[Ubuntu-BR] Firewall Ubuntu 10.04

Jeferson Rodrigues jeferod83 em gmail.com
Terça Março 20 14:39:15 UTC 2012


Bom dia Wilson,

Você vai colocar no /etc/init.d/ o script?

Abraços

Em 20 de março de 2012 11:18, Wilson Bom <wilson_bom em yahoo.com.br> escreveu:

> Bom dia Pessoal,
>
> Estou tentando instalar firewall e gostaria da opinião dos senhores a
> respeito do script abaixo.
>
> ------------------------------**--------
>
>
> #! /bin/bash
>
> case "$1" in
> start)
>
>    ###############
>    # TITULO ABRE #
>    ###############
>    echo "Iniciando a Configuração do Firewall"
>
>    ########################
>    # Zera todas as Regras #
>    ########################
>    echo "Regras Zeradas"
>      iptables -F
>
>    ##############################**##########
>    # Bloqueia tudo, nada entra e nada sai #
>    ##############################**##########
>    echo "Fechando tudo"
>      iptables -P INPUT DROP
>      iptables -P FORWARD DROP
>      iptables -P OUTPUT DROP
>
>    ##############################**##############################**
> ################
>    # Impede ataques DoS a maquina limitando a quantidade de respostas do
> ping #
>    ##############################**##############################**
> ################
>    #echo "Previne ataques DoS"
>    #  iptables -A INPUT -p icmp --icmp-type echo-request -m limit --limit
> 1/s -j ACCEPT
>
>    ##############################**###
>    # Bloqieia completamente o ping #
>    ##############################**###
>    echo "Bloqueia o pings"
>      iptables -A INPUT -p icmp --icmp-type echo-request -j DROP
>
>    ##########################
>    # Politicas de segurança #
>    ##########################
>    echo "Implementação de politicas de segurança"
>      echo 0 > /proc/sys/net/ipv4/conf/all/**accept_source_route # Impede
> falsear pacote
>      echo 0 > /proc/sys/net/ipv4/conf/all/**accept_redirects # Perigo de
> descobrimento de rotas de roteamento (desativar em roteador)
>      echo 1 > /proc/sys/net/ipv4/icmp_echo_**ignore_broadcasts # Risco de
> DoS
>      echo 1 > /proc/sys/net/ipv4/tcp_**syncookies # Só inicia a conexão
> quando recebe a confirmação, diminuindo a banda gasta
>      echo 1 > /proc/sys/net/ipv4/conf/**default/rp_filter # Faz o
> firewall responder apenas a placa de rede que recebeu o pacote
>      iptables -A INPUT -m state --state INVALID -j DROP # Elimina os
> pacotes invalidos
>
>    ##############################**###
>    # Libera conexoes estabelecidas #
>    ##############################**###
>    echo "Liberando conexões estabelecidas"
>      iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
>      iptables -A FORWARD -m state --state RELATED,ESTABLISHED,NEW -j ACCEPT
>      iptables -A OUTPUT -m state --state RELATED,ESTABLISHED,NEW -j ACCEPT
>      iptables -A INPUT -i lo -j ACCEPT
>
>    ##############################**##############################**
> ###########################
>    # Libera o acesso via SSH e Limita o número de tentativas de acesso a 4
> a cada minuto #
>    ##############################**##############################**
> ###########################
>    echo "Liberando o SSH"
>      iptables -I INPUT -p tcp --dport 22 -i eth0 -m state --state NEW -m
> recent --update --seconds 60 --hitcount 4 -j DROP
>      iptables -A INPUT -p tcp --dport 22 -j ACCEPT
>      iptables -A INPUT -p udp --dport 22 -j ACCEPT
>
>    ##################
>    # Libera o Samba #
>    ##################
>    echo "Liberando o Samba"
>      iptables -A INPUT -p tcp --dport 137:139 -j ACCEPT
>      iptables -A INPUT -p udp --dport 137:139 -j ACCEPT
>
>    ###################
>    # Libera o Apache #
>    ###################
>    echo "Liberando o Apache"
>      iptables -A INPUT -p tcp --dport 80 -j ACCEPT
>
>    ################
>    # TITULO FECHA #
>    ################
>    echo "Configuração do Firewall Concluida."
>
> ;;
>
> stop)
>     echo "Finalizando o Firewall"
>     rm -rf /var/lock/subsys/firewall
>
>     # ------------------------------**------------------------------**
> -----
>     # Remove todas as regras existentes
>     # ------------------------------**------------------------------**
> -----
>       iptables -F
>       iptables -X
>       iptables -t mangle -F
>     # ------------------------------**------------------------------**
> -----
>     # Reseta as politicas padrões, aceitar tudo
>     # ------------------------------**------------------------------**
> -----
>       iptables -P INPUT   ACCEPT
>       iptables -P OUTPUT  ACCEPT
>       iptables -P FORWARD ACCEPT
>
> ;;
>
> restart|reload)
>       $0 stop
>       $0 start
>     ;;
>
> *)
>   echo "Selecione uma opção valida {start|stop|status|restart|**reload}"
>   exit 1
>
> esac
>
> exit 0
>
>
> --
>
> Wilson Bom
>
>
>  Serprodata Informática Ltda.
>  Av. Marcelino Pires, 1405 - Sala 216
>  79800-004 - Dourados - MS
>  (067) 3421-3343 - 8407-4808 - 8407-8808
>
>  Messenger: serprodata em hotmail.com
>
>  E-mail...: serprodata em hotmail.com
>            wilson_bom em hotmail.com
>            wilson_bom em yahoo.com.br
>            wilson.bom em gmail.com
>
>
>
>  Ubuntu Lucid Lynx 10.04 - 2.6.32-25 #44
>  Linux Counter: 292553
>  Dataflex 3.2 Linux - Dataflex 3.2 MS-Dos
>
>
>
>
>
> --
> Mais sobre o Ubuntu em português: http://www.ubuntu-br.org/**comece<http://www.ubuntu-br.org/comece>
>
> Lista de discussão Ubuntu Brasil
> Histórico, descadastramento e outras opções:
> https://lists.ubuntu.com/**mailman/listinfo/ubuntu-br<https://lists.ubuntu.com/mailman/listinfo/ubuntu-br>
>



More information about the ubuntu-br mailing list