[Auto-Sync] Atualização das configurações em srvproxy001.itguys.com.br - 2025-09-16 19:22:23
This commit is contained in:
parent
86dd891052
commit
63bd86a06b
|
|
@ -2,3 +2,9 @@
|
|||
# Linhas que começam com '#' são ignoradas.
|
||||
/etc/nginx
|
||||
/etc/fail2ban
|
||||
/etc/resolv.conf
|
||||
/etc/nsswitch.conf
|
||||
/etc/hosts
|
||||
/etc/ufw
|
||||
/lib/systemd/system/nginx.service
|
||||
/etc/systemd/system/nginx.service.d/override.conf
|
||||
|
|
|
|||
|
|
@ -0,0 +1,9 @@
|
|||
127.0.0.1 localhost
|
||||
172.16.254.1 srvproxy001.itguys.com.br srvproxy001
|
||||
10.10.253.128 git.itguys.com.br git
|
||||
172.16.254.59 zammad.itguys.com.br zammad
|
||||
|
||||
# The following lines are desirable for IPv6 capable hosts
|
||||
::1 localhost ip6-localhost ip6-loopback
|
||||
ff02::1 ip6-allnodes
|
||||
ff02::2 ip6-allrouters
|
||||
|
|
@ -0,0 +1,30 @@
|
|||
# Stop dance for nginx
|
||||
# =======================
|
||||
#
|
||||
# ExecStop sends SIGQUIT (graceful stop) to the nginx process.
|
||||
# If, after 5s (--retry QUIT/5) nginx is still running, systemd takes control
|
||||
# and sends SIGTERM (fast shutdown) to the main process.
|
||||
# After another 5s (TimeoutStopSec=5), and if nginx is alive, systemd sends
|
||||
# SIGKILL to all the remaining processes in the process group (KillMode=mixed).
|
||||
#
|
||||
# nginx signals reference doc:
|
||||
# http://nginx.org/en/docs/control.html
|
||||
#
|
||||
[Unit]
|
||||
Description=A high performance web server and a reverse proxy server
|
||||
Documentation=man:nginx(8)
|
||||
After=network-online.target remote-fs.target nss-lookup.target
|
||||
Wants=network-online.target
|
||||
|
||||
[Service]
|
||||
Type=forking
|
||||
PIDFile=/run/nginx.pid
|
||||
ExecStartPre=/usr/sbin/nginx -t -q -g 'daemon on; master_process on;'
|
||||
ExecStart=/usr/sbin/nginx -g 'daemon on; master_process on;'
|
||||
ExecReload=/usr/sbin/nginx -g 'daemon on; master_process on;' -s reload
|
||||
ExecStop=-/sbin/start-stop-daemon --quiet --stop --retry QUIT/5 --pidfile /run/nginx.pid
|
||||
TimeoutStopSec=5
|
||||
KillMode=mixed
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
|
|
@ -0,0 +1,20 @@
|
|||
# /etc/nsswitch.conf
|
||||
#
|
||||
# Example configuration of GNU Name Service Switch functionality.
|
||||
# If you have the `glibc-doc-reference' and `info' packages installed, try:
|
||||
# `info libc "Name Service Switch"' for information about this file.
|
||||
|
||||
passwd: files
|
||||
group: files
|
||||
shadow: files
|
||||
gshadow: files
|
||||
|
||||
hosts: files dns
|
||||
networks: files
|
||||
|
||||
protocols: db files
|
||||
services: db files
|
||||
ethers: db files
|
||||
rpc: db files
|
||||
|
||||
netgroup: nis
|
||||
|
|
@ -0,0 +1,2 @@
|
|||
[Service]
|
||||
LimitNOFILE=65535
|
||||
|
|
@ -0,0 +1,2 @@
|
|||
search itguys.com.br
|
||||
nameserver 172.16.254.252
|
||||
|
|
@ -0,0 +1,40 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# after.init: if executable, called by ufw-init. See 'man ufw-framework' for
