Re: sudo fails to save IPTables rules

2024-12-24 Thread Timothy M Butterworth
On Mon, Dec 23, 2024 at 9:05 PM Greg Wooledge wrote: > On Mon, Dec 23, 2024 at 20:48:12 -0500, Dan Purgert wrote: > > On Dec 23, 2024, Timothy M Butterworth wrote: > > > sudo fails with a permission denied error. > > > tmb@hp-debian:~$ sudo /usr/sbin/iptables-sa

Re: sudo fails to save IPTables rules

2024-12-23 Thread Carles Pina i Estany
Hi, On 23 Dec 2024 at 20:56:14, Greg Wooledge wrote: > On Mon, Dec 23, 2024 at 20:48:12 -0500, Dan Purgert wrote: > > On Dec 23, 2024, Timothy M Butterworth wrote: > > > sudo fails with a permission denied error. > > > tmb@hp-debian:~$ sudo /usr/sbin/iptables-sa

Re: sudo fails to save IPTables rules

2024-12-23 Thread Greg Wooledge
On Mon, Dec 23, 2024 at 20:48:12 -0500, Dan Purgert wrote: > On Dec 23, 2024, Timothy M Butterworth wrote: > > sudo fails with a permission denied error. > > tmb@hp-debian:~$ sudo /usr/sbin/iptables-save > /etc/iptables/rules.v4 > > bash: /etc/iptables/rules.v4: Permission

Re: sudo fails to save IPTables rules

2024-12-23 Thread Dan Purgert
On Dec 23, 2024, Timothy M Butterworth wrote: > sudo fails with a permission denied error. > tmb@hp-debian:~$ sudo /usr/sbin/iptables-save > /etc/iptables/rules.v4 > bash: /etc/iptables/rules.v4: Permission denied "sudo" only modifies "iptables-save", and not the r

sudo fails to save IPTables rules

2024-12-23 Thread Timothy M Butterworth
sudo fails with a permission denied error. tmb@hp-debian:~$ sudo /usr/sbin/iptables-save > /etc/iptables/rules.v4 bash: /etc/iptables/rules.v4: Permission denied Root user works tmb@hp-debian:~$ su -l Password: Root user with sudo root@hp-debian:/home/tmb# sudo /usr/sbin/iptables-save >

Re: logging with iptables

2024-09-20 Thread Karl Vogel
>> On Thu, 19 Sep 2024, fxkl4...@protonmail.com wrote: > in my iptables i havetcp LOG flags 0 level 4 prefix "REJECT: " > this does what i want but how to direct the logging > it gets written to multiple file in /var/log > syslog, messages, kern, debug > can i

Re: logging with iptables

2024-09-19 Thread Tim Woodall
On Thu, 19 Sep 2024, fxkl4...@protonmail.com wrote: in my iptables i havetcp LOG flags 0 level 4 prefix "REJECT: " this does what i want but how to direct the logging it gets written to multiple file in /var/log syslog, messages, kern, debug can i restrict this to a single file

Re: logging with iptables

2024-09-19 Thread Andy Smith
Hi, On Thu, Sep 19, 2024 at 02:35:24PM +, fxkl4...@protonmail.com wrote: > in my iptables i havetcp LOG flags 0 level 4 prefix "REJECT: " > this does what i want but how to direct the logging > it gets written to multiple file in /var/log > syslog, messages, kern,

logging with iptables

2024-09-19 Thread fxkl47BF
in my iptables i havetcp LOG flags 0 level 4 prefix "REJECT: " this does what i want but how to direct the logging it gets written to multiple file in /var/log syslog, messages, kern, debug can i restrict this to a single file

Re: iptables to nftables?

2024-08-06 Thread Michel Verdier
On 2024-08-06, Dan Ritter wrote: > 200 is a lot for a human to manage. You may be able to simplify your > iptables rules by taking advantage of ipset for large numbers of > IPs (hash:ip) or ports (bitmap:port) that need similar > treatment. That's available in nftables as well.

Re: iptables to nftables?

2024-08-06 Thread Dan Ritter
Wesley wrote: > We have several debian servers, all running iptables. On average each has 200 > rules, mostly deny rules. From a best practice perspective, do we need to > upgrade to nftables? > iptables is currently implemented in terms of nftables. While it is possible that

Re: iptables to nftables?

