If you want to blacklist some IPs, you can put them into PAROLE. I would create a "BLACKLIST" chain, and DROP IPs there, and call that chain near the top of the INPUT chain. (after the ESTABLISHED and RELATED rule, for performance reasons, especially if you want to blacklist many).
> -----Original Message----- > From: Tore Nilsson [mailto:[EMAIL PROTECTED]] > Sent: Wednesday 4 December 2002 15:19 > To: DEFFONTAINES Vincent > Cc: [EMAIL PROTECTED] > Subject: Re: IPTables configuration. > > > Hi! > > The machine is a standalone web server. I've been getting a bunch of > portscans and some weird logs in my webserver logs. I'd like to block > those ip's completely. However, I'm nut quite sure where in > this setup I'd > put them. I was thinking they'd go into PAROLE. > > Here's the output of "iptables -L -n -v": > > Chain INPUT (policy DROP 0 packets, 0 bytes) > pkts bytes target prot opt in out source > destination > 0 0 DROP tcp -- !lo * 0.0.0.0/0 > 127.0.0.0/8 > 74607 20M ACCEPT all -- * * 0.0.0.0/0 > 0.0.0.0/0 state RELATED,ESTABLISHED > 1 208 ACCEPT all -- lo * 0.0.0.0/0 > 0.0.0.0/0 > 0 0 DROP all -- * * 224.0.0.0/4 > 0.0.0.0/0 > 331K 39M PUB_IN all -- eth0 * 0.0.0.0/0 > 0.0.0.0/0 > 0 0 DROP all -- * * 0.0.0.0/0 > 0.0.0.0/0 > > Chain FORWARD (policy DROP 0 packets, 0 bytes) > pkts bytes target prot opt in out source > destination > 0 0 ACCEPT all -- * * 0.0.0.0/0 > 0.0.0.0/0 state RELATED,ESTABLISHED > 0 0 DROP all -- * * 0.0.0.0/0 > 0.0.0.0/0 > > Chain OUTPUT (policy ACCEPT 2 packets, 244 bytes) > pkts bytes target prot opt in out source > destination > 77803 17M PUB_OUT all -- * eth0 0.0.0.0/0 > 0.0.0.0/0 > > Chain INT_IN (0 references) > pkts bytes target prot opt in out source > destination > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 > 0.0.0.0/0 > 0 0 DROP all -- * * 0.0.0.0/0 > 0.0.0.0/0 > > Chain INT_OUT (0 references) > pkts bytes target prot opt in out source > destination > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 > 0.0.0.0/0 > 0 0 ACCEPT all -- * * 0.0.0.0/0 > 0.0.0.0/0 > > Chain PAROLE (4 references) > pkts bytes target prot opt in out source > destination > 443 22260 ACCEPT all -- * * 0.0.0.0/0 > 0.0.0.0/0 > > Chain PUB_IN (1 references) > pkts bytes target prot opt in out source > destination > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 > 0.0.0.0/0 icmp type 3 > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 > 0.0.0.0/0 icmp type 0 > 1 56 ACCEPT icmp -- * * 0.0.0.0/0 > 0.0.0.0/0 icmp type 11 > 384 19428 PAROLE tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:80 > 5 240 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:23 state INVALID,NEW limit: avg > 5/sec burst 8 LOG > flags 0 level 4 prefix `audit' > 51 2524 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:21 state INVALID,NEW limit: avg > 5/sec burst 8 LOG > flags 0 level 4 prefix `audit' > 0 0 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:143 state INVALID,NEW limit: avg > 5/sec burst 8 > LOG flags 0 level 4 prefix `audit' > 3 140 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:110 state INVALID,NEW limit: avg > 5/sec burst 8 > LOG flags 0 level 4 prefix `audit' > 7 332 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:79 state INVALID,NEW limit: avg > 5/sec burst 8 LOG > flags 0 level 4 prefix `audit' > 6 360 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:111 state INVALID,NEW limit: avg > 5/sec burst 8 > LOG flags 0 level 4 prefix `audit' > 0 0 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:512 state INVALID,NEW limit: avg > 5/sec burst 8 > LOG flags 0 level 4 prefix `audit' > 0 0 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:513 state INVALID,NEW limit: avg > 5/sec burst 8 > LOG flags 0 level 4 prefix `audit' > 0 0 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:98 state INVALID,NEW limit: avg > 5/sec burst 8 LOG > flags 0 level 4 prefix `audit' > 7 380 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:22 state INVALID,NEW limit: avg > 5/sec burst 8 LOG > flags 0 level 4 prefix `audit' > 0 0 LOG tcp -- * * 0.0.0.0/0 > 0.0.0.0/0 tcp dpt:1980 state INVALID,NEW limit: avg > 5/sec burst 8 > LOG flags 0 level 4 prefix `audit' > 0 0 LOG udp -- * * 0.0.0.0/0 > 0.0.0.0/0 udp dpt:31337 state INVALID,NEW limit: avg > 5/sec burst 8 > LOG flags 0 level 4 prefix `audit' > 145 47167 DROP icmp -- * * 0.0.0.0/0 > 0.0.0.0/0 > 331K 39M DROP