[Users] Re: ipt_recent Problems - SOLVED!

Adem for-gmane at alicewho.com
Fri Nov 21 11:52:33 EST 2008


"Adem" wrote:
>
> I've problems loading the iptables module "ipt_recent".
> I've specified it in /etc/vz/vz.conf:
>
> IPTABLES="ip_tables  ipt_recent  ipt_REJECT ipt_tos ipt_limit ipt_multiport iptable_filter iptable_mangle ipt_TCPMSS ipt_tcpmss
> ipt_ttl ipt_length ip_conntrack ip_conntrack_ftp ip_conntrack_irc ipt_LOG ipt_conntrack ipt_helper ipt_state iptable_nat
ip_nat_ftp
> ip_nat_irc ipt_TOS"
>
> but when creating a VE, vzctl gives the following warning:
> "Warning: Unknown iptable module: ipt_recent, skipped"
>
> find / -name "*recent*" -ls gives the following files:
>
>   6114   14 -rw-r--r--   1 root     root        13262 May 19  2008
> /lib/modules/2.6.24-6-fza-686/kernel/net/ipv4/netfilter/ipt_recent.ko
>  30312   12 -rw-r--r--   1 root     root        12072 Oct  9 22:03
/lib/modules/2.6.18-6-k7/kernel/net/ipv4/netfilter/ipt_recent.ko
>  60731   14 -rw-r--r--   1 root     root        12747 Oct  9 22:08
/lib/modules/2.6.26-1-686/kernel/net/ipv4/netfilter/ipt_recent.ko
>  28384    8 -rw-r--r--   1 root     root         7616 Aug 25 02:24 /lib/xtables/libipt_recent.so
>   4170    0 drwxr-xr-x   6 root     root            0 Nov 21 14:29 /sys/module/ipt_recent
> 4026532083    0 dr-xr-xr-x   2 root     root            0 Nov 21 14:33 /proc/net/ipt_recent
>
> I'm using the "2.6.24-6-fza-686" kernel on Debian.
> How can I load the ipt_recent module so that it can be used in the VE ?

SOLVED!
The solution is: DO NOT SPECIFY "ipt_recent" in the IPTABLES line of /etc/vz/vz.conf !  :-)

Now my following firewall script is working fine in the guest OS:

#!/bin/sh

### ipt_0.sh
###
### my sample iptables firewall settings
### incl. a simple protection mechanism against brute-force hack attacks on the SSH port

echo 0 > /proc/sys/net/ipv4/ip_forward

/sbin/iptables -F
/sbin/iptables -X
/sbin/iptables -Z
/sbin/iptables -P INPUT DROP
/sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
/sbin/iptables -A INPUT -p tcp ! --syn -j REJECT --reject-with tcp-reset
/sbin/iptables -A INPUT -m state --state INVALID -j DROP
/sbin/iptables -P OUTPUT DROP
/sbin/iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
/sbin/iptables -A OUTPUT -p tcp ! --syn -j REJECT --reject-with tcp-reset
/sbin/iptables -A OUTPUT -m state --state INVALID -j DROP
/sbin/iptables -P FORWARD DROP
/sbin/iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
/sbin/iptables -A FORWARD -p tcp ! --syn -j REJECT --reject-with tcp-reset
/sbin/iptables -A FORWARD -m state --state INVALID -j DROP
/sbin/iptables -A INPUT -i lo -j ACCEPT
/sbin/iptables -A OUTPUT -o lo -j ACCEPT
/sbin/iptables -A FORWARD -i lo -o lo -j ACCEPT
/sbin/iptables -t mangle -F
/sbin/iptables -t mangle -X
/sbin/iptables -t mangle -Z
/sbin/iptables -t mangle -P PREROUTING ACCEPT
/sbin/iptables -t mangle -P OUTPUT ACCEPT
/sbin/iptables -t mangle -P INPUT ACCEPT
/sbin/iptables -t mangle -P FORWARD ACCEPT
/sbin/iptables -t mangle -P POSTROUTING ACCEPT
/sbin/iptables -t nat -F
/sbin/iptables -t nat -X
/sbin/iptables -t nat -Z
/sbin/iptables -t nat -P PREROUTING ACCEPT
/sbin/iptables -t nat -P OUTPUT ACCEPT
/sbin/iptables -t nat -P POSTROUTING ACCEPT

