first commit
This commit is contained in:
40
etc_org/ufw/after.init
Normal file
40
etc_org/ufw/after.init
Normal file
@ -0,0 +1,40 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# after.init: if executable, called by ufw-init. See 'man ufw-framework' for
|
||||
# details. Note that output from these scripts is not seen via the
|
||||
# the ufw command, but instead via ufw-init.
|
||||
#
|
||||
# Copyright 2013 Canonical Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License version 3,
|
||||
# as published by the Free Software Foundation.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#
|
||||
set -e
|
||||
|
||||
case "$1" in
|
||||
start)
|
||||
# typically required
|
||||
;;
|
||||
stop)
|
||||
# typically required
|
||||
;;
|
||||
status)
|
||||
# optional
|
||||
;;
|
||||
flush-all)
|
||||
# optional
|
||||
;;
|
||||
*)
|
||||
echo "'$1' not supported"
|
||||
echo "Usage: after.init {start|stop|flush-all|status}"
|
||||
;;
|
||||
esac
|
30
etc_org/ufw/after.rules
Normal file
30
etc_org/ufw/after.rules
Normal file
@ -0,0 +1,30 @@
|
||||
#
|
||||
# rules.input-after
|
||||
#
|
||||
# Rules that should be run after the ufw command line added rules. Custom
|
||||
# rules should be added to one of these chains:
|
||||
# ufw-after-input
|
||||
# ufw-after-output
|
||||
# ufw-after-forward
|
||||
#
|
||||
|
||||
# Don't delete these required lines, otherwise there will be errors
|
||||
*filter
|
||||
:ufw-after-input - [0:0]
|
||||
:ufw-after-output - [0:0]
|
||||
:ufw-after-forward - [0:0]
|
||||
# End required lines
|
||||
|
||||
# don't log noisy services by default
|
||||
-A ufw-after-input -p udp --dport 137 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p udp --dport 138 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p tcp --dport 139 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p tcp --dport 445 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p udp --dport 67 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p udp --dport 68 -j ufw-skip-to-policy-input
|
||||
|
||||
# don't log noisy broadcast
|
||||
-A ufw-after-input -m addrtype --dst-type BROADCAST -j ufw-skip-to-policy-input
|
||||
|
||||
# don't delete the 'COMMIT' line or these rules won't be processed
|
||||
COMMIT
|
27
etc_org/ufw/after6.rules
Normal file
27
etc_org/ufw/after6.rules
Normal file
@ -0,0 +1,27 @@
|
||||
#
|
||||
# rules.input-after
|
||||
#
|
||||
# Rules that should be run after the ufw command line added rules. Custom
|
||||
# rules should be added to one of these chains:
|
||||
# ufw6-after-input
|
||||
# ufw6-after-output
|
||||
# ufw6-after-forward
|
||||
#
|
||||
|
||||
# Don't delete these required lines, otherwise there will be errors
|
||||
*filter
|
||||
:ufw6-after-input - [0:0]
|
||||
:ufw6-after-output - [0:0]
|
||||
:ufw6-after-forward - [0:0]
|
||||
# End required lines
|
||||
|
||||
# don't log noisy services by default
|
||||
-A ufw6-after-input -p udp --dport 137 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p udp --dport 138 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p tcp --dport 139 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p tcp --dport 445 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p udp --dport 546 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p udp --dport 547 -j ufw6-skip-to-policy-input
|
||||
|
||||
# don't delete the 'COMMIT' line or these rules won't be processed
|
||||
COMMIT
|
5
etc_org/ufw/applications.d/cups
Normal file
5
etc_org/ufw/applications.d/cups
Normal file
@ -0,0 +1,5 @@
|
||||
[CUPS]
|
||||
title=Common UNIX Printing System server
|
||||
description=CUPS is a printing system with support for IPP, samba, lpd, and other protocols.
|
||||
ports=631
|
||||
|
4
etc_org/ufw/applications.d/openssh-server
Normal file
4
etc_org/ufw/applications.d/openssh-server
Normal file
@ -0,0 +1,4 @@
|
||||
[OpenSSH]
|
||||
title=Secure shell server, an rshd replacement
|
||||
description=OpenSSH is a free implementation of the Secure Shell protocol.