2024-08-06 Thread Stanislav Vlasov
вт, 6 авг. 2024 г. в 16:05, Wesley : > We have several debian servers, all running iptables. On average each has 200 > rules, mostly deny rules. From a best practice perspective, do we need to > upgrade to nftables? Upgrade right now? No. Check and test? Yes. If your configuration

iptables to nftables?

2024-08-06 Thread Wesley
We have several debian servers, all running iptables. On average each has 200 rules, mostly deny rules. From a best practice perspective, do we need to upgrade to nftables? Thanks & regards.

Re: timeout for iptables

2024-07-02 Thread Jeff Peng
Got the idea (nft) and thanks for all help. On 2024-07-03 04:22, Tim Woodall wrote: On Tue, 2 Jul 2024, Jeff Peng wrote: Hello gurus, Is there a tool for maintaining the timeout for iptables rules? for example, one IP would be blocked by my iptables for 24 hours, and another IP should be

Re: timeout for iptables

2024-07-02 Thread Tim Woodall
On Tue, 2 Jul 2024, Jeff Peng wrote: Hello gurus, Is there a tool for maintaining the timeout for iptables rules? for example, one IP would be blocked by my iptables for 24 hours, and another IP should be blocked for one week. Off the top of my head I can't think exactly how to do i

Re: timeout for iptables

2024-07-02 Thread Dan Ritter
Max Nikulin wrote: > On 02/07/2024 19:28, Dan Ritter wrote: > > iptables (which are currently implemented in nftables) don't have a native > > timeout; > > nft sets have the timeout option. Isn't it to specify interval of time to > remove elements? It works w

Re: timeout for iptables

2024-07-02 Thread Max Nikulin
On 02/07/2024 19:28, Dan Ritter wrote: iptables (which are currently implemented in nftables) don't have a native timeout; nft sets have the timeout option. Isn't it to specify interval of time to remove elements?

Re: timeout for iptables

2024-07-02 Thread Dan Ritter
Jeff Peng wrote: > Is there a tool for maintaining the timeout for iptables rules? > > for example, one IP would be blocked by my iptables for 24 hours, and > another IP should be blocked for one week. iptables (which are currently implemented in nftables) don't have a native

timeout for iptables

2024-07-02 Thread Jeff Peng
Hello gurus, Is there a tool for maintaining the timeout for iptables rules? for example, one IP would be blocked by my iptables for 24 hours, and another IP should be blocked for one week. Thanks.

Re: how many iptables rules can a VPS have

2024-05-24 Thread Michael Grant
On 24 May 2024 23:23:44 BST, Andy Smith wrote: >You will likely get better performance if you switch to nftables and >use an ipset to hold all the bans, though I've no idea how easy >that is to configure with fail2ban. It's easy, supported out of the box. I have been using nftables for years w

Re: how many iptables rules can a VPS have

2024-05-24 Thread Andy Smith
Hi, On Sat, May 25, 2024 at 06:04:34AM +0800, Northwind wrote: > I have been using a KVM vps with 2G ram, 2 cores. > due to fail2ban jobs, iptables in this vps has dropped 3000+ black IPs. > may I ask how max iptables rules the VPS can have? It depends upon the kind of rule but for

how many iptables rules can a VPS have

2024-05-24 Thread Northwind
Hello I have been using a KVM vps with 2G ram, 2 cores. due to fail2ban jobs, iptables in this vps has dropped 3000+ black IPs. may I ask how max iptables rules the VPS can have? does many iptables rules influence the networking performance? Thanks

Re: Network tcp/iptables issue with XRDP

2023-10-25 Thread Anssi Saari
Henggi writes: > Oh wow… that’s interesting. I had no idea about „nft“ (I just knew > „iptables-nft“) which seem to be very different. > I think I have dig down where those „nft" rules are coming from while > iptables-nft is completely empty. Thanks, great clue! Typically

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Henggi
t; What does > > nft list ruleset > > show? > (Unfortunately, this is all I know about netfilter diagnostics... and I > couldn't even get this far without internet search engine :-) Oh wow… that’s interesting. I had no idea about „nft“ (I just knew „iptables-nft“) which se

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Henggi
> On 24 Oct 2023, at 16:33, Max Nikulin wrote: > > On 24/10/2023 19:04, Henggi wrote: >> - iptables on server are cleared/open (firewalld or other firewall >> frameworks are not used/installed). > > Nowadays nft or iptables is not the only option to drop packets.

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Henggi
> On 24 Oct 2023, at 17:22, Charles Curley > wrote: > > On Tue, 24 Oct 2023 15:30:14 +0200 > Arno Lehmann wrote: > >> Recently I encountered something similar, and my usual test for local >> firewall being active, >> >> iptables -L -n >>

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Arno Lehmann
Hello, Am 24.10.2023 um 16:19 schrieb Henggi: ... As I mentioned in my 1st email, I think (afaik) that no other netfitler module/service is running. My anecdote was intended to illustrate that beliefs are not really good tools to diagnose problems ;-) root@server:~# systemctl status firew

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Charles Curley
On Tue, 24 Oct 2023 15:30:14 +0200 Arno Lehmann wrote: > Recently I encountered something similar, and my usual test for local > firewall being active, > > iptables -L -n > > came back with policies "accept" all over the place, and no > particular rules. >

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Henggi
pp listening >> process (while other services on same host are working just fine via the >> network - so it’s not an „physical" network issue). >> -> iptables are cleared and not aware of any other netfilter running… > > I suggest to verify the other netfiler

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Max Nikulin
On 24/10/2023 19:04, Henggi wrote: - iptables on server are cleared/open (firewalld or other firewall frameworks are not used/installed). Nowadays nft or iptables is not the only option to drop packets. Another one is eBPF used e.g. by systemd. I have the following link in my notes, but I

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Henggi
other machine and this one. It could be on that other machine, > on this machine, or in some network device between them. My assumption too (unless it’s a weird bug within used pkg version of xrdp)… thats why i provided evidence of the cleared iptables & tcpdump before How to figure out wher

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Arno Lehmann
otherwise: -> incoming tcp syn/ack on localhost interfact (lo) works fine -> incoming tcp syn/ack on eth0 interface seems not to reach app listening process (while other services on same host are working just fine via the network - so it’s not an „physical" network issue). -> iptables are c

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Dan Ritter
Henggi wrote: > > > On 24 Oct 2023, at 14:46, Dan Ritter wrote: > > > - when using „port=tcp://:3389“ in xrdp.ini: > root@server:~# ss -tlnp | grep 3389 > LISTEN 0 2 0.0.0.0:3389 0.0.0.0:* > users:(("xrdp",pid=96436,fd=11)) > > - when using using „port=3389“ in x

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Henggi
> On 24 Oct 2023, at 14:46, Dan Ritter wrote: > > Henggi wrote: >> Hi list, >> >> Completely stuck here, any clue appreciated! >> >> — by default xrdp.ini listening config is set to "port=3389“ (which is >> expected to listen on ipv4 && ipv6 in parallel as I understand). However >> using t

Re: Network tcp/iptables issue with XRDP

2023-10-24 Thread Dan Ritter
Henggi wrote: > Hi list, > > Completely stuck here, any clue appreciated! > > — by default xrdp.ini listening config is set to "port=3389“ (which is > expected to listen on ipv4 && ipv6 in parallel as I understand). However > using that seems only to listen on tcp4 according to „netstat“ > — t

Network tcp/iptables issue with XRDP

2023-10-24 Thread Henggi
(lo) works fine -> incoming tcp syn/ack on eth0 interface seems not to reach app listening process (while other services on same host are working just fine via the network - so it’s not an „physical" network issue). -> iptables are cleared and not aware of any other net

Re: iptables reject with TCP RST

2023-05-14 Thread Andy Smith
Hello, On Mon, May 15, 2023 at 09:40:10AM +0800, Tom Reed wrote: > Yes after each telnet from client host, the count was increased. > > 0 0 REJECT tcp -- anyany anywhere > anywhere tcp dpt:imaps reject-with tcp-reset > 0 0 REJECT tcp --

Re: iptables reject with TCP RST

2023-05-14 Thread Tom Reed
> Hello, > > On Mon, May 15, 2023 at 09:10:24AM +0800, Tom Reed wrote: >> If I clean iptables in the destination host, this telnet will get >> success >> at once. >> >> Any hints? > > Why have you not used "iptables -vL" to show the pack

Re: iptables reject with TCP RST

2023-05-14 Thread Andy Smith
Hello, On Mon, May 15, 2023 at 09:10:24AM +0800, Tom Reed wrote: > If I clean iptables in the destination host, this telnet will get success > at once. > > Any hints? Why have you not used "iptables -vL" to show the packet counts of each rule so you can see which rules t

