⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 packet-filtering-howto.txt

📁 这是我对防火墙技术的一些见解
💻 TXT
📖 第 1 页 / 共 4 页
字号:

  Before any iptables commands have been run (be careful: some
  distributions will run iptables in their initialization scripts),
  there will be no rules in any of the built-in chains (`INPUT',
  `FORWARD' and `OUTPUT'), all the chains will have a policy of ACCEPT.
  You can alter the default policy of the FORWARD chain by providing the
  `forward=0' option to the iptable_filter module.


  7.2.  Operations on a Single Rule

  This is the bread-and-butter of packet filtering; manipulating rules.
  Most commonly, you will probably use the append (-A) and delete (-D)
  commands.  The others (-I for insert and -R for replace) are simple
  extensions of these concepts.


  Each rule specifies a set of conditions the packet must meet, and what
  to do if it meets them (a `target').  For example, you might want to
  drop all ICMP packets coming from the IP address 127.0.0.1.  So in
  this case our conditions are that the protocol must be ICMP and that
  the source address must be 127.0.0.1.  Our target is `DROP'.
  127.0.0.1 is the `loopback' interface, which you will have even if you
  have no real network connection.  You can use the `ping' program to
  generate such packets (it simply sends an ICMP type 8 (echo request)
  which all cooperative hosts should obligingly respond to with an ICMP
  type 0 (echo reply) packet).  This makes it useful for testing.



       # ping -c 1 127.0.0.1
       PING 127.0.0.1 (127.0.0.1): 56 data bytes
       64 bytes from 127.0.0.1: icmp_seq=0 ttl=64 time=0.2 ms

       --- 127.0.0.1 ping statistics ---
       1 packets transmitted, 1 packets received, 0% packet loss
       round-trip min/avg/max = 0.2/0.2/0.2 ms
       # iptables -A INPUT -s 127.0.0.1 -p icmp -j DROP
       # ping -c 1 127.0.0.1
       PING 127.0.0.1 (127.0.0.1): 56 data bytes

       --- 127.0.0.1 ping statistics ---
       1 packets transmitted, 0 packets received, 100% packet loss
       #



  You can see here that the first ping succeeds (the `-c 1' tells ping
  to only send a single packet).


  Then we append (-A) to the `INPUT' chain, a rule specifying that for
  packets from 127.0.0.1 (`-s 127.0.0.1') with protocol ICMP (`-p icmp')
  we should jump to DROP (`-j DROP').


  Then we test our rule, using the second ping.  There will be a pause
  before the program gives up waiting for a response that will never
  come.


  We can delete the rule in one of two ways.  Firstly, since we know
  that it is the only rule in the input chain, we can use a numbered
  delete, as in:


               # iptables -D INPUT 1
               #



  To delete rule number 1 in the INPUT chain.


  The second way is to mirror the -A command, but replacing the -A with
  -D.  This is useful when you have a complex chain of rules and you
  don't want to have to count them to figure out that it's rule 37 that
  you want to get rid of.  In this case, we would use:


               # iptables -D INPUT -s 127.0.0.1 -p icmp -j DROP
               #



  The syntax of -D must have exactly the same options as the -A (or -I
  or -R) command.  If there are multiple identical rules in the same
  chain, only the first will be deleted.


  7.3.  Filtering Specifications

  We have seen the use of `-p' to specify protocol, and `-s' to specify
  source address, but there are other options we can use to specify
  packet characteristics.  What follows is an exhaustive compendium.


  7.3.1.  Specifying Source and Destination IP Addresses

  Source (`-s', `--source' or `--src') and destination (`-d',
  `--destination' or `--dst') IP addresses can be specified in four
  ways.  The most common way is to use the full name, such as
  `localhost' or `www.linuxhq.com'.  The second way is to specify the IP
  address such as `127.0.0.1'.