|
||||
ports=22/tcp
|
40
etc_org/ufw/before.init
Normal file
40
etc_org/ufw/before.init
Normal file
@ -0,0 +1,40 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# before.init: if executable, called by ufw-init. See 'man ufw-framework' for
|
||||
# details. Note that output from these scripts is not seen via the
|
||||
# the ufw command, but instead via ufw-init.
|
||||
#
|
||||
# Copyright 2013 Canonical Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License version 3,
|
||||
# as published by the Free Software Foundation.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#
|
||||
set -e
|
||||
|
||||
case "$1" in
|
||||
start)
|
||||
# typically required
|
||||
;;
|
||||
stop)
|
||||
# typically required
|
||||
;;
|
||||
status)
|
||||
# optional
|
||||
;;
|
||||
flush-all)
|
||||
# optional
|
||||
;;
|
||||
*)
|
||||
echo "'$1' not supported"
|
||||
echo "Usage: before.init {start|stop|flush-all|status}"
|
||||
;;
|
||||
esac
|
77
etc_org/ufw/before.rules
Normal file
77
etc_org/ufw/before.rules
Normal file
@ -0,0 +1,77 @@
|
||||
#
|
||||
# rules.before
|
||||
#
|
||||
# Rules that should be run before the ufw command line added rules. Custom
|
||||
# rules should be added to one of these chains:
|
||||
# ufw-before-input
|
||||
# ufw-before-output
|
||||
# ufw-before-forward
|
||||
#
|
||||
|
||||
# Don't delete these required lines, otherwise there will be errors
|
||||
*filter
|
||||
:ufw-before-input - [0:0]
|
||||
:ufw-before-output - [0:0]
|
||||
:ufw-before-forward - [0:0]
|
||||
:ufw-not-local - [0:0]
|
||||
# End required lines
|
||||
|
||||
|
||||
# allow all on loopback
|
||||
-A ufw-before-input -i lo -j ACCEPT
|
||||
-A ufw-before-output -o lo -j ACCEPT
|
||||
|
||||
# quickly process packets for which we already have a connection
|
||||
-A ufw-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
-A ufw-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
-A ufw-before-forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
|
||||
# drop INVALID packets (logs these in loglevel medium and higher)
|
||||
-A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny
|
||||
-A ufw-before-input -m conntrack --ctstate INVALID -j DROP
|
||||
|
||||
# ok icmp codes for INPUT
|
||||
-A ufw-before-input -p icmp --icmp-type destination-unreachable -j ACCEPT
|
||||
-A ufw-before-input -p icmp --icmp-type source-quench -j ACCEPT
|
||||
-A ufw-before-input -p icmp --icmp-type time-exceeded -j ACCEPT
|
||||
-A ufw-before-input -p icmp --icmp-type parameter-problem -j ACCEPT
|
||||
-A ufw-before-input -p icmp --icmp-type echo-request -j ACCEPT
|
||||
|
||||
# ok icmp code for FORWARD
|
||||
-A ufw-before-forward -p icmp --icmp-type destination-unreachable -j ACCEPT
|
||||
-A ufw-before-forward -p icmp --icmp-type source-quench -j ACCEPT
|
||||
-A ufw-before-forward -p icmp --icmp-type time-exceeded -j ACCEPT
|
||||
-A ufw-before-forward -p icmp --icmp-type parameter-problem -j ACCEPT
|
||||
-A ufw-before-forward -p icmp --icmp-type echo-request -j ACCEPT
|
||||
|
||||
# allow dhcp client to work
|
||||
-A ufw-before-input -p udp --sport 67 --dport 68 -j ACCEPT
|
||||
|
||||
#
|
||||
# ufw-not-local
|
||||
#
|
||||
-A ufw-before-input -j ufw-not-local
|
||||
|
||||
# if LOCAL, RETURN
|
||||
-A ufw-not-local -m addrtype --dst-type LOCAL -j RETURN
|
||||
|
||||
# if MULTICAST, RETURN
|
||||
-A ufw-not-local -m addrtype --dst-type MULTICAST -j RETURN
|
||||
|
||||
# if BROADCAST, RETURN
|
||||
-A ufw-not-local -m addrtype --dst-type BROADCAST -j RETURN
|
||||
|
||||
# all other non-local packets are dropped
|
||||
-A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j ufw-logging-deny
|
||||
