You are not logged in.
I've tried to configure a firewall with iptables following the wiki and I want to make sure that I don't miss any thing or broke anything.
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
132K 165M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
1 60 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 (*especially this rule*)
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 8 ctstate NEW
107 13873 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-proto-unreachable
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 78895 packets, 13M bytes)
pkts bytes target prot opt in out source destination
Am i doin it rit? Is loopback necessary?
Last edited by Gulver (2013-12-02 05:26:59)
Offline
I've tried to configure a firewall with iptables following the wiki and I want to make sure that I don't miss any thing or broke anything.
You haven't broken anything here!
What I mean is, only you can tell if you've broken something.
Am i doin it rit?
That depends on your goals - if your goal was to block all new connections except ping's then yes, you're spot on.
Is loopback necessary?
Yes.
Are you familiar with our Forum Rules, and How To Ask Questions The Smart Way?
BlueHackers // fscanary // resticctl
Offline
Thank you for attention, may I ask further, considering I do not open any ports am I in the safe side now? Would you suggest something else to go with iptables to lurk interwebs?
Last edited by Gulver (2013-11-27 22:22:16)
Offline