Portál AbcLinuxu, 2. listopadu 2025 10:30
PS: Zde je inkriminovany skript:
#!/bin/bash
firewall=`which iptables`
reset()
{
$firewall -X
$firewall -F INPUT
$firewall -F OUTPUT
$firewall -F FORWARD
}
start() {
# INPUT DROP
$firewall -P INPUT DROP
$firewall -P OUTPUT ACCEPT
$firewall -P FORWARD ACCEPT
#
# INPUT CHAIN :
#===============
#
# VSE JIZ NAVAZANE
$firewall -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
#
# POVOLENI + OMEZENI PINGU
$firewall -A INPUT -p ICMP --icmp-type echo-request -m limit --limit 10/s --l$
# !AUTH
# $firewall -A INPUT -p TCP --dport 113 -j REJECT
# SSH
$firewall -A INPUT -m state --state NEW -p TCP --dport 22 -j ACCEPT
# SWAT
$firewall -A INPUT -m state --state NEW -p TCP --dport 901 -j ACCEPT
#$firewall -A INPUT -i eth2 -m state --state NEW -p TCP --dport 901 -j ACCEPT
# CUPS
# $firewall -A INPUT -m state --state NEW -p TCP --dport 631 -j ACCEPT
$firewall -A INPUT -i eth2 -m state --state NEW -p TCP --dport 631 -j ACCEPT
# HTTP (80 standard)
$firewall -A INPUT -m state --state NEW -p TCP --dport 80 -j ACCEPT
# MySQL
$firewall -A INPUT -m state --state NEW -p TCP --dport 3306 -j ACCEPT
# SMTP
# $firewall -A INPUT -m state --state NEW -p TCP --dport 25 -j ACCEPT
# $firewall -A INPUT -m state --state NEW -p TCP --dport 465 -j ACCEPT
# IMAP
# $firewall -A INPUT -m state --state NEW -p TCP --dport 143 -j ACCEPT
# $firewall -A INPUT -m state --state NEW -p TCP --dport 993 -j ACCEPT
# POP3
# $firewall -A INPUT -m state --state NEW -p TCP --dport 110 -j ACCEPT
# $firewall -A INPUT -m state --state NEW -p TCP --dport 993 -j ACCEPT
# LOOPBACK -> LOOPBACK
$firewall -A INPUT -i lo -s 127.0.0.1 -d 127.0.0.1 -j ACCEPT
# SNAT
$firewall -t nat -A POSTROUTING -o eth0 -j MASQUERADE
# ZBYTEK LOGUJEME
# $firewall -A INPUT -j LOG --log-level debug
}
#
stop() {
# VSE POVOLIME
$firewall -P INPUT ACCEPT
$firewall -P OUTPUT ACCEPT
$firewall -P FORWARD ACCEPT
}
#
case "$1" in
start|restart)
reset
start
exit 0
;;
stop)
reset
stop
exit 0
;;
*)
echo "Usage: $0 {start|stop|restart}"
exit 1
;;
esac
PPS:
[root@localhost uzivatel]# nmap -v 194.108.205.129 Starting Nmap 4.20 ( http://insecure.org ) at 2007-08-23 23:00 CEST Initiating SYN Stealth Scan at 23:00 Scanning z_netu (194.108.205.129) [1697 ports] Discovered open port 22/tcp on 194.108.205.129 Discovered open port 80/tcp on 194.108.205.129 Discovered open port 901/tcp on 194.108.205.129 Discovered open port 3306/tcp on 194.108.205.129 Completed SYN Stealth Scan at 23:01, 21.70s elapsed (1697 total ports) Host z_netu (194.108.205.129) appears to be up ... good. Interesting ports on z_netu (194.108.205.129): Not shown: 1693 filtered ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 901/tcp open samba-swat 3306/tcp open mysql
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.