES -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j badflags
> 
> #echo Enforcing up ICMP policies, use iptables -L ICMP to check.
> # If you deny all ICMP messages you head for trouble since it would
> # break lots of tcp/ip algorythm (acz)
> $IPTABLES --new ICMP 2>/dev/null
> $IPTABLES -A INPUT --proto icmp -j ICMP
> # This rule, suposedly, would log Ping of Death
> $IPTABLES -A INPUT -p icmp -f -j LOG --log-prefix "PINGOFD: "
> #ICMP Type 0  - Echo Reply
> $IPTABLES -A ICMP -p icmp --icmp-type 0                   -j ACCEPT
> #ICMP Type 3  - Destination Unreachable
> $IPTABLES -A ICMP -p icmp --icmp-type 3                   -j watch
> #ICMP Type 8  - Echo Request
> $IPTABLES -A ICMP -p icmp --icmp-type 8                   -j watch
> #ICMP Type 11 - Time Exceeded
> $IPTABLES -A ICMP -p icmp --icmp-type 11                  -j ACCEPT
> $IPTABLES -A ICMP -p icmp -j firewall
> 
> #Accept FTP connections from everywhere.
> #Uncomment this if you're running FTP Server and want to be able to 
> #access it from the outside world.
> #
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p tcp --dport 21 -j ACCEPT
>       
> #Accept SSH connections from everywhere.
> #Uncomment this if you're running SSH Server and want to be able to 
> #access it from the outside world.
> #
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p tcp --dport 22 -j ACCEPT
> #Accept Telnet connections from everywhere.
> #Uncomment this if you're running TelnetServer and want to be able to 
> #access it from the outside world.
> #
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p tcp --dport 23 -j ACCEPT
> 
> #Accept SMTP connections from everywhere.
> #Uncomment this if you're running SMTP Email Server and want to be able 
> #to access it from the outside world.
> #
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p tcp --dport 25 -j ACCEPT
> #Accept POP3 connections from everywhere.
> #Uncomment this if you're running POP3 Email Server and want to be able 
> #to access it from the outside world.
> #
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p tcp --dport 110 -j ACCEPT
> #Accept DNS connections from everywhere.
> #Uncomment this if you're running DNS and want to be able to access it
> #from the outside world.
> #
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p tcp --dport 53 -j ACCEPT
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p udp --dport 53 -j ACCEPT
> #Accept Web connections from everywhere.
> #Uncomment this if you're running Web Server and want to be able 
> #to access it from the outside world.
> #
> $IPTABLES -A INPUT -i eth0 -d 0/0 -p tcp --dport 80 -j ACCEPT
> 
> ## AUTH server 
> # Reject ident probes with a tcp reset.I need to do this for a broken mailhost
> # that won't accept my mail if I just drop its ident probe. 
> #$IPTABLES  -A INPUT -i eth0 -p tcp --dport 113 -j REJECT --reject-with tcp-reset 
> 
> #Uncomment to drop port 137 netbios packets silently. We don't like
> #that netbios stuff, and it's way too spammy with windows machines on
> #the network.
> #
> #$IPTABLES -A INPUT -i eth0 -p udp --sport 137 --dport 137 -j silent
> # Now we block all incoming traffic to ports between 1 and 59999. For your system
> # to behave it is suggested you modify ip_local_port_range in /proc
> #
> $IPTABLES -A INPUT -s 0/0 -d 0/0 -i eth0 -p tcp -m tcp --dport 1:59999 -j REJECT
> $IPTABLES -A INPUT -s 0/0 -d 0/0 -i eth0 -p udp -m udp --dport 1:59999 -j REJECT
> #
> 
> #Our final trap. Everything on INPUT goes to the dropwall so we don't get silent 
>drops
> $IPTABLES -A INPUT -j dropwall
> 
> 
> # Disable IP spoofing attacks.
> #
> # This drops traffic addressed for one network though it is being received on a
> # different interface.
> #
> echo "  - Disabling IP Spoofing attacks."
> for file in /proc/sys/net/ipv4/conf/*/rp_filter
> do
>  echo "2" > $file
> done
> # Comment the following out of you are not using a dynamic address
> #
> echo "  - Enabling dynamic TCP/IP address hacking."
> echo "1" > /proc/sys/net/ipv4/ip_dynaddr
> 
> # Enable TCP SYN Cookie protection:
> # 
> echo "  - Enable TCP SYN Cookie protection"
> echo "1" > /proc/sys/net/ipv4/tcp_syncookies
> # Ensure that various ICMP sanity settings are there
> # 
> echo "  - Enable ICMP sanity settings"
>  
> # Disable ICMP broadcast echo protection
> echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
>  
> # Enable bad error message protection
> echo "1" > /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses
>  
> # Disable ICMP Re-directs
> for file in /proc/sys/net/ipv4/conf/*/accept_redirects; do  
>   echo "0" > $file
> done
> # 
>  
> 
> 
> 
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
> 



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to