all -- * * 0.0.0.0/0 > 0.0.0.0/0 > > Chain PUB_OUT (1 references) > pkts bytes target prot opt in out source > destination > 77803 17M ACCEPT all -- * * 0.0.0.0/0 > 0.0.0.0/0 > > ----- Original Message ----- > From: "DEFFONTAINES Vincent" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Wednesday, December 04, 2002 2:45 PM > Subject: RE: IPTables configuration. > > > > To correctly audit your configuration, I need an output of > > "/sbin/iptables -L -n -v" > > The mere "/sbin/iptables -L [-n]" is not sufficient to me, > cause it won't > > reveal the per interface filters. > > > > Vincent > > > > > > > > > > > -----Original Message----- > > > From: Tore Nilsson [mailto:[EMAIL PROTECTED]] > > > Sent: Wednesday 4 December 2002 14:23 > > > To: [EMAIL PROTECTED] > > > Subject: IPTables configuration. > > > > > > > > > Hello! > > > > > > Can someone review my iptables configuration and give suggestions? > > > Btw. if I'd want to block someone completely using this > configuration > > > should I put them in "Parole" by using this command: > > > > > > iptables -A PAROLE -s [ip-number] -j DROP > > > > > > //Tore Nilsson > > > > > > here's my configuration. btw, it was made with Bastille: > > > > > > Chain INPUT (policy DROP) > > > target prot opt source destination > > > DROP tcp -- anywhere 127.0.0.0/8 > > > ACCEPT all -- anywhere anywhere state > > > RELATED,ESTABLISHED > > > ACCEPT all -- anywhere anywhere > > > DROP all -- BASE-ADDRESS.MCAST.NET/4 anywhere > > > PUB_IN all -- anywhere anywhere > > > DROP all -- anywhere anywhere > > > > > > Chain FORWARD (policy DROP) > > > target prot opt source destination > > > ACCEPT all -- anywhere anywhere state > > > RELATED,ESTABLISHED > > > DROP all -- anywhere anywhere > > > > > > Chain OUTPUT (policy ACCEPT) > > > target prot opt source destination > > > PUB_OUT all -- anywhere anywhere > > > > > > Chain INT_IN (0 references) > > > target prot opt source destination > > > ACCEPT icmp -- anywhere anywhere > > > DROP all -- anywhere anywhere > > > > > > Chain INT_OUT (0 references) > > > target prot opt source destination > > > ACCEPT icmp -- anywhere anywhere > > > ACCEPT all -- anywhere anywhere > > > > > > Chain PAROLE (4 references) > > > target prot opt source destination > > > ACCEPT all -- anywhere anywhere > > > > > > Chain PUB_IN (1 references) > > > target prot opt source destination > > > ACCEPT icmp -- anywhere anywhere icmp > > > destination-unreachable > > > ACCEPT icmp -- anywhere anywhere > > > icmp echo-reply > > > ACCEPT icmp -- anywhere anywhere icmp > > > time-exceeded > > > PAROLE tcp -- anywhere anywhere > > > tcp dpt:www > > > LOG tcp -- anywhere anywhere > > > tcp dpt:telnet > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere > > > tcp dpt:ftp > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere > > > tcp dpt:imap2 > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere > > > tcp dpt:pop3 > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere > > > tcp dpt:finger > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere > > > tcp dpt:sunrpc > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere > > > tcp dpt:exec > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere > > > tcp dpt:login > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere tcp > > > dpt:linuxconf state INVALID,NEW limit: avg 5/sec burst 8 LOG > > > level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere > > > tcp dpt:ssh > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG tcp -- anywhere anywhere > > > tcp dpt:1980 > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > LOG udp -- anywhere anywhere > > > udp dpt:31337 > > > state INVALID,NEW limit: avg 5/sec burst 8 LOG level warning > > > prefix `audit' > > > DROP icmp -- anywhere anywhere > > > DROP all -- anywhere anywhere > > > > > > Chain PUB_OUT (1 references) > > > target prot opt source destination > > > ACCEPT all -- anywhere anywhere > > > > > > > > > -- > > > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > > > with a subject of "unsubscribe". Trouble? Contact > > > [EMAIL PROTECTED] > > > > > > > > > -- > > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > > with a subject of "unsubscribe". Trouble? Contact > [EMAIL PROTECTED] > > > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact > [EMAIL PROTECTED] > -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]