Re: iptables reject with TCP RST

2023-05-14 Thread Tom Reed
is LA), both got timeout, rather than the expected disconnection quickly. $ telnet 193.106.250.86 587 Trying 193.106.250.86... telnet: Unable to connect to remote host: Connection timed out If I clean iptables in the destination host, this telnet will get success at once. Any hints? Thanks. --

Re: iptables reject with TCP RST

2023-05-14 Thread Andy Smith
Hi, On Sun, May 14, 2023 at 08:14:04AM +0800, Tom Reed wrote: > I have these iptables rules which reject tcp connections with tcp rst. First question, why are you using iptables instead of nft? On a new Debian install you actually are using nftables with an iptables compat layer, but a

Re: iptables reject with TCP RST

2023-05-14 Thread Tim Woodall
tcptraceroute might give you more clues as to where it's going wrong. In particular I'd look at local egress rules not allowing connections to port 587 outside of the lan. On Sun, 14 May 2023, Tom Reed wrote: On Sun, May 14, 2023 at 08:36:38AM +0800, Tom Reed wrote: tcp0 0 0.0.0.0

Re: iptables reject with TCP RST

2023-05-13 Thread Tom Reed
> On Sun, May 14, 2023 at 08:36:38AM +0800, Tom Reed wrote: >> tcp0 0 0.0.0.0:587 0.0.0.0:* >> LISTEN >> 32157/master >> >> >> And the telnet results: >> >> $ telnet 193.106.250.xx 587 >> Trying 193.106.250.xx... >> telnet: Unable to connect to remote host: Connection

Re: iptables reject with TCP RST

2023-05-13 Thread zithro
On 14 May 2023 02:36, Tom Reed wrote: $ telnet 193.106.250.xx 587 Trying 193.106.250.xx... telnet: Unable to connect to remote host: Connection timed out Run wireshark/dumpcap or tcpdump on the client to check if you get the TCP reset packet. You can also run it server-side, to see if the ser

Re: iptables reject with TCP RST

2023-05-13 Thread Greg Wooledge
On Sun, May 14, 2023 at 08:36:38AM +0800, Tom Reed wrote: > tcp0 0 0.0.0.0:587 0.0.0.0:* LISTEN > 32157/master > > > And the telnet results: > > $ telnet 193.106.250.xx 587 > Trying 193.106.250.xx... > telnet: Unable to connect to remote host: Connecti

Re: iptables reject with TCP RST

2023-05-13 Thread Tom Reed
> > On 14/5/23 08:28, Tom Reed wrote: >> I telnet to host:587 not the port 23. >> And port 587 already reject access with tcp rst. > -- > > check if you are listening on port 587 > > netstat -tulpnW | grep 587 > > yes it does. tcp0 0 0.0.0.0:587 0.0.0.0:* LI

Re: iptables reject with TCP RST

2023-05-13 Thread jeremy ardley
On 14/5/23 08:28, Tom Reed wrote: I telnet to host:587 not the port 23. And port 587 already reject access with tcp rst. -- check if you are listening on port 587 netstat -tulpnW | grep 587 Jeremy

Re: iptables reject with TCP RST

2023-05-13 Thread Tom Reed
> > On 14/5/23 08:14, Tom Reed wrote: >> /usr/sbin/iptables -A INPUT -p tcp --dport 143 -j REJECT --reject-with >> tcp-reset >> /usr/sbin/iptables -A INPUT -p tcp --dport 587 -j REJECT --reject-with >> tcp-reset >> >> When I telnet from another h

Re: iptables reject with TCP RST

2023-05-13 Thread Jeremy Ardley
On 14/5/23 08:14, Tom Reed wrote: /usr/sbin/iptables -A INPUT -p tcp --dport 143 -j REJECT --reject-with tcp-reset /usr/sbin/iptables -A INPUT -p tcp --dport 587 -j REJECT --reject-with tcp-reset When I telnet from another host to the protected port, it gets timeout message as follows

iptables reject with TCP RST

2023-05-13 Thread Tom Reed
Hello I have these iptables rules which reject tcp connections with tcp rst. /usr/sbin/iptables -A INPUT -p tcp --dport 143 -j REJECT --reject-with tcp-reset /usr/sbin/iptables -A INPUT -p tcp --dport 587 -j REJECT --reject-with tcp-reset When I telnet from another host to the protected port