  The third and fourth ways allow specification of a group of IP
  addresses, such as `199.95.207.0/24' or `199.95.207.0/255.255.255.0'.
  These both specify any IP address from 199.95.207.0 to 199.95.207.255
  inclusive; the digits after the `/' tell which parts of the IP address
  are significant.  `/32' or `/255.255.255.255' is the default (match
  all of the IP address).  To specify any IP address at all `/0' can be
  used, like so:


               [ NOTE: `-s 0/0' is redundant here. ]
               # iptables -A INPUT -s 0/0 -j DROP
               #



  This is rarely used, as the effect above is the same as not specifying
  the `-s' option at all.


  7.3.2.  Specifying Inversion

  Many flags, including the `-s' (or `--source') and `-d'
  (`--destination') flags can have their arguments preceded by `!'
  (pronounced `not') to match addresses NOT equal to the ones given.
  For example. `-s ! localhost' matches any packet not coming from
  localhost.


  7.3.3.  Specifying Protocol

  The protocol can be specified with the `-p' (or `--protocol') flag.
  Protocol can be a number (if you know the numeric protocol values for
  IP) or a name for the special cases of `TCP', `UDP' or `ICMP'.  Case
  doesn't matter, so `tcp' works as well as `TCP'.


  The protocol name can be prefixed by a `!', to invert it, such as `-p
  ! TCP' to specify packets which are not TCP.


  7.3.4.  Specifying an Interface

  The `-i' (or `--in-interface') and `-o' (or `--out-interface') options
  specify the name of an interface to match.  An interface is the
  physical device the packet came in on (`-i') or is going out on
  (`-o').  You can use the ifconfig command to list the interfaces which
  are `up' (i.e., working at the moment).


  Packets traversing the INPUT chain don't have an output interface, so
  any rule using `-o' in this chain will never match.  Similarly,
  packets traversing the OUTPUT chain don't have an input interface, so
  any rule using `-i' in this chain will never match.


  Only packets traversing the FORWARD chain have both an input and
  output interface.


  It is perfectly legal to specify an interface that currently does not
  exist; the rule will not match anything until the interface comes up.
  This is extremely useful for dial-up PPP links (usually interface
  ppp0) and the like.


  As a special case, an interface name ending with a `+' will match all
  interfaces (whether they currently exist or not) which begin with that
  string.  For example, to specify a rule which matches all PPP
  interfaces, the -i ppp+ option would be used.


  The interface name can be preceded by a `!' with spaces around it, to
  match a packet which does not match the specified interface(s), eg -i
  ! ppp+.


  7.3.5.  Specifying Fragments

  Sometimes a packet is too large to fit down a wire all at once.  When
  this happens, the packet is divided into fragments, and sent as
  multiple packets.  The other end reassembles these fragments to
  reconstruct the whole packet.


  The problem with fragments is that the initial fragment has the
  complete header fields (IP + TCP, UDP and ICMP) to examine, but
  subsequent packets only have a subset of the headers (IP without the
  additional protocol fields).  Thus looking inside subsequent fragments
  for protocol headers (such as is done by the TCP, UDP and ICMP
  extensions) is not possible.


  If you are doing connection tracking or NAT, then all fragments will
  get merged back together before they reach the packet filtering code,
  so you need never worry about fragments.


  Please also note that in the INPUT chain of the filter table (or any
  other table hooking into the NF_IP_LOCAL_IN hook) is traversed after
  defragmentation of the core IP stack.


  Otherwise, it is important to understand how fragments get treated by
  the filtering rules.  Any filtering rule that asks for information we
  don't have will not match.  This means that the first fragment is
  treated like any other packet.  Second and further fragments won't be.
  Thus a rule -p TCP --sport www (specifying a source port of `www')
  will never match a fragment (other than the first fragment).  Neither
  will the opposite rule -p TCP --sport ! www.

  However, you can specify a rule specifically for second and further
  fragments, using the `-f' (or `--fragment') flag.  It is also legal to
  specify that a rule does not apply to second and further fragments, by
  preceding the `-f' with ` ! '.


  Usually it is regarded as safe to let second and further fragments
  through, since filtering will effect the first fragment, and thus
  prevent reassembly on the target host; however, bugs have been known
  to allow crashing of machines simply by sending fragments.  Your call.