|
||||
# details. Note that output from these scripts is not seen via the
|
||||
# the ufw command, but instead via ufw-init.
|
||||
#
|
||||
# Copyright 2013 Canonical Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License version 3,
|
||||
# as published by the Free Software Foundation.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#
|
||||
set -e
|
||||
|
||||
case "$1" in
|
||||
start)
|
||||
# typically required
|
||||
;;
|
||||
stop)
|
||||
# typically required
|
||||
;;
|
||||
status)
|
||||
# optional
|
||||
;;
|
||||
flush-all)
|
||||
# optional
|
||||
;;
|
||||
*)
|
||||
echo "'$1' not supported"
|
||||
echo "Usage: after.init {start|stop|flush-all|status}"
|
||||
;;
|
||||
esac
|
||||
|
|
@ -0,0 +1,30 @@
|
|||
#
|
||||
# rules.input-after
|
||||
#
|
||||
# Rules that should be run after the ufw command line added rules. Custom
|
||||
# rules should be added to one of these chains:
|
||||
# ufw-after-input
|
||||
# ufw-after-output
|
||||
# ufw-after-forward
|
||||
#
|
||||
|
||||
# Don't delete these required lines, otherwise there will be errors
|
||||
*filter
|
||||
:ufw-after-input - [0:0]
|
||||
:ufw-after-output - [0:0]
|
||||
:ufw-after-forward - [0:0]
|
||||
# End required lines
|
||||
|
||||
# don't log noisy services by default
|
||||
-A ufw-after-input -p udp --dport 137 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p udp --dport 138 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p tcp --dport 139 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p tcp --dport 445 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p udp --dport 67 -j ufw-skip-to-policy-input
|
||||
-A ufw-after-input -p udp --dport 68 -j ufw-skip-to-policy-input
|
||||
|
||||
# don't log noisy broadcast
|
||||
-A ufw-after-input -m addrtype --dst-type BROADCAST -j ufw-skip-to-policy-input
|
||||
|
||||
# don't delete the 'COMMIT' line or these rules won't be processed
|
||||
COMMIT
|
||||
|
|
@ -0,0 +1,27 @@
|
|||
#
|
||||
# rules.input-after
|
||||
#
|
||||
# Rules that should be run after the ufw command line added rules. Custom
|
||||
# rules should be added to one of these chains:
|
||||
# ufw6-after-input
|
||||
# ufw6-after-output
|
||||
# ufw6-after-forward
|
||||
#
|
||||
|
||||
# Don't delete these required lines, otherwise there will be errors
|
||||
*filter
|
||||
:ufw6-after-input - [0:0]
|
||||
:ufw6-after-output - [0:0]
|
||||
:ufw6-after-forward - [0:0]
|
||||
# End required lines
|
||||
|
||||
# don't log noisy services by default
|
||||
-A ufw6-after-input -p udp --dport 137 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p udp --dport 138 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p tcp --dport 139 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p tcp --dport 445 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p udp --dport 546 -j ufw6-skip-to-policy-input
|
||||
-A ufw6-after-input -p udp --dport 547 -j ufw6-skip-to-policy-input
|
||||
|
||||
# don't delete the 'COMMIT' line or these rules won't be processed
|
||||
COMMIT
|
||||
|
|
@ -0,0 +1,14 @@
|
|||
[Nginx HTTP]
|
||||
title=Web Server (Nginx, HTTP)
|
||||
description=Small, but very powerful and efficient web server
|
||||
ports=80/tcp
|
||||
|
||||
[Nginx HTTPS]
|
||||
title=Web Server (Nginx, HTTPS)
|
||||
description=Small, but very powerful and efficient web server
|
||||
ports=443/tcp
|
||||
|
||||
[Nginx Full]
|
||||
title=Web Server (Nginx, HTTP + HTTPS)
|
||||
description=Small, but very powerful and efficient web server
|
||||
ports=80,443/tcp
|
||||
|
|
@ -0,0 +1,4 @@
|
|||
[OpenSSH]
|
||||
title=Secure shell server, an rshd replacement
|
||||
description=OpenSSH is a free implementation of the Secure Shell protocol.