Re: iptables and system reboot

2023-05-13 Thread Tom Reed
> > On 13/5/23 18:56, Tom Reed wrote: >> for iptables-save, after system rebooting, does it know where to locate >> the file? > > Yes. That's all taken care of by the iptables-persistent package > > Also I made a typo. correction; > > sudo nano /etc/ipta

Re: iptables and system reboot

2023-05-13 Thread jeremy ardley
On 13/5/23 18:56, Tom Reed wrote: for iptables-save, after system rebooting, does it know where to locate the file? Yes. That's all taken care of by the iptables-persistent package Also I made a typo. correction; sudo nano /etc/iptables/rules.v4 sudo nano /etc/iptables/rul

Re: iptables and system reboot

2023-05-13 Thread Tom Reed
> > On 13/5/23 18:48, Tom Reed wrote: >> How to recovery iptable rules after system rebooting? >> I know I can put a @reboot crontab for this but there is maybe the >> better >> way. > > > sudo apt install iptables-persistent > > sudo iptables-save >

Re: iptables and system reboot

2023-05-13 Thread Jeremy Ardley
On 13/5/23 18:48, Tom Reed wrote: How to recovery iptable rules after system rebooting? I know I can put a @reboot crontab for this but there is maybe the better way. sudo apt install iptables-persistent sudo iptables-save > /etc/iptables/rules.v4 sudo ip6tables-save > /etc/ip

iptables and system reboot

2023-05-13 Thread Tom Reed
Hello How to recovery iptable rules after system rebooting? I know I can put a @reboot crontab for this but there is maybe the better way. Thanks

Re: questions on iptables

2022-12-24 Thread Piperみかこ
Thanks John. The following rules seem to work for me now. sudo /usr/sbin/iptables -F sudo /usr/sbin/iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT sudo /usr/sbin/iptables -A INPUT -p icmp -j ACCEPT sudo /usr/sbin/iptables -A INPUT -i lo -j ACCEPT sudo /usr/sbin/iptables -A

Re: questions on iptables

2022-12-24 Thread John Conover
John Conover writes: > =?UTF-8?B?UGlwZXLjgb/jgYvjgZM=?= writes: > > > > sudo /usr/sbin/iptables -F > > sudo /usr/sbin/iptables -A INPUT -s 127.0.0.1 -j ACCEPT > > sudo /usr/sbin/iptables -A INPUT -s xx.xx.xx.xx -j ACCEPT # my server > > public IP > >

Re: questions on iptables

2022-12-24 Thread John Conover
=?UTF-8?B?UGlwZXLjgb/jgYvjgZM=?= writes: > > sudo /usr/sbin/iptables -F > sudo /usr/sbin/iptables -A INPUT -s 127.0.0.1 -j ACCEPT > sudo /usr/sbin/iptables -A INPUT -s xx.xx.xx.xx -j ACCEPT # my server > public IP > sudo /usr/sbin/iptables -A INPUT -p tcp --dport 22 -j ACCEP

Re: questions on iptables

2022-12-24 Thread Piperみかこ
rsync connection to another server from that box, it won't work (connection timeout). So how to ? Thanks On Sun, Dec 25, 2022 at 10:28 AM jeremy ardley wrote: > > On 25/12/22 10:14, Piperみかこ wrote: > > Hello, > > > > I have setup the following iptables on linux server,

Re: questions on iptables

2022-12-24 Thread Dan Ritter
Piperみかこ wrote: > Hello, > > I have setup the following iptables on linux server, > > sudo /usr/sbin/iptables -F > sudo /usr/sbin/iptables -A INPUT -s 127.0.0.1 -j ACCEPT > sudo /usr/sbin/iptables -A INPUT -s xx.xx.xx.xx -j ACCEPT # my server > public IP > sudo /us

Re: questions on iptables

2022-12-24 Thread jeremy ardley
On 25/12/22 10:14, Piperみかこ wrote: Hello, I have setup the following iptables on linux server, sudo /usr/sbin/iptables -F sudo /usr/sbin/iptables -A INPUT -s 127.0.0.1 -j ACCEPT sudo /usr/sbin/iptables -A INPUT -s xx.xx.xx.xx -j ACCEPT  # my server public IP sudo /usr/sbin/iptables -A

questions on iptables

2022-12-24 Thread Piperみかこ
Hello, I have setup the following iptables on linux server, sudo /usr/sbin/iptables -F sudo /usr/sbin/iptables -A INPUT -s 127.0.0.1 -j ACCEPT sudo /usr/sbin/iptables -A INPUT -s xx.xx.xx.xx -j ACCEPT # my server public IP sudo /usr/sbin/iptables -A INPUT -p tcp --dport 22 -j ACCEPT sudo /usr