  Note for network-heads: malformed packets (TCP, UDP and ICMP packets
  too short for the firewalling code to read the ports or ICMP code and
  type) are dropped when such examinations are attempted.  So are TCP
  fragments starting at position 8.


  As an example, the following rule will drop any fragments going to
  192.168.1.1:



       # iptables -A OUTPUT -f -d 192.168.1.1 -j DROP
       #



  7.3.6.  Extensions to iptables: New Matches

  iptables is extensible, meaning that both the kernel and the iptables
  tool can be extended to provide new features.


  Some of these extensions are standard, and other are more exotic.
  Extensions can be made by other people and distributed separately for
  niche users.


  Kernel extensions normally live in the kernel module subdirectory,
  such as /lib/modules/2.4.0-test10/kernel/net/ipv4/netfilter.  They are
  demand loaded if your kernel was compiled with CONFIG_KMOD set, so you
  should not need to manually insert them.


  Extensions to the iptables program are shared libraries which usually
  live in /usr/local/lib/iptables/, although a distribution would put
  them in /lib/iptables or /usr/lib/iptables.


  Extensions come in two types: new targets, and new matches (we'll talk
  about new targets a little later).  Some protocols automatically offer
  new tests: currently these are TCP, UDP and ICMP as shown below.


  For these you will be able to specify the new tests on the command
  line after the `-p' option, which will load the extension.  For
  explicit new tests, use the `-m' option to load the extension, after
  which the extended options will be available.


  To get help on an extension, use the option to load it (`-p', `-j' or
  `-m') followed by `-h' or `--help', eg:

  # iptables -p tcp --help
  #



  7.3.6.1.  TCP Extensions

  The TCP extensions are automatically loaded if `-p tcp' is specified.
  It provides the following options (none of which match fragments).



     --tcp-flags
        Followed by an optional `!', then two strings of flags, allows
        you to filter on specific TCP flags.  The first string of flags
        is the mask: a list of flags you want to examine.  The second
        string of flags tells which one(s) should be set.  For example,



          # iptables -A INPUT --protocol tcp --tcp-flags ALL SYN,ACK -j DROP



     This indicates that all flags should be examined (`ALL' is
     synonymous with `SYN,ACK,FIN,RST,URG,PSH'), but only SYN and ACK
     should be set.  There is also an argument `NONE' meaning no flags.


     --syn
        Optionally preceded by a `!', this is shorthand for `--tcp-flags
        SYN,RST,ACK SYN'.


     --source-port
        followed by an optional `!', then either a single TCP port, or a
        range of ports.  Ports can be port names, as listed in
        /etc/services, or numeric.  Ranges are either two port names
        separated by a `:', or (to specify greater than or equal to a
        given port) a port with a `:' appended, or (to specify less than
        or equal to a given port), a port preceded by a `:'.


     --sport
        is synonymous with `--source-port'.


     --destination-port
        and

     --dport
        are the same as above, only they specify the destination, rather
        than source, port to match.


     --tcp-option
        followed by an optional `!' and a number, matches a packet with
        a TCP option equaling that number.  A packet which does not have
        a complete TCP header is dropped automatically if an attempt is
        made to examine its TCP options.



  7.3.6.1.1.  An Explanation of TCP Flags

  It is sometimes useful to allow TCP connections in one direction, but
  not the other.  For example, you might want to allow connections to an
  external WWW server, but not connections from that server.


  The naive approach would be to block TCP packets coming from the
  server.  Unfortunately, TCP connections require packets going in both
  directions to work at all.


  The solution is to block only the packets used to request a
  connection.  These packets are called SYN packets (ok, technically
  they're packets with the SYN flag set, and the RST and ACK flags
  cleared, but we call them SYN packets for short).  By disallowing only
  these packets, we can stop attempted connections in their tracks.


  The `--syn' flag is used for this: it is only valid for rules which
  specify TCP as their protocol.  For example, to specify TCP connection
  attempts from 192.168.1.1:


       -p TCP -s 192.168.1.1 --syn



  This flag can be inverted by preceding it with a `!', which means
  every packet other than the connection initiation.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -