iptables: use template

netsplit
Niklas Yann Wettengel 8 years ago
parent 739f97d859
commit 6ef6aa8d62

@ -1,43 +0,0 @@
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p icmpv6 -j ACCEPT
# SSH-Server
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
# dns
-A INPUT -p tcp -m tcp --dport 53 -j ACCEPT
-A INPUT -p udp -m udp --dport 53 -j ACCEPT
# ntp
-A INPUT -p udp -m udp --dport 123 -j ACCEPT
# fastd
-A INPUT -p udp -m udp --dport 10010:10021 -j ACCEPT
# wireguard_mesh
-A INPUT -p udp -m udp --dport 10110 -j ACCEPT
-A INPUT -p udp -m udp --dport 10112 -j ACCEPT
-A INPUT -p udp -m udp --dport 10114 -j ACCEPT
-A INPUT -p udp -m udp --dport 10116 -j ACCEPT
-A INPUT -p udp -m udp --dport 10118 -j ACCEPT
-A INPUT -p udp -m udp --dport 10120 -j ACCEPT
-A INPUT -s fdff:4157:bb::/48 -p gre -j ACCEPT
-A INPUT -s fdff:434f:43bb::/48 -p gre -j ACCEPT
-A INPUT -s fdff:454d:53bb::/48 -p gre -j ACCEPT
-A INPUT -s fdff:4b4f:bb::/48 -p gre -j ACCEPT
-A INPUT -s fdff:4d59:bb::/48 -p gre -j ACCEPT
-A INPUT -s fdff:5349:4dbb::/48 -p gre -j ACCEPT
# MOSH
-A INPUT -p udp -m udp --dport 60000:61000 -j ACCEPT
# LOG
-A INPUT -m limit --limit 2/min -j LOG --log-prefix "IP6Tables-Dropped input: " --log-level 4
-A FORWARD -i bataw -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batcoc -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batems -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batko -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batmy -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batsim -p udp --dport 10010:10021 -j REJECT
-A FORWARD -m limit --limit 2/min -j LOG --log-prefix "IP6Tables-Dropped forward: " --log-level 4
COMMIT

@ -1,6 +1,6 @@
---
- name: copy iptables.rules
copy:
template:
src: iptables.rules
dest: /etc/iptables/iptables.rules
notify: reload iptables
@ -12,7 +12,7 @@
state: started
- name: copy ip6tables.rules
copy:
template:
src: ip6tables.rules
dest: /etc/iptables/ip6tables.rules
notify: reload ip6tables

@ -0,0 +1,37 @@
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p icmpv6 -j ACCEPT
# SSH-Server
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
# dns
-A INPUT -p tcp -m tcp --dport 53 -j ACCEPT
-A INPUT -p udp -m udp --dport 53 -j ACCEPT
# ntp
-A INPUT -p udp -m udp --dport 123 -j ACCEPT
# fastd
-A INPUT -p udp -m udp --dport 10010:10021 -j ACCEPT
# wireguard_mesh
{% for site in sites %}
-A INPUT -p udp -m udp --dport {{ site.wireguard_mesh_port }} -j ACCEPT
-A INPUT -s {{ site.wireguard_mesh_address }}/48 -p gre -j ACCEPT
{% endfor %}
# wireguard_backbone
-A INPUT -s fdff:4d59:4bbb::/48 -p gre -j ACCEPT
{% for peer in wireguard_bb_peers %}
-A INPUT -i bb{{ peer.name }} -p udp --dport 6696 -j ACCEPT
{% endfor %}
# MOSH
-A INPUT -p udp -m udp --dport 60000:61000 -j ACCEPT
# LOG
-A INPUT -m limit --limit 2/min -j LOG --log-prefix "IP6Tables-Dropped input: " --log-level 4
{% for site in sites %}
-A FORWARD -i bat{{ site.name }} -p udp --dport 10010:10021 -j REJECT
{% endfor %}
-A FORWARD -m limit --limit 2/min -j LOG --log-prefix "IP6Tables-Dropped forward: " --log-level 4
COMMIT

@ -4,12 +4,9 @@
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
-A PREROUTING -i bataw -j MARK --set-xmark 0x1/0xffffffff
-A PREROUTING -i batcoc -j MARK --set-xmark 0x1/0xffffffff
-A PREROUTING -i batems -j MARK --set-xmark 0x1/0xffffffff
-A PREROUTING -i batko -j MARK --set-xmark 0x1/0xffffffff
-A PREROUTING -i batmy -j MARK --set-xmark 0x1/0xffffffff
-A PREROUTING -i batsim -j MARK --set-xmark 0x1/0xffffffff
{% for site in sites %}
-A PREROUTING -i bat{{ site.name }} -j MARK --set-xmark 0x1/0xffffffff
{% endfor %}
COMMIT
*filter
:INPUT DROP [0:0]
@ -34,12 +31,9 @@ COMMIT
-A INPUT -p udp -m udp --dport 60000:61000 -j ACCEPT
-A INPUT -m limit --limit 2/min -j LOG --log-prefix "IPTables-Dropped input: " --log-level 4
-A FORWARD -i bataw -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batcoc -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batems -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batko -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batmy -p udp --dport 10010:10021 -j REJECT
-A FORWARD -i batsim -p udp --dport 10010:10021 -j REJECT
{% for site in sites %}
-A FORWARD -i bat{{ site.name }} -p udp --dport 10010:10021 -j REJECT
{% endfor %}
-A FORWARD -m limit --limit 2/min -j LOG --log-prefix "IPTables-Dropped forward: " --log-level 4
COMMIT
*nat
Loading…
Cancel
Save