bfe31cfec8
qubes-firewall will now blacklist IP addresses from all connected machines on non-vif* interfaces. This prevents spoofing source or target address on packets going over an upstream link, even if a VM in question is powered off at the moment. Depends on QubesOS/qubes-core-admin#303 which makes admin maintain the list of IPs in qubesdb. Fixes QubesOS/qubes-issues#5540.
40 lines
1.1 KiB
Plaintext
40 lines
1.1 KiB
Plaintext
# Generated by iptables-save v1.4.5 on Mon Sep 6 08:57:46 2010
|
|
*nat
|
|
:PREROUTING ACCEPT [0:0]
|
|
:OUTPUT ACCEPT [0:0]
|
|
:POSTROUTING ACCEPT [0:0]
|
|
:PR-QBS - [0:0]
|
|
:PR-QBS-SERVICES - [0:0]
|
|
-A PREROUTING -j PR-QBS
|
|
-A PREROUTING -j PR-QBS-SERVICES
|
|
-A POSTROUTING -o vif+ -j ACCEPT
|
|
-A POSTROUTING -o lo -j ACCEPT
|
|
-A POSTROUTING -j MASQUERADE
|
|
COMMIT
|
|
*mangle
|
|
:QBS-PREROUTING - [0:0]
|
|
:QBS-POSTROUTING - [0:0
|
|
-A PREROUTING -j QBS-PREROUTING
|
|
-A POSTROUTING -j QBS-POSTROUTING
|
|
COMMIT
|
|
# Completed on Mon Sep 6 08:57:46 2010
|
|
# Generated by iptables-save v1.4.5 on Mon Sep 6 08:57:46 2010
|
|
*filter
|
|
:INPUT DROP [0:0]
|
|
:FORWARD DROP [0:0]
|
|
:OUTPUT ACCEPT [0:0]
|
|
:QBS-FORWARD - [0:0]
|
|
-A INPUT -i vif+ -p udp -m udp --dport 68 -j DROP
|
|
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
|
-A INPUT -i vif+ -p icmp -j ACCEPT
|
|
-A INPUT -i lo -j ACCEPT
|
|
-A INPUT -i vif+ -j REJECT --reject-with icmp-host-prohibited
|
|
-A INPUT -j DROP
|
|
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
|
-A FORWARD -j QBS-FORWARD
|
|
-A FORWARD -i vif+ -o vif+ -j DROP
|
|
-A FORWARD -i vif+ -j ACCEPT
|
|
-A FORWARD -j DROP
|
|
COMMIT
|
|
# Completed on Mon Sep 6 08:57:46 2010
|