You are not logged in.

#1 2019-07-20 11:04:40

Kevin00
Member
Registered: 2019-07-20
Posts: 2

Killswitch rules ipsec+iptables

Hi, I need some help to set up iptables rules to kill outgoing connections that don't pass trough VPN (except dns that uses trusted servers).
I'm using ipsec and iptables, I have made this ruleset but it doesn't allow me to navigate, can you help me to find what I'm missing?

*filter

-P INPUT DROP
-P FORWARD DROP
-P OUTPUT DROP

# IPsec
-A INPUT -s 10.6.6.0/32 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -d 10.6.6.0/32 -j ACCEPT

# local interface
-A INPUT -i lo -j ACCEPT
-A OUTPUT -o lo -j ACCEPT
-A INPUT -s 127.0.0.0/8 -i lo -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -d 127.0.0.0/8 -o lo -j ACCEPT

# LAN
-A INPUT -s 192.168.1.0/24 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -d 192.168.1.0/24 -j ACCEPT

# DNS
-A OUTPUT -d 103.86.96.100/32 -o lo -p udp -m udp --dport 53 -j ACCEPT
-A OUTPUT -d 103.86.99.100/32 -o lo -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -s 103.86.96.100/32 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -d 103.86.96.100/32 -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -s 103.86.99.100/32 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -d 103.86.99.100/32 -p udp -m udp --dport 53 -j ACCEPT

# VPN IP OUT
-A INPUT -s 136.11.122.124 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -d 136.11.122.124 -j ACCEPT
-A INPUT -s 136.11.122.123 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -d 136.11.122.123 -j ACCEPT

COMMIT

where 10.6.6.0/32 is the net created by ipsec and 136.11.122.124 and 136.11.122.123 are the two IP addresses where I come out on net.

I can ping and resolve names but I can't navigate.

Last edited by Kevin00 (2019-07-20 11:05:07)

Offline

#2 2019-07-25 18:09:26

Kevin00
Member
Registered: 2019-07-20
Posts: 2

Re: Killswitch rules ipsec+iptables

Anyone expert of iptables and ipsec can help me?

Offline

Board footer

Powered by FluxBB