浏览代码

Drop access to unused ports

Bob Mottram 11 年前
父节点
当前提交
b86389bd99
共有 1 个文件被更改,包括 46 次插入5 次删除
  1. 46
    5
      beaglebone.txt

+ 46
- 5
beaglebone.txt 查看文件

447
 -- NBC News article: /War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show/
447
 -- NBC News article: /War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show/
448
 #+END_VERSE
448
 #+END_VERSE
449
 
449
 
450
-A basic firewall limits the maximum rate at which connections can be made, and this helps to defend against various kinds of DDOS attack.
450
+A basic firewall limits the maximum rate at which connections can be made and closes any unused ports, and this helps to defend against various kinds of DDOS attack.
451
 
451
 
452
 #+BEGIN_SRC: bash
452
 #+BEGIN_SRC: bash
453
 apt-get install portsentry
453
 apt-get install portsentry
483
 #+BEGIN_SRC: bash
483
 #+BEGIN_SRC: bash
484
 #!/bin/bash
484
 #!/bin/bash
485
 
485
 
486
-# enable syn cookies
486
+# Enable syn cookies
487
 echo 1 > /proc/sys/net/ipv4/tcp_syncookies
487
 echo 1 > /proc/sys/net/ipv4/tcp_syncookies
488
 
488
 
489
-# other settings
489
+# Other settings
490
 echo 1 > /proc/sys/net/ipv4/tcp_keepalive_probes
490
 echo 1 > /proc/sys/net/ipv4/tcp_keepalive_probes
491
 echo 2 > /proc/sys/net/ipv4/tcp_synack_retries
491
 echo 2 > /proc/sys/net/ipv4/tcp_synack_retries
492
 echo 1 > /proc/sys/net/ipv4/tcp_syn_retries
492
 echo 1 > /proc/sys/net/ipv4/tcp_syn_retries
497
 iptables -F
497
 iptables -F
498
 iptables -X
498
 iptables -X
499
 
499
 
500
+# Drop access to unused ports
501
+iptables -A INPUT -p tcp --destination-port 1 -j DROP
502
+iptables -A INPUT -p tcp --destination-port 7 -j DROP
503
+iptables -A INPUT -p tcp --destination-port 109:111 -j DROP
504
+iptables -A INPUT -p tcp --destination-port 995 -j DROP
505
+iptables -A INPUT -p tcp --destination-port 139 -j DROP
506
+iptables -A INPUT -p tcp --destination-port 6000:6001 -j DROP
507
+iptables -A INPUT -p tcp --destination-port 9 -j DROP
508
+iptables -A INPUT -p tcp --destination-port 79 -j DROP
509
+iptables -A INPUT -p tcp --destination-port 515 -j DROP
510
+iptables -A INPUT -p tcp --destination-port 4001 -j DROP
511
+iptables -A INPUT -p tcp --destination-port 1524 -j DROP
512
+iptables -A INPUT -p tcp --destination-port 1080 -j DROP
513
+iptables -A INPUT -p tcp --destination-port 512:514 -j DROP
514
+iptables -A INPUT -p tcp --destination-port 31337 -j DROP
515
+iptables -A INPUT -p tcp --destination-port 2000:2001 -j DROP
516
+iptables -A INPUT -p tcp --destination-port 12345 -j DROP
517
+iptables -A INPUT -p tcp --destination-port 32771:32774 -j DROP
518
+iptables -A INPUT -p tcp --destination-port 4000 -j DROP
519
+iptables -A INPUT -p udp --destination-port 1 -j DROP
520
+iptables -A INPUT -p udp --destination-port 7 -j DROP
521
+iptables -A INPUT -p udp --destination-port 109:111 -j DROP
522
+iptables -A INPUT -p udp --destination-port 995 -j DROP
523
+iptables -A INPUT -p udp --destination-port 139 -j DROP
524
+iptables -A INPUT -p udp --destination-port 6000:6001 -j DROP
525
+iptables -A INPUT -p udp --destination-port 9 -j DROP
526
+iptables -A INPUT -p udp --destination-port 79 -j DROP
527
+iptables -A INPUT -p udp --destination-port 515 -j DROP
528
+iptables -A INPUT -p udp --destination-port 4001 -j DROP
529
+iptables -A INPUT -p udp --destination-port 1524 -j DROP
530
+iptables -A INPUT -p udp --destination-port 1080 -j DROP
531
+iptables -A INPUT -p udp --destination-port 512:514 -j DROP
532
+iptables -A INPUT -p udp --destination-port 31337 -j DROP
533
+iptables -A INPUT -p udp --destination-port 2000:2001 -j DROP
534
+iptables -A INPUT -p udp --destination-port 12345 -j DROP
535
+iptables -A INPUT -p udp --destination-port 32771:32774 -j DROP
536
+iptables -A INPUT -p udp --destination-port 4000 -j DROP
537
+
500
 # Make sure NEW incoming tcp connections are SYN packets
538
 # Make sure NEW incoming tcp connections are SYN packets
501
 iptables -A INPUT -p tcp ! --syn -m state --state NEW -j DROP
539
 iptables -A INPUT -p tcp ! --syn -m state --state NEW -j DROP
502
 
540
 
511
 # Incoming malformed NULL packets:
549
 # Incoming malformed NULL packets:
512
 iptables -A INPUT -p tcp --tcp-flags ALL NONE -j DROP
550
 iptables -A INPUT -p tcp --tcp-flags ALL NONE -j DROP
513
 
551
 
514
-# drop UDP to used ports
552
+# Drop UDP to used ports
515
 iptables -A INPUT -p udp --match multiport --dports 70,80,443,143,6670,993,5060,5061,25 -j DROP
553
 iptables -A INPUT -p udp --match multiport --dports 70,80,443,143,6670,993,5060,5061,25 -j DROP
516
 iptables -A INPUT -p udp --match multiport --dports 465,22,5222,5223,5269,5280,5281,8444 -j DROP
554
 iptables -A INPUT -p udp --match multiport --dports 465,22,5222,5223,5269,5280,5281,8444 -j DROP
517
 
555
 
518
-# limit ssh logins
556
+# Limit ssh logins
519
 iptables -A INPUT -p tcp --dport 22 -m limit --limit 3/minute --limit-burst 1 -j ACCEPT
557
 iptables -A INPUT -p tcp --dport 22 -m limit --limit 3/minute --limit-burst 1 -j ACCEPT
520
 
558
 
521
 # Limit web connections
559
 # Limit web connections
525
 # Limit number of XMPP connections
563
 # Limit number of XMPP connections
526
 iptables -A INPUT -p tcp --match multiport --dports 5222:5223,5269,5280:5281 -m limit --limit 10/minute --limit-burst 1 -j ACCEPT
564
 iptables -A INPUT -p tcp --match multiport --dports 5222:5223,5269,5280:5281 -m limit --limit 10/minute --limit-burst 1 -j ACCEPT
527
 
565
 
566
+# Limit NNTP connections
567
+iptables -A INPUT -p tcp --dport 119 -m limit --limit 5/minute --limit-burst 1 -j ACCEPT
568
+
528
 # Limit IRC connections
569
 # Limit IRC connections
529
 iptables -A INPUT -p tcp --dport 6666:6670 -m limit --limit 10/minute --limit-burst 1 -j ACCEPT
570
 iptables -A INPUT -p tcp --dport 6666:6670 -m limit --limit 10/minute --limit-burst 1 -j ACCEPT
530
 
571