# if anybody from the list WATCHLIST, and in the last 20 sec, tries to do new connect attempts then DROP them!
/sbin/iptables -A INPUT --match recent --name WATCHLIST --rcheck --seconds 20 -j DROP

# accept client at port 22 and register in WATCHLIST
/sbin/iptables -A INPUT -p tcp --dport 22 --match recent --name WATCHLIST --set -j ACCEPT

# accept client at port 8192 (my test port) and register in WATCHLIST
/sbin/iptables -A INPUT -p tcp --dport 8192 --match recent --name WATCHLIST --set -j ACCEPT

# if anybody tries to connect to tcp:139 (windows filesharing), then drop them and add them to the WATCHLIST list
/sbin/iptables -A INPUT -p tcp --dport  139 --match recent --name WATCHLIST --set -j DROP


/sbin/iptables -A INPUT -p tcp --dport 8441 -j ACCEPT
/sbin/iptables -A INPUT -p udp --dport 8441 -j ACCEPT

/sbin/iptables -A INPUT -p tcp --dport 4643 -j ACCEPT
/sbin/iptables -A INPUT -p tcp --dport 8443 -j ACCEPT
/sbin/iptables -A INPUT -p tcp --dport 8880 -j ACCEPT

/sbin/iptables -A INPUT -p tcp --dport 80 -j ACCEPT
/sbin/iptables -A INPUT -p tcp --dport 443 -j ACCEPT

/sbin/iptables -A INPUT -p tcp --dport 21 -j ACCEPT

/sbin/iptables -A INPUT -p tcp --dport 22 -j ACCEPT

/sbin/iptables -A INPUT -p tcp --dport 587 -j ACCEPT

/sbin/iptables -A INPUT -p tcp --dport 25 -j ACCEPT
/sbin/iptables -A INPUT -p tcp --dport 465 -j ACCEPT

/sbin/iptables -A INPUT -p tcp --dport 110 -j ACCEPT
/sbin/iptables -A INPUT -p tcp --dport 995 -j ACCEPT

/sbin/iptables -A INPUT -p tcp --dport 143 -j ACCEPT
/sbin/iptables -A INPUT -p tcp --dport 993 -j ACCEPT

/sbin/iptables -A INPUT -p tcp --dport 106 -j DROP

/sbin/iptables -A INPUT -p tcp --dport 3306 -j DROP

/sbin/iptables -A INPUT -p tcp --dport 5432 -j DROP

/sbin/iptables -A INPUT -p tcp --dport 9008 -j DROP
/sbin/iptables -A INPUT -p tcp --dport 9080 -j DROP

/sbin/iptables -A INPUT -p udp --dport 137 -j DROP
/sbin/iptables -A INPUT -p udp --dport 138 -j DROP
/sbin/iptables -A INPUT -p tcp --dport 139 -j DROP
/sbin/iptables -A INPUT -p tcp --dport 445 -j DROP

/sbin/iptables -A INPUT -p udp --dport 1194 -j DROP

/sbin/iptables -A INPUT -p udp --dport 53 -j ACCEPT
/sbin/iptables -A INPUT -p tcp --dport 53 -j ACCEPT

/sbin/iptables -A INPUT -p icmp --icmp-type 8/0 -j ACCEPT

/sbin/iptables -A INPUT -j DROP

/sbin/iptables -A OUTPUT -j ACCEPT

/sbin/iptables -A FORWARD -j DROP

echo 1 > /proc/sys/net/ipv4/ip_forward

echo "All rules processed"
iptables -L

######### end of script #######




More information about the Users mailing list