Profile

outlier_lynn: (Default)
outlier_lynn

January 2015

S M T W T F S
    123
45678910
11121314151617
181920 21222324
25262728293031

Most Popular Tags

Expand Cut Tags

No cut tags

January 3rd, 2008

outlier_lynn: (Default)
Thursday, January 3rd, 2008 09:05 pm
I've been fighting iptables for two weeks. I would get it figured out then go right into a senior moment. I could only keep half of it in my head at a time and I was flopping back and forth.
j
I'd find "the" problem and flip all my rules only to find I had the same problem. I have a ream of paper on my desk filled with the output of a packet sniffer, firewall log entries, my rule set(s), the tables/chains that were generated from them, and bits of this and that.

Finally, I grabbed a piece of paper and tried to explain the concept to Stacey. Uff-dah.

I was very, very successful at allowing traffic in one direction or the other. Flip the rules and the traffic was flowing in the other direction, but still just one direction.

What was missing?

iptables -A FORWARD -m state --state ESTABLISHED -j ACCEPT

sigh.

I'm feeling very old and mentally brittle.

I'm not really done with the rule set. Lots of little tweaking and log settings to mess with. I haven't tried the tarpit yet, either. I'm set up for it, though. And I have to set up the scripts that install my rule sets when the various machines get restarted.

I have to write a script that checks my apache logs for indentical, bogus requests that come close together so that I can add the offending IP to either a drop table or the tarpit.

I don't think the offending machines care that I put them on hold, though. It is something I really want to test.

The other thing the script will do is capture a part of the log to send to abuse@.... for the ISPs that own the offending IPs. Maybe they will and maybe they won't tell their customers about the infection on their machines.

Tomorrow, I will work on the the internal web server and a couple of internal websites that I promises for yesterday.