|
||||
ports=22/tcp
|
||||
|
|
@ -0,0 +1,19 @@
|
|||
[Transmission]
|
||||
title=Transmission
|
||||
description=Transmission BitTorrent client
|
||||
ports=51413
|
||||
|
||||
[Deluge]
|
||||
title=Deluge
|
||||
description=Deluge BitTorrent client
|
||||
ports=6881:6891/tcp
|
||||
|
||||
[KTorrent]
|
||||
title=KTorrent
|
||||
description=KTorrent BitTorrent client
|
||||
ports=6881/tcp|4444/udp
|
||||
|
||||
[qBittorrent]
|
||||
title=qBittorrent
|
||||
description=qBittorrent BitTorrent client
|
||||
ports=6881/tcp
|
||||
|
|
@ -0,0 +1,35 @@
|
|||
[PeopleNearby]
|
||||
title=People Nearby
|
||||
description=People Nearby (Bonjour/Salut) functionality in Empathy
|
||||
ports=5353/udp|5298
|
||||
|
||||
[Bonjour]
|
||||
title=Bonjour
|
||||
description=Bonjour protocol
|
||||
ports=5353/udp|5298
|
||||
|
||||
[MSN]
|
||||
title=MSN Chat
|
||||
description=MSN chat protocol (with file transfer and voice)
|
||||
ports=1863|6891:6900/tcp|6901
|
||||
|
||||
[MSN SSL]
|
||||
title=MSN Chat (SSL)
|
||||
description=MSN chat protocol (SSL)
|
||||
ports=443/tcp
|
||||
|
||||
[AIM]
|
||||
title=AIM Talk
|
||||
description=AIM talk protocol
|
||||
ports=5190/tcp
|
||||
|
||||
[Yahoo]
|
||||
title=Yahoo Chat
|
||||
description=Yahoo chat protocol
|
||||
ports=5050
|
||||
|
||||
[XMPP]
|
||||
title=XMPP Chat
|
||||
description=XMPP protocol (Jabber and Google Talk)
|
||||
ports=5222/tcp|5269/tcp
|
||||
|
||||
|
|
@ -0,0 +1,29 @@
|
|||
[Kerberos KDC]
|
||||
title=Kerberos v5 KDC server
|
||||
description=Kerberos v5 KDC server
|
||||
ports=88
|
||||
|
||||
[Kerberos Admin]
|
||||
title=Kerberos v5 admin
|
||||
description=Kerberos v5 server
|
||||
ports=749/tcp
|
||||
|
||||
[Kerberos Password]
|
||||
title=Kerberos v5 password
|
||||
description=Kerberos v5 password
|
||||
ports=464/udp
|
||||
|
||||
[Kerberos Full]
|
||||
title=Kerberos v5 server
|
||||
description=Kerberos v5 server
|
||||
ports=88,749/tcp|464/udp
|
||||
|
||||
[LDAP]
|
||||
title=LDAP server
|
||||
description=LDAP server
|
||||
ports=389/tcp
|
||||
|
||||
[LDAPS]
|
||||
title=LDAP server (LDAPS)
|
||||
description=LDAP server (LDAPS)
|
||||
ports=636/tcp
|
||||
|
|
@ -0,0 +1,4 @@
|
|||
[DNS]
|
||||
title=Internet Domain Name Server
|
||||
description=Internet Domain Name Server
|
||||
ports=53
|
||||
|
|
@ -0,0 +1,14 @@
|
|||
[CIFS]
|
||||
title=SMB/CIFS server
|
||||
description=SMB/CIFS server
|
||||
ports=137,138/udp|139,445/tcp
|
||||
|
||||
[NFS]
|
||||
title=NFS server
|
||||
description=NFS and portmap server. Will also need access to mountd, statd and possibly others
|
||||
ports=2049,111/tcp|2049,111/udp
|
||||
|
||||
[svnserve]
|
||||
title=Subversion server
|
||||
description=Subversion server for access to Subversion repositories.
