Ele fica rede interna, é um servidor de proxy com velox, os e-mails usam a
porta 25 e 110.
Em 27/11/06, fedora-users-br-request(a)redhat.com <
fedora-users-br-request(a)redhat.com> escreveu:
enviar inscrições da lista de discussão Send Fedora-users-br para
fedora-users-br(a)redhat.com
Para se cadastrar ou descadastrar via WWW, visite o endereço
https://www.redhat.com/mailman/listinfo/fedora-users-br
ou, via email, envie uma mensagem com a palavra 'help' no assunto ou
corpo da mensagem para
fedora-users-br-request(a)redhat.com
Você poderá entrar em contato com a pessoa que gerencia a lista pelo
endereço
fedora-users-br-owner(a)redhat.com
Quando responder, por favor edite sua linha Assunto assim ela será
mais específica que "Re: Contents of Fedora-users-br digest..."
Tópicos de Hoje:
1. Firewall fedora?? não envia e-mail (Bruno Yahoo)
2. Re: Firewall fedora?? não envia e-mail (Felipe Tocchetto)
3. Re: Firewall fedora?? não envia e-mail (Alexandre Singulani)
4. firewall naõ deixa enviar e-mails (Bruno Contin)
----------------------------------------------------------------------
Message: 1
Date: Mon, 27 Nov 2006 08:44:21 -0200
From: "Bruno Yahoo" <brunoce10(a)yahoo.com.br>
Subject: [Fedora-users-br] Firewall fedora?? não envia e-mail
To: <fedora-users-br(a)redhat.com>
Message-ID: <000f01c71211$010928f0$0a00a8c0@bruno>
Content-Type: text/plain; charset="iso-8859-1"
Olá comunidade, eu estou com um problema, implementei um firewall com
proxy ( squid ) no Fedora, a net está ok, o proxy também, só que não consigo
receber e-mails e nem enviar, e as portas no firewall estão abertas para
isso.
esse é o meu firewall, se alguém puder me ajudar, eu agradeço... Vamos
criar uma lista de pessoas que queiram conversar via Google Talk para tirar
dúvidas? o meu é brunorodeiro(a)gmail.com
abraços...
#!/bin/bash
stop ()
{
echo "0" > /proc/sys/net/ipv4/ip_forward
iptables -F
iptables -X
}
start ()
{
############################# Limpar as regras primeiro
/usr/sbin/iptables -F
/usr/sbin/iptables -t nat -F
/usr/sbin/iptables -F -t mangle
/usr/sbin/iptables -X -t mangle
############################# Insere os modulos kernel
/sbin/modprobe iptable_nat
/sbin/modprobe iptable_mangle
/sbin/modprobe ipt_conntrack
/sbin/modprobe ip_conntrack_ftp
/sbin/modprobe ip_nat_ftp
/sbin/modprobe ipt_multiport
/sbin/modprobe ipt_LOG
/sbin/modprobe ipt_mark
/sbin/modprobe ipt_MARK
echo 1 > /proc/sys/net/ipv4/ip_forward
echo "0" > /proc/sys/net/ipv4/tcp_ecn
###########################################
#/usr/sbin/iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
/usr/sbin/iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
########### LOGS ######################
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 5190 -j LOG
--log-prefix "LOG ICQ: "
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 1863 -j LOG
--log-prefix "LOG MSN: "
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 22 -j LOG
--log-prefix "Serviço SSH: "
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 21 -j LOG
--log-prefix "Serviço FTP: "
#####################################
# PROTECAO EXTRA
#####################################
############## Brute Force ############
/usr/sbin/iptables -A INPUT -p tcp --syn --dport 22 -m recent --name
sshattack --set
/usr/sbin/iptables -A INPUT -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j LOG --log-prefix 'SSH
REJECT: '
/usr/sbin/iptables -A INPUT -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j REJECT --reject-with
tcp-reset
/usr/sbin/iptables -A FORWARD -p tcp --syn --dport 22 -m recent --name
sshattack --set
/usr/sbin/iptables -A FORWARD -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j LOG --log-prefix 'SSH
REJECT: '
/usr/sbin/iptables -A FORWARD -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j REJECT --reject-with
tcp-reset
############# Proteção contra trojans ################
/usr/sbin/iptables -N TROJAN
/usr/sbin/iptables -A TROJAN -m limit --limit 15/m -j LOG --log-level 6
--log-prefix "FIREWALL: trojan: "
/usr/sbin/iptables -A TROJAN -j DROP
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 666 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 666 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 4000 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 6000 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 6006 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 16660 -j TROJAN
############## Proteção contra worms #################
/usr/sbin/iptables -A FORWARD -p tcp --dport 135 -i eth0 -j REJECT
############## SYN-flood ############