-A ufw-not-local -j DROP
|
||||
|
||||
# allow MULTICAST mDNS for service discovery (be sure the MULTICAST line above
|
||||
# is uncommented)
|
||||
-A ufw-before-input -p udp -d 224.0.0.251 --dport 5353 -j ACCEPT
|
||||
|
||||
# allow MULTICAST UPnP for service discovery (be sure the MULTICAST line above
|
||||
# is uncommented)
|
||||
-A ufw-before-input -p udp -d 239.255.255.250 --dport 1900 -j ACCEPT
|
||||
|
||||
# don't delete the 'COMMIT' line or these rules won't be processed
|
||||
COMMIT
|
138
etc_org/ufw/before6.rules
Normal file
138
etc_org/ufw/before6.rules
Normal file
@ -0,0 +1,138 @@
|
||||
#
|
||||
# rules.before
|
||||
#
|
||||
# Rules that should be run before the ufw command line added rules. Custom
|
||||
# rules should be added to one of these chains:
|
||||
# ufw6-before-input
|
||||
# ufw6-before-output
|
||||
# ufw6-before-forward
|
||||
#
|
||||
|
||||
# Don't delete these required lines, otherwise there will be errors
|
||||
*filter
|
||||
:ufw6-before-input - [0:0]
|
||||
:ufw6-before-output - [0:0]
|
||||
:ufw6-before-forward - [0:0]
|
||||
# End required lines
|
||||
|
||||
|
||||
# allow all on loopback
|
||||
-A ufw6-before-input -i lo -j ACCEPT
|
||||
-A ufw6-before-output -o lo -j ACCEPT
|
||||
|
||||
# drop packets with RH0 headers
|
||||
-A ufw6-before-input -m rt --rt-type 0 -j DROP
|
||||
-A ufw6-before-forward -m rt --rt-type 0 -j DROP
|
||||
-A ufw6-before-output -m rt --rt-type 0 -j DROP
|
||||
|
||||
# quickly process packets for which we already have a connection
|
||||
-A ufw6-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
-A ufw6-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
-A ufw6-before-forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
|
||||
# drop INVALID packets (logs these in loglevel medium and higher)
|
||||
-A ufw6-before-input -m conntrack --ctstate INVALID -j ufw6-logging-deny
|
||||
-A ufw6-before-input -m conntrack --ctstate INVALID -j DROP
|
||||
|
||||
# ok icmp codes for INPUT (rfc4890, 4.4.1 and 4.4.2)
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type packet-too-big -j ACCEPT
|
||||
# codes 0 and 1
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type time-exceeded -j ACCEPT
|
||||
# codes 0-2
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type parameter-problem -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type echo-request -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type echo-reply -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type router-solicitation -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type router-advertisement -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type neighbor-solicitation -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type neighbor-advertisement -m hl --hl-eq 255 -j ACCEPT
|
||||
# IND solicitation
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 141 -m hl --hl-eq 255 -j ACCEPT
|
||||
# IND advertisement
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 142 -m hl --hl-eq 255 -j ACCEPT
|
||||
# MLD query
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 130 -s fe80::/10 -j ACCEPT
|
||||
# MLD report
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 131 -s fe80::/10 -j ACCEPT
|
||||
# MLD done
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 132 -s fe80::/10 -j ACCEPT
|
||||
# MLD report v2
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 143 -s fe80::/10 -j ACCEPT
|
||||
# SEND certificate path solicitation
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 148 -m hl --hl-eq 255 -j ACCEPT
|
||||
# SEND certificate path advertisement
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 149 -m hl --hl-eq 255 -j ACCEPT