|
||||
ports=3690/tcp
|
||||
|
|
@ -0,0 +1,14 @@
|
|||
[Telnet]
|
||||
title=Telnet server (insecure)
|
||||
description=Telnet server (insecure)
|
||||
ports=23/tcp
|
||||
|
||||
[SSH]
|
||||
title=SSH server
|
||||
description=SSH server
|
||||
ports=22/tcp
|
||||
|
||||
[VNC]
|
||||
title=VNC server
|
||||
description=VNC server
|
||||
ports=5900/tcp
|
||||
|
|
@ -0,0 +1,30 @@
|
|||
[POP3]
|
||||
title=Mail server (POP3)
|
||||
description=Mail server (POP3)
|
||||
ports=110/tcp
|
||||
|
||||
[POP3S]
|
||||
title=Secure mail server (POP3S)
|
||||
description=Secure mail server (POP3S)
|
||||
ports=995/tcp
|
||||
|
||||
[IMAP]
|
||||
title=Mail server (IMAP)
|
||||
description=Mail server (IMAP)
|
||||
ports=143/tcp
|
||||
|
||||
[IMAPS]
|
||||
title=Secure mail server (IMAPS)
|
||||
description=Secure mail server (IMAPS)
|
||||
ports=993/tcp
|
||||
|
||||
[SMTP]
|
||||
title=Mail server (SMTP)
|
||||
description=Mail server (SMTP)
|
||||
ports=25/tcp
|
||||
|
||||
[Mail submission]
|
||||
title=Mail server (Submission)
|
||||
description=Mail server (Submission)
|
||||
ports=587/tcp
|
||||
|
||||
|
|
@ -0,0 +1,9 @@
|
|||
[IPP]
|
||||
title=Cups server (IPP)
|
||||
description=Cups server (IPP)
|
||||
ports=631
|
||||
|
||||
[LPD]
|
||||
title=LPD server
|
||||
description=LPD server
|
||||
ports=515/tcp
|
||||
|
|
@ -0,0 +1,9 @@
|
|||
[Socks]
|
||||
title=Socks proxy
|
||||
description=Socks proxy
|
||||
ports=1080/tcp
|
||||
|
||||
[Transparent Proxy]
|
||||
title=Transparent proxy
|
||||
description=Transparent proxy
|
||||
ports=8081/tcp
|
||||
|
|
@ -0,0 +1,19 @@
|
|||
[WWW]
|
||||
title=Web Server
|
||||
description=Web server
|
||||
ports=80/tcp
|
||||
|
||||
[WWW Secure]
|
||||
title=Web Server (HTTPS)
|
||||
description=Web Server (HTTPS)
|
||||
ports=443/tcp
|
||||
|
||||
[WWW Full]
|
||||
title=Web Server (HTTP,HTTPS)
|
||||
description=Web Server (HTTP,HTTPS)
|
||||
ports=80,443/tcp
|
||||
|
||||
[WWW Cache]
|
||||
title=Web Server (8080)
|
||||
description=Web Server (8080)
