iptables/templates/rules.v4

134 lines
3.5 KiB
Plaintext

################################################################################
*nat
################################################################################
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
# Remove all rules from all chains.
-F
# Delete all user-defined chains.
-X
{{ iptables__nat_v4 }}
{{ iptables__nat_all }}
COMMIT
################################################################################
*filter
################################################################################
:INPUT {{ 'DROP' if iptables__drop_by_default else 'ACCEPT' }} [0:0]
:FORWARD DROP [0:0]
:OUTPUT {{ 'DROP' if iptables__drop_by_default else 'ACCEPT' }} [0:0]
# Remove all rules from all chains.
-F
# Delete all user-defined chains.
-X
##########
# Custom #
##########
{{ iptables__filter_prepend0_v6 }}
{{ iptables__filter_prepend0_all }}
{{ iptables__filter_prepend1_v6 }}
{{ iptables__filter_prepend1_all }}
{{ iptables__filter_prepend2_v6 }}
{{ iptables__filter_prepend2_all }}
#######
# SSH #
#######
{{ iptables__filter_ssh_before_v6 }}
{{ iptables__filter_ssh_before_all }}
# Allow incoming SSH.
{% if iptables__ssh_ifaces %}
{% for iface in iptables__ssh_ifaces %}
-A INPUT -i {{ iface }} -p tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A OUTPUT -o {{ iface }} -p tcp --sport 22 -m conntrack --ctstate ESTABLISHED -j ACCEPT
{% endfor %}
{% else %}
-A INPUT -p tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A OUTPUT -p tcp --sport 22 -m conntrack --ctstate ESTABLISHED -j ACCEPT
{% endif %}
{{ iptables__filter_ssh_after_v6 }}
{{ iptables__filter_ssh_after_all }}
############
# Loopback #
############
{{ iptables__filter_loop_before_v6 }}
{{ iptables__filter_loop_before_all }}
# Allow all loopback (lo) traffic and reject anything
# to localhost that does not originate from lo.
-A INPUT -i lo -j ACCEPT
-A INPUT ! -i lo -s 127.0.0.0/8 -j REJECT
-A OUTPUT -o lo -j ACCEPT
{{ iptables__filter_loop_after_v6 }}
{{ iptables__filter_loop_after_all }}
############
# Outgoing #
############
{{ iptables__filter_out_before_v6 }}
{{ iptables__filter_out_before_all }}
# Allow all outgoing traffic.
{% if iptables__allow_output_ifaces %}
{% for iface in iptables__allow_output_ifaces %}
-A OUTPUT -o {{ iface }} -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A INPUT -i {{ iface }} -m conntrack --ctstate ESTABLISHED -j ACCEPT
{% endfor %}
{% else %}
-A OUTPUT -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A INPUT -m conntrack --ctstate ESTABLISHED -j ACCEPT
{% endif %}
{{ iptables__filter_out_after_v6 }}
{{ iptables__filter_out_after_all }}
########
# ICMP #
########
# Allow some important ICMP.
-A INPUT -p icmp --icmp-type echo-request -j ACCEPT
-A OUTPUT -p icmp --icmp-type echo-request -j ACCEPT
-A INPUT -p icmp --icmp-type echo-reply -j ACCEPT
-A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT
-A INPUT -p icmp --icmp-type fragmentation-needed -j ACCEPT
-A OUTPUT -p icmp --icmp-type fragmentation-needed -j ACCEPT
-A INPUT -p icmp --icmp-type time-exceeded -j ACCEPT
-A OUTPUT -p icmp --icmp-type time-exceeded -j ACCEPT
# Deny other ICMP.
-A INPUT -p icmp -j DROP
-A OUTPUT -p icmp -j DROP
##########
# Custom #
##########
{{ iptables__filter_append0_v6 }}
{{ iptables__filter_append0_all }}
{{ iptables__filter_append1_v6 }}
{{ iptables__filter_append1_all }}
{{ iptables__filter_append2_v6 }}
{{ iptables__filter_append2_all }}
COMMIT