/usr/sbin/iptables -A FORWARD -p tcp --syn -m limit --limit 1/s -j ACCEPT
############## ping da morte ########
/usr/sbin/iptables -A FORWARD -p icmp --icmp-type echo-request -m limit
--limit 1/s -j ACCEPT
########### Port Scanners ###########
/usr/sbin/iptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m
limit --limit 1/s -j DROP
########## IP Spoofing ##############
/usr/sbin/iptables -N syn-flood
/usr/sbin/iptables -A INPUT -i eth0 -p tcp --syn -j syn-flood
/usr/sbin/iptables -A INPUT -s 10.0.0.0/8 -i eth0 -j DROP
/usr/sbin/iptables -A INPUT -s 172.16.0.0/16 -i eth0 -j DROP
/usr/sbin/iptables -A INPUT -s 192.168.0.0/24 -i eth0 -j DROP
######## anomalias de pacotes #######
/usr/sbin/iptables -A FORWARD -m unclean -j DROP
################### CEF ########################
/usr/sbin/iptables -t nat -A PREROUTING -p tcp -d 200.201.174.0/16 -j
ACCEPT
/usr/sbin/iptables -A FORWARD -p tcp -d 200.201.174.0/16 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp -d 200.201.166.0/16 -j
ACCEPT
/usr/sbin/iptables -A FORWARD -p tcp -d 200.201.166.0/16 -j ACCEPT
############################# Redirecionar 80, 3128 -> 3128
#/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 2100 -j DNAT
--to-destination 192.168.0.1:3128
#/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 80 -s
192.168.0.0/24 -j DNAT --to-destination 192.168.0.1:3128
iptables -t nat -A PREROUTING -i eth1 -p tcp -m multiport -s
192.168.0.0/24 --dport 80,443,563 -j REDIRECT --to-port 3128
############################# Aceitar lista de portas padrao
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 21 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 22 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 23 -j ACCEPT -s
192.168.0.145
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 25 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 53 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 80 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 110 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 443 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 465 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 500 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 587 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 995 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 3306 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 2100 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 8080 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 5017 -j ACCEPT -s
192.168.0.0/24
########## ICQ ################
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 5190 -j ACCEPT -s
192.168.0.50
########### MSN #######################
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 1863 -j ACCEPT -s
192.168.0.128
######################################
# Filtros de portas udp
######################################
/usr/sbin/iptables -t nat -A PREROUTING -p udp --dport 53 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 53 -j ACCEPT
########### Apos feitas as regras rejeitar todos os outros pacotes
/usr/sbin/iptables -t nat -p tcp -A PREROUTING -j DROP
/usr/sbin/iptables -t nat -p udp -A PREROUTING -j DROP
}
case $1 in
start)
echo -n Starting Firewall...
add_rules
echo "Done"
;;
stop)
echo -n Stoping Firewall...
flush_rules
echo "Done"
;;
restart)
echo -n Restarting Firewall...
flush_rules
add_rules
echo "Done"
;;
status)
echo "============================ Firewall rules:"
iptables -L -n
echo "============================ Masquerade tables:"
iptables -t nat -L -n
echo "============================ Mangle table:"
iptables -t mangle -L -n
;;
*)
echo Usar: "$0 { status | start | stop | restart }"
;;
esac
-------------- Próxima Parte ----------
Um anexo em HTML foi limpo...
URL:
https://www.redhat.com/archives/fedora-users-br/attachments/20061127/0e8b...
------------------------------
Message: 2
Date: Mon, 27 Nov 2006 08:51:51 -0200
From: "Felipe Tocchetto" <felipe(a)tocchetto.com>
Subject: Re: [Fedora-users-br] Firewall fedora?? não envia e-mail
To: " Lista de discussão voltada para os usuários brasileiros do
Fedora " <fedora-users-br(a)redhat.com>
Message-ID:
<4f70c5c80611270251l75710ab3jbcafa9714171a708(a)mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Seu servidor de email fica dentro da rede?
Em 27/11/06, Bruno Yahoo<brunoce10(a)yahoo.com.br> escreveu:
>
>
> Olá comunidade, eu estou com um problema, implementei um firewall com
proxy
> ( squid ) no Fedora, a net está ok, o proxy também, só que não consigo
> receber e-mails e nem enviar, e as portas no firewall estão abertas para
> isso.