|
||||
# MR advertisement
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 151 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
# MR solicitation
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 152 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
# MR termination
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 153 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
|
||||
# ok icmp codes for OUTPUT (rfc4890, 4.4.1 and 4.4.2)
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type packet-too-big -j ACCEPT
|
||||
# codes 0 and 1
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type time-exceeded -j ACCEPT
|
||||
# codes 0-2
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type parameter-problem -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type echo-request -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type echo-reply -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type router-solicitation -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type neighbor-advertisement -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type neighbor-solicitation -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type router-advertisement -m hl --hl-eq 255 -j ACCEPT
|
||||
# IND solicitation
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 141 -m hl --hl-eq 255 -j ACCEPT
|
||||
# IND advertisement
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 142 -m hl --hl-eq 255 -j ACCEPT
|
||||
# MLD query
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 130 -s fe80::/10 -j ACCEPT
|
||||
# MLD report
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 131 -s fe80::/10 -j ACCEPT
|
||||
# MLD done
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 132 -s fe80::/10 -j ACCEPT
|
||||
# MLD report v2
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 143 -s fe80::/10 -j ACCEPT
|
||||
# SEND certificate path solicitation
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 148 -m hl --hl-eq 255 -j ACCEPT
|
||||
# SEND certificate path advertisement
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 149 -m hl --hl-eq 255 -j ACCEPT
|
||||
# MR advertisement
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 151 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
# MR solicitation
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 152 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
# MR termination
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 153 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
|
||||
# ok icmp codes for FORWARD (rfc4890, 4.3.1)
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type packet-too-big -j ACCEPT
|
||||
# codes 0 and 1
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type time-exceeded -j ACCEPT
|
||||
# codes 0-2
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type parameter-problem -j ACCEPT
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type echo-request -j ACCEPT
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type echo-reply -j ACCEPT
|
||||
# ok icmp codes for FORWARD (rfc4890, 4.3.2)
|
||||
# Home Agent Address Discovery Reques
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 144 -j ACCEPT
|
||||
# Home Agent Address Discovery Reply
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 145 -j ACCEPT
|
||||
# Mobile Prefix Solicitation
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 146 -j ACCEPT
|
||||
# Mobile Prefix Advertisement
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 147 -j ACCEPT
|
||||
|
||||
# allow dhcp client to work
|
||||
-A ufw6-before-input -p udp -s fe80::/10 --sport 547 -d fe80::/10 --dport 546 -j ACCEPT