Re: Moving from iptables to nftables

2021-04-02 Thread Alexander V. Makartsev
On 02.04.2021 14:23, William Torrez Corea wrote: Actually i'm moving/migrating from the old iptables/xtables (legacy) world to the new nftables framework. I execute step by step the migration process: 1. generate a translation of an iptables/ip6tables command to know the nft

Re: Moving from iptables to nftables

2021-04-02 Thread Georgi Naplatanov
On 4/2/21 12:23 PM, William Torrez Corea wrote: > Actually i'm moving/migrating from the old iptables/xtables (legacy) > world to the new nftables framework. > > I execute step by step the migration process: > > 1. generate a translation of an iptables/ip6tab

Moving from iptables to nftables

2021-04-02 Thread William Torrez Corea
Actually i'm moving/migrating from the old iptables/xtables (legacy) world to the new nftables framework. I execute step by step the migration process: 1. generate a translation of an iptables/ip6tables command to know the nftables equivalent 2. Translate the whole ruleset in a s

Re: iptables -Z option

2021-02-09 Thread john doe
ewall rules. [It starts near] the top with some lines that have been there for ever. After upgrading to buster I got an error executing this script and I cannot find out why. Using the extra echo lines I have been able to pinpoint the error to the iptables -Z line [...] IPTABLES=/usr/sbin/iptables

Re: iptables -Z option

2021-02-09 Thread Will Mengarini
p with some lines that have > been there for ever. After upgrading to buster I got an error > executing this script and I cannot find out why. Using the extra echo > lines I have been able to pinpoint the error to the iptables -Z line > > [...] > IPTABLES=/usr/sbin/iptables >

iptables -Z option

2021-02-09 Thread Bonno Bloksma
pinpoint the error to the iptables -Z line [...] IPTABLES=/usr/sbin/iptables echo flush # Flush all rules in all chains and then delete all chains chains=`cat /proc/net/ip_tables_names 2>/dev/null` for i in $chains; do $IPTABLES -t $i -F; done for i in $chains; do $IPTABLES -t $i -X; done e

Re: Stretch => Buster: iptables

2020-11-06 Thread Jesper Dybdal
On 2020-11-06 11:43, Sven Hartge wrote: Jesper Dybdal wrote: * The CT target, to add the ftp helper.  I fixed that by adding a bit of native nft with the nft command after all the iptables(-nft) commands. For the sake of the archive and people looking at this thread hoping for some insight

Re: Stretch => Buster: iptables

2020-11-06 Thread Sven Hartge
Jesper Dybdal wrote: > * The CT target, to add the ftp helper.  I fixed that by adding a bit of > native nft with the nft command after all the iptables(-nft) commands. For the sake of the archive and people looking at this thread hoping for some insight, please post your native nft rul

Re: Stretch => Buster: iptables

2020-11-06 Thread Jesper Dybdal
On 2020-10-16 12:25, I wrote: I have a lot of iptables rules. Is it correctly understood that the upgrade to Buster will automatically install iptables-nft, and that iptablés-nft provides complete and compatible support for the functionality of the old iptables command, so I can expect my

Re: Stretch => Buster: iptables

2020-10-16 Thread Pierre-Elliott Bécue
Le vendredi 16 octobre 2020 à 14:12:55+0200, Jesper Dybdal a écrit : > > On 2020-10-16 12:35, Reco wrote: > > Barring some kernel bugs - yes. > > For instance, I've seen kernel panics because of simple: > > > > iptables -A INPUT -m conntrack --ctstate INVA

Re: Stretch => Buster: iptables

2020-10-16 Thread Jesper Dybdal
On 2020-10-16 12:35, Reco wrote: Barring some kernel bugs - yes. For instance, I've seen kernel panics because of simple: iptables -A INPUT -m conntrack --ctstate INVALID -j DROP Aargh!   I had not realized that I would have to be prepared for kernel panics during the upgrade, so I r

