Hi,

I've been blacklisting hosts that try to access unpublished ports by simply 
adding the following to the very end of my rules file:

ADD(POL_BL:src):info:polbl,add2polbl    net1,net2,net3:!+POL_BL,+GLOBAL_WL    
all    tcp,udp    -    !443,80,25

I'd rather not use the BLACKLIST policy and defining an ipset in 
DYNAMIC_BLACKLIST because I may have more than one ADD rule with different 
ipsets and parameters.

So I like the ADD rule I mentioned above except that if I remove the trailing 
"tcp,udp    -    !443,80,25" then I get unwanted results such as:

Shorewall:polbl:add2polbl:IN=enp9s6 [...] PROTO=TCP SPT=443 DPT=33046 
WINDOW=249 RES=0x00 ACK PSH URGP=0 MARK=0x3 
Shorewall:polbl:add2polbl:IN=enp9s5 [...] PROTO=TCP SPT=443 DPT=53763 
WINDOW=252 RES=0x00 ACK URGP=0 MARK=0x2 
Shorewall:polbl:add2polbl:IN=enp9s5 [...] PROTO=TCP SPT=443 DPT=43729 WINDOW=0 
RES=0x00 RST URGP=0 MARK=0x2 
Shorewall:polbl:add2polbl:IN=enp9s4 [...] PROTO=TCP SPT=25 DPT=42208 WINDOW=0 
RES=0x00 RST URGP=0 MARK=0x1 

I need to allow ACK and RST packets.

Is there a better way to write this (instead of explicitly specifying 
"!443,80,25")?

Thanks,

Vieri

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to