|
||||
|
||||
# allow MULTICAST mDNS for service discovery
|
||||
-A ufw6-before-input -p udp -d ff02::fb --dport 5353 -j ACCEPT
|
||||
|
||||
# allow MULTICAST UPnP for service discovery
|
||||
-A ufw6-before-input -p udp -d ff02::f --dport 1900 -j ACCEPT
|
||||
|
||||
# don't delete the 'COMMIT' line or these rules won't be processed
|
||||
COMMIT
|
57
etc_org/ufw/sysctl.conf
Normal file
57
etc_org/ufw/sysctl.conf
Normal file
@ -0,0 +1,57 @@
|
||||
#
|
||||
# Configuration file for setting network variables. Please note these settings
|
||||
# override /etc/sysctl.conf. If you prefer to use /etc/sysctl.conf, please
|
||||
# adjust IPT_SYSCTL in /etc/default/ufw.
|
||||
#
|
||||
|
||||
# Uncomment this to allow this host to route packets between interfaces
|
||||
#net/ipv4/ip_forward=1
|
||||
#net/ipv6/conf/default/forwarding=1
|
||||
#net/ipv6/conf/all/forwarding=1
|
||||
|
||||
# Turn on Source Address Verification in all interfaces to prevent some
|
||||
# spoofing attacks
|
||||
net/ipv4/conf/default/rp_filter=1
|
||||
net/ipv4/conf/all/rp_filter=1
|
||||
|
||||
# Do not accept IP source route packets (we are not a router)
|
||||
net/ipv4/conf/default/accept_source_route=0
|
||||
net/ipv4/conf/all/accept_source_route=0
|
||||
net/ipv6/conf/default/accept_source_route=0
|
||||
net/ipv6/conf/all/accept_source_route=0
|
||||
|
||||
# Disable ICMP redirects. ICMP redirects are rarely used but can be used in
|
||||
# MITM (man-in-the-middle) attacks. Disabling ICMP may disrupt legitimate
|
||||
# traffic to those sites.
|
||||
net/ipv4/conf/default/accept_redirects=0
|
||||
net/ipv4/conf/all/accept_redirects=0
|
||||
net/ipv6/conf/default/accept_redirects=0
|
||||
net/ipv6/conf/all/accept_redirects=0
|
||||
|
||||
# Ignore bogus ICMP errors
|
||||
net/ipv4/icmp_echo_ignore_broadcasts=1
|
||||
net/ipv4/icmp_ignore_bogus_error_responses=1
|
||||
net/ipv4/icmp_echo_ignore_all=0
|
||||
|
||||
# Don't log Martian Packets (impossible packets)
|
||||
net/ipv4/conf/default/log_martians=0
|
||||
net/ipv4/conf/all/log_martians=0
|
||||
|
||||
# Change to '1' to enable TCP/IP SYN cookies This disables TCP Window Scaling
|
||||
# (http://lkml.org/lkml/2008/2/5/167)
|
||||
net/ipv4/tcp_syncookies=0
|
||||
|
||||
#net/ipv4/tcp_fin_timeout=30
|
||||
#net/ipv4/tcp_keepalive_intvl=1800
|
||||
|
||||
# normally allowing tcp_sack is ok, but if going through OpenBSD 3.8 RELEASE or
|
||||
# earlier pf firewall, should set this to 0
|
||||
net/ipv4/tcp_sack=1
|
||||
|
||||
# Uncomment this to turn off ipv6 autoconfiguration
|
||||
#net/ipv6/conf/default/autoconf=0
|
||||
#net/ipv6/conf/all/autoconf=0
|
||||
|
||||
# Uncomment this to enable ipv6 privacy addressing
|
||||
#net/ipv6/conf/default/use_tempaddr=2
|
||||
#net/ipv6/conf/all/use_tempaddr=2
|
10
etc_org/ufw/ufw.conf
Normal file
10
etc_org/ufw/ufw.conf
Normal file
@ -0,0 +1,10 @@
|
||||
# /etc/ufw/ufw.conf
|
||||
#
|
||||
|
||||
# Set to yes to start on boot. If setting this remotely, be sure to add a rule
|
||||
# to allow your remote connection before starting ufw. Eg: 'ufw allow 22/tcp'
|
||||
ENABLED=no
|
||||
|
||||
# Please use the 'ufw' command to set the loglevel. Eg: 'ufw logging medium'.
|
||||
# See 'man ufw' for details.
|
||||
LOGLEVEL=low
|
11
etc_org/ufw/user.rules
Normal file
11
etc_org/ufw/user.rules
Normal file
@ -0,0 +1,11 @@
|
||||
*filter
|
||||
:ufw-user-input - [0:0]
|
||||
:ufw-user-output - [0:0]
|
||||
:ufw-user-forward - [0:0]
|
||||
:ufw-user-limit - [0:0]
|
||||
:ufw-user-limit-accept - [0:0]
|
||||
### RULES ###
|
||||
-A ufw-user-limit -m limit --limit 3/minute -j LOG --log-prefix "[UFW LIMIT BLOCK] "
|
||||
-A ufw-user-limit -j REJECT
|
||||
-A ufw-user-limit-accept -j ACCEPT
|
||||
COMMIT
|
6
etc_org/ufw/user6.rules
Normal file
6
etc_org/ufw/user6.rules
Normal file
@ -0,0 +1,6 @@
|
||||
*filter
|
||||
:ufw6-user-input - [0:0]
|
||||
:ufw6-user-output - [0:0]
|
||||
:ufw6-user-forward - [0:0]
|
||||
### RULES ###
|
||||
COMMIT
|
Reference in New Issue
Block a user