Re: Stretch => Buster: iptables

2020-10-16 Thread Reco
Hi. On Fri, Oct 16, 2020 at 12:25:23PM +0200, Jesper Dybdal wrote: > I have a lot of iptables rules. > > Is it correctly understood that the upgrade to Buster will automatically > install iptables-nft, and that iptablés-nft provides complete and compatible > su

Stretch => Buster: iptables

2020-10-16 Thread Jesper Dybdal
I have a lot of iptables rules. Is it correctly understood that the upgrade to Buster will automatically install iptables-nft, and that iptablés-nft provides complete and compatible support for the functionality of the old iptables command, so I can expect my iptables scripts to just work

Re: stretch vs iptables auto-start

2020-08-24 Thread Gene Heskett
imes a day. And that was eating > > > up my bandwidth allocation on a slow net connection. > > > > > > Is there a tut someplace to guide one in converting from iptables > > > to this newer nftables? I'm assumeing its a similar utility. > > > > Sur

Re: stretch vs iptables auto-start

2020-08-24 Thread Andrew Cater
ned to deny the > > network spiders and bots that think they have to mirror my several > > giga-byte site, 2 or 3 times a day. And that was eating up my bandwidth > > allocation on a slow net connection. > > > > Is there a tut someplace to guide one in converting from

Re: stretch vs iptables auto-start

2020-08-24 Thread deloptes
gt; Is there a tut someplace to guide one in converting from iptables to this > newer nftables? I'm assumeing its a similar utility. Sure, but I have not looked into ... I only read there will be a couple of years transition period and somehow a compatibility layer is or can be used. Perhap

Re: stretch vs iptables auto-start

2020-08-24 Thread Greg Wooledge
nse. You're just inventing incorrect explanations for whatever behavior you're seeing that you don't understand. If an /etc/rc.local file exists and has the execute bit turned on, it is executed AS ROOT at BOOT TIME, before there is any "logged in user". > that has hidden the

Re: stretch vs iptables auto-start

2020-08-24 Thread Gene Heskett
On Monday 24 August 2020 04:45:01 Andrei POPESCU wrote: > On Du, 23 aug 20, 21:34:12, Gene Heskett wrote: > > On Sunday 23 August 2020 15:45:22 Joe wrote: > > > My server iptables is inherited from, I think, sarge, so it's > > > probably not done optimally tod

Re: stretch vs iptables auto-start

2020-08-24 Thread Andrei POPESCU
On Du, 23 aug 20, 21:34:12, Gene Heskett wrote: > On Sunday 23 August 2020 15:45:22 Joe wrote: > > > > My server iptables is inherited from, I think, sarge, so it's probably > > not done optimally today. It's an init script run from /etc/rcS.d. > > Ah,/etc/rcS

Re: stretch vs iptables auto-start

2020-08-24 Thread Joe
On Sun, 23 Aug 2020 21:34:12 -0400 Gene Heskett wrote: > On Sunday 23 August 2020 15:45:22 Joe wrote: > > > > > My server iptables is inherited from, I think, sarge, so it's > > probably not done optimally today. It's an init script run from > > /etc/

Re: stretch vs iptables auto-start

2020-08-24 Thread Tixy
On Sun, 2020-08-23 at 14:26 -0400, Gene Heskett wrote: > Greetings all; > > Since the big conversion of file structs vs who owns what, which > apparently includes running rc.local as the logged in user and not > as > root, that has hidden the iptables stuff from everybod

Re: stretch vs iptables auto-start

2020-08-23 Thread Gene Heskett
On Sunday 23 August 2020 16:10:10 deloptes wrote: > Hi Gene, > > Gene Heskett wrote: > > Since the big conversion of file structs vs who owns what, which > > apparently includes running rc.local as the logged in user and not > > as root, that has hidden the iptables st

Re: stretch vs iptables auto-start

2020-08-23 Thread Gene Heskett
ser and not > > as root, that has hidden the iptables stuff from everybody but root > > since its not now in the users $PATH. > > > > So what is the best way to assure this stuff gets started during a > > reboot or restart of X? Stuff that s/b running regardless of any X &

Re: stretch vs iptables auto-start

2020-08-23 Thread deloptes
Hi Gene, Gene Heskett wrote: > Since the big conversion of file structs vs who owns what, which > apparently includes running rc.local as the logged in user and not as > root, that has hidden the iptables stuff from everybody but root since > its not now in the users $PATH. >