> esse é o meu firewall, se alguém puder me ajudar, eu agradeço... Vamos
criar
> uma lista de pessoas que queiram conversar via Google Talk para tirar
> dúvidas? o meu é brunorodeiro(a)gmail.com
> abraços...
> #!/bin/bash
>
> stop ()
> {
> echo "0" > /proc/sys/net/ipv4/ip_forward
> iptables -F
> iptables -X
> }
>
> start ()
> {
>
> ############################# Limpar as regras primeiro
--
Felipe L. Tocchetto
http://felipe.tocchetto.com
------------------------------
Message: 3
Date: Mon, 27 Nov 2006 12:04:58 +0000
From: "Alexandre Singulani" <alexsingr(a)hotmail.com>
Subject: Re: [Fedora-users-br] Firewall fedora?? não envia e-mail
To: fedora-users-br(a)redhat.com
Message-ID: <BAY106-F6C55F9BA1A0D91B217169BEE60(a)phx.gbl>
Content-Type: text/plain; charset="iso-8859-1"
Um anexo em HTML foi limpo...
URL:
https://www.redhat.com/archives/fedora-users-br/attachments/20061127/e912...
------------------------------
Message: 4
Date: Mon, 27 Nov 2006 10:35:35 -0200
From: "Bruno Contin" <brunorodeiro(a)gmail.com>
Subject: [Fedora-users-br] firewall naõ deixa enviar e-mails
To: fedora-users-br(a)redhat.com
Message-ID:
<c1066330611270435p1b8c6c03y83b739494117a619(a)mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"
Olá comunidade, eu estou com um problema, implementei um firewall com
proxy
( squid ) no Fedora, a net está ok, o proxy também, só que não consigo
receber e-mails e nem enviar, e as portas no firewall estão abertas para
isso.
esse é o meu firewall, se alguém puder me ajudar, eu agradeço... Vamos
criar
uma lista de pessoas que queiram conversar via Google Talk para tirar
dúvidas? o meu é brunorodeiro(a)gmail.com
abraços...
obs: troquei de-mail pois no yahoo não estava recebendo. agora estou com
brunorodeiro(a)gmail.com
obs: se eu colocar também uma regra no firewall para excluir determinado
ip
do proxy, os e-mails funcionam normalmente...
#!/bin/bash
stop ()
{
echo "0" > /proc/sys/net/ipv4/ip_forward
iptables -F
iptables -X
}
start ()
{
############################# Limpar as regras primeiro
/usr/sbin/iptables -F
/usr/sbin/iptables -t nat -F
/usr/sbin/iptables -F -t mangle
/usr/sbin/iptables -X -t mangle
############################# Insere os modulos kernel
/sbin/modprobe iptable_nat
/sbin/modprobe iptable_mangle
/sbin/modprobe ipt_conntrack
/sbin/modprobe ip_conntrack_ftp
/sbin/modprobe ip_nat_ftp
/sbin/modprobe ipt_multiport
/sbin/modprobe ipt_LOG
/sbin/modprobe ipt_mark
/sbin/modprobe ipt_MARK
echo 1 > /proc/sys/net/ipv4/ip_forward
echo "0" > /proc/sys/net/ipv4/tcp_ecn
###########################################
#/usr/sbin/iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
/usr/sbin/iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
########### LOGS ######################
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 5190 -j LOG
--log-prefix "LOG ICQ: "
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 1863 -j LOG
--log-prefix "LOG MSN: "
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 22 -j LOG
--log-prefix "Serviço SSH: "
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 21 -j LOG
--log-prefix "Serviço FTP: "
#####################################
# PROTECAO EXTRA
#####################################
############## Brute Force ############
/usr/sbin/iptables -A INPUT -p tcp --syn --dport 22 -m recent --name
sshattack --set
/usr/sbin/iptables -A INPUT -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j LOG --log-prefix 'SSH
REJECT: '
/usr/sbin/iptables -A INPUT -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j REJECT --reject-with
tcp-reset
/usr/sbin/iptables -A FORWARD -p tcp --syn --dport 22 -m recent --name
sshattack --set
/usr/sbin/iptables -A FORWARD -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j LOG --log-prefix 'SSH
REJECT: '
/usr/sbin/iptables -A FORWARD -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j REJECT --reject-with
tcp-reset
############# Proteção contra trojans ################
/usr/sbin/iptables -N TROJAN
/usr/sbin/iptables -A TROJAN -m limit --limit 15/m -j LOG --log-level 6
--log-prefix "FIREWALL: trojan: "
/usr/sbin/iptables -A TROJAN -j DROP
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 666 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 666 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 4000 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 6000 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 6006 -j TROJAN
/usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 16660 -j TROJAN
############## Proteção contra worms #################
/usr/sbin/iptables -A FORWARD -p tcp --dport 135 -i eth0 -j REJECT
############## SYN-flood ############
/usr/sbin/iptables -A FORWARD -p tcp --syn -m limit --limit 1/s -j ACCEPT
############## ping da morte ########
/usr/sbin/iptables -A FORWARD -p icmp --icmp-type echo-request -m limit
--limit 1/s -j ACCEPT
########### Port Scanners ###########
/usr/sbin/iptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m
limit --limit 1/s -j DROP
########## IP Spoofing ##############
/usr/sbin/iptables -N syn-flood
/usr/sbin/iptables -A INPUT -i eth0 -p tcp --syn -j syn-flood
/usr/sbin/iptables -A INPUT -s 10.0.0.0/8 -i eth0 -j DROP
/usr/sbin/iptables -A INPUT -s 172.16.0.0/16 -i eth0 -j DROP
/usr/sbin/iptables -A INPUT -s 192.168.0.0/24 -i eth0 -j DROP
######## anomalias de pacotes #######
/usr/sbin/iptables -A FORWARD -m unclean -j DROP
################### CEF ########################
/usr/sbin/iptables -t nat -A PREROUTING -p tcp -d 200.201.174.0/16 -j
ACCEPT
/usr/sbin/iptables -A FORWARD -p tcp -d 200.201.174.0/16 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp -d 200.201.166.0/16 -j
ACCEPT
/usr/sbin/iptables -A FORWARD -p tcp -d 200.201.166.0/16 -j ACCEPT
############################# Redirecionar 80, 3128 -> 3128
#/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 2100 -j DNAT
--to-destination 192.168.0.1:3128
#/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 80 -s
192.168.0.0/24 -j DNAT --to-destination 192.168.0.1:3128
iptables -t nat -A PREROUTING -i eth1 -p tcp -m multiport -s
192.168.0.0/24--dport 80,443,563 -j REDIRECT --to-port 3128
############################# Aceitar lista de portas padrao
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 21 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 22 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 23 -j ACCEPT -s
192.168.0.145
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 25 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 53 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 80 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 110 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 443 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 465 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 500 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 587 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 995 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 3306 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 2100 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 8080 -j ACCEPT -s
192.168.0.0/24
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 5017 -j ACCEPT -s
192.168.0.0/24
########## ICQ ################
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 5190 -j ACCEPT -s
192.168.0.50
########### MSN #######################
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 1863 -j ACCEPT -s
192.168.0.128
######################################
# Filtros de portas udp
######################################
/usr/sbin/iptables -t nat -A PREROUTING -p udp --dport 53 -j ACCEPT
/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 53 -j ACCEPT
########### Apos feitas as regras rejeitar todos os outros pacotes
/usr/sbin/iptables -t nat -p tcp -A PREROUTING -j DROP
/usr/sbin/iptables -t nat -p udp -A PREROUTING -j DROP
}
case $1 in
start)
echo -n Starting Firewall...
add_rules
echo "Done"
;;
stop)
echo -n Stoping Firewall...
flush_rules
echo "Done"
;;
restart)
echo -n Restarting Firewall...
flush_rules
add_rules
echo "Done"
;;
status)
echo "============================ Firewall rules:"
iptables -L -n
echo "============================ Masquerade tables:"
iptables -t nat -L -n
echo "============================ Mangle table:"
iptables -t mangle -L -n
;;
*)
echo Usar: "$0 { status | start | stop | restart }"
;;
esac
-------------- Próxima Parte ----------
Um anexo em HTML foi limpo...
URL:
https://www.redhat.com/archives/fedora-users-br/attachments/20061127/f26a...
------------------------------
--
Fedora-users-br mailing list
Fedora-users-br(a)redhat.com
https://www.redhat.com/mailman/listinfo/fedora-users-br
Site do Projeto Fedora Brasileiro =
http://www.projetofedora.org
Fim da Digest Fedora-users-br, volume 13, assunto 71
****************************************************