Re: stretch vs iptables auto-start

2020-08-23 Thread Joe
On Sun, 23 Aug 2020 14:26:19 -0400 Gene Heskett wrote: > Greetings all; > > Since the big conversion of file structs vs who owns what, which > apparently includes running rc.local as the logged in user and not as > root, that has hidden the iptables stuff from everybody but r

stretch vs iptables auto-start

2020-08-23 Thread Gene Heskett
Greetings all; Since the big conversion of file structs vs who owns what, which apparently includes running rc.local as the logged in user and not as root, that has hidden the iptables stuff from everybody but root since its not now in the users $PATH. So what is the best way to assure this

Re: potential iptables problem

2020-07-04 Thread Gene Heskett
translated to > an ipv4 address somehow, and I may have inadvertently blocked it with > an iptables rule in my war against the robots that were burning up my > upload bandwidth. > > How do I go about determiniing that KCKB's ip address? Or, how is > that determined? > > Tha

Re: potential iptables problem

2020-07-04 Thread Andy Smith
to just look it up. > I use the gkrellm weather pluggin to get me an uptodate weather report > from the nearby airports call sign, but this has to be translated to an > ipv4 address somehow, and I may have inadvertently blocked it with an > iptables rule in my war against the robots tha

Re: potential iptables problem

2020-07-04 Thread Henning Follmann
s to be translated to an > ipv4 address somehow, and I may have inadvertently blocked it with an > iptables rule in my war against the robots that were burning up my > upload bandwidth. > > How do I go about determiniing that KCKB's ip address? Or, how is that > determin

potential iptables problem

2020-07-04 Thread Gene Heskett
an iptables rule in my war against the robots that were burning up my upload bandwidth. How do I go about determiniing that KCKB's ip address? Or, how is that determined? Thanks. Cheers, Gene Heskett -- "There are four boxes to be used in defense of liberty: soap, ballot, jury

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Andrei POPESCU
On Sb, 20 iun 20, 14:37:34, Tom Browder wrote: > > I have no love for iptables and very little experience with it. So it seems > I should remove the iptables package and install the nftables one. And I'll > look into firewalld which I tried briefly some years ago. In case yo

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Tom Browder
On Sat, Jun 20, 2020 at 12:44 Ben Lavender wrote: > Personally I'd learn nf_tables because that's the way forward and if you > stick to it's CLI then the better. > Thanks, Ben. -Tom

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Tom Browder
On Sat, Jun 20, 2020 at 10:48 wrote: > Hi, > ... > Actually, as explained on https://wiki.debian.org/nftables, Buster uses > an "iptables-nft layer (i.e, using iptables syntax with the nf_tables > kernel subsystem). This also affects ip6tables, arptables and ebtables.

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Ben Lavender
0, 15:25 Tom Browder, wrote: > I see it's recommended that Buster users use nftables, but the default > installation still uses iptables! > > I need to change ports on my new remote server to allow http and https > traffic, but should I keep using iptables? Or should I remove iptab

Re: What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread l0f4r0
Hi, 20 juin 2020 à 16:24 de tom.brow...@gmail.com: > I see it's recommended that Buster users use nftables, but the default > installation still uses iptables! > True & false. Actually, as explained on https://wiki.debian.org/nftables, Buster uses an "iptables-nft lay

What is the best practice for a firewall for Debian Buster: iptables or nftables?

2020-06-20 Thread Tom Browder
I see it's recommended that Buster users use nftables, but the default installation still uses iptables! I need to change ports on my new remote server to allow http and https traffic, but should I keep using iptables? Or should I remove iptables and install nftables first? If I keep ipt

RE: ifup && iptables error

2020-03-23 Thread Bonno Bloksma
Hi, [] > Right, your basic problem is that your interfaces are now names > enp7s0 > and > wlp6s0 > > not eth0 and wifi0 or whatever they used to be. > > Fix them in /etc/network/interfaces, double check your iptables rules > are either using the new names or don&

Re: ifup && iptables error

2020-03-20 Thread songbird
etc/network/interfaces" >> > failed. > > Right, your basic problem is that your interfaces are now names > enp7s0 > and > wlp6s0 > > not eth0 and wifi0 or whatever they used to be. > > Fix them in /etc/network/interfaces, double check your iptables > rules are either using the new names or don't mention interfaces > at all, and you should be relatively happy. or boot with the param to the kernel net.ifnames=0 songbird

  1   2   3   4   5   6   7   8   9   10   >