|
||||
ports=8080/tcp
|
||||
|
|
@ -0,0 +1,40 @@
|
|||
#!/bin/sh
|
||||
#
|
||||
# before.init: if executable, called by ufw-init. See 'man ufw-framework' for
|
||||
# details. Note that output from these scripts is not seen via the
|
||||
# the ufw command, but instead via ufw-init.
|
||||
#
|
||||
# Copyright 2013 Canonical Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License version 3,
|
||||
# as published by the Free Software Foundation.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#
|
||||
set -e
|
||||
|
||||
case "$1" in
|
||||
start)
|
||||
# typically required
|
||||
;;
|
||||
stop)
|
||||
# typically required
|
||||
;;
|
||||
status)
|
||||
# optional
|
||||
;;
|
||||
flush-all)
|
||||
# optional
|
||||
;;
|
||||
*)
|
||||
echo "'$1' not supported"
|
||||
echo "Usage: before.init {start|stop|flush-all|status}"
|
||||
;;
|
||||
esac
|
||||
|
|
@ -0,0 +1,75 @@
|
|||
#
|
||||
# rules.before
|
||||
#
|
||||
# Rules that should be run before the ufw command line added rules. Custom
|
||||
# rules should be added to one of these chains:
|
||||
# ufw-before-input
|
||||
# ufw-before-output
|
||||
# ufw-before-forward
|
||||
#
|
||||
|
||||
# Don't delete these required lines, otherwise there will be errors
|
||||
*filter
|
||||
:ufw-before-input - [0:0]
|
||||
:ufw-before-output - [0:0]
|
||||
:ufw-before-forward - [0:0]
|
||||
:ufw-not-local - [0:0]
|
||||
# End required lines
|
||||
|
||||
|
||||
# allow all on loopback
|
||||
-A ufw-before-input -i lo -j ACCEPT
|
||||
-A ufw-before-output -o lo -j ACCEPT
|
||||
|
||||
# quickly process packets for which we already have a connection
|
||||
-A ufw-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
-A ufw-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
-A ufw-before-forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
|
||||
# drop INVALID packets (logs these in loglevel medium and higher)
|
||||
-A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny
|
||||
-A ufw-before-input -m conntrack --ctstate INVALID -j DROP
|
||||
|
||||
# ok icmp codes for INPUT
|
||||
-A ufw-before-input -p icmp --icmp-type destination-unreachable -j ACCEPT
|
||||
-A ufw-before-input -p icmp --icmp-type time-exceeded -j ACCEPT
|
||||
-A ufw-before-input -p icmp --icmp-type parameter-problem -j ACCEPT
|
||||
-A ufw-before-input -p icmp --icmp-type echo-request -j ACCEPT
|
||||
|
||||
# ok icmp code for FORWARD
|
||||
-A ufw-before-forward -p icmp --icmp-type destination-unreachable -j ACCEPT
|
||||
-A ufw-before-forward -p icmp --icmp-type time-exceeded -j ACCEPT
|
||||
-A ufw-before-forward -p icmp --icmp-type parameter-problem -j ACCEPT
|
||||
-A ufw-before-forward -p icmp --icmp-type echo-request -j ACCEPT
|
||||
|
||||
# allow dhcp client to work
|
||||
-A ufw-before-input -p udp --sport 67 --dport 68 -j ACCEPT
|
||||
|
||||
#
|
||||
# ufw-not-local
|
||||
#
|
||||
-A ufw-before-input -j ufw-not-local
|
||||
|
||||
# if LOCAL, RETURN
|
||||
-A ufw-not-local -m addrtype --dst-type LOCAL -j RETURN
|
||||
|
||||
# if MULTICAST, RETURN
|
||||
-A ufw-not-local -m addrtype --dst-type MULTICAST -j RETURN
|
||||
|
||||
# if BROADCAST, RETURN
|
||||
-A ufw-not-local -m addrtype --dst-type BROADCAST -j RETURN
|
||||
|
||||
# all other non-local packets are dropped
|
||||
-A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j ufw-logging-deny
|
||||
-A ufw-not-local -j DROP
|
||||
|
||||
# allow MULTICAST mDNS for service discovery (be sure the MULTICAST line above
|
||||
# is uncommented)
|
||||
-A ufw-before-input -p udp -d 224.0.0.251 --dport 5353 -j ACCEPT
|
||||
|
||||
# allow MULTICAST UPnP for service discovery (be sure the MULTICAST line above
|
||||
# is uncommented)
|
||||
-A ufw-before-input -p udp -d 239.255.255.250 --dport 1900 -j ACCEPT
|
||||
|
||||
# don't delete the 'COMMIT' line or these rules won't be processed
|
||||
COMMIT
|
||||
|
|
@ -0,0 +1,142 @@
|
|||
#
|
||||
# rules.before
|
||||
#
|
||||
# Rules that should be run before the ufw command line added rules. Custom
|
||||
# rules should be added to one of these chains:
|
||||
# ufw6-before-input
|
||||
# ufw6-before-output
|
||||
# ufw6-before-forward
|
||||
#
|
||||
|
||||
# Don't delete these required lines, otherwise there will be errors
|
||||
*filter
|
||||
:ufw6-before-input - [0:0]
|
||||
:ufw6-before-output - [0:0]
|
||||
:ufw6-before-forward - [0:0]
|
||||
# End required lines
|
||||
|
||||
|
||||
# allow all on loopback
|
||||
-A ufw6-before-input -i lo -j ACCEPT
|
||||
-A ufw6-before-output -o lo -j ACCEPT
|
||||
|
||||
# drop packets with RH0 headers
|
||||
-A ufw6-before-input -m rt --rt-type 0 -j DROP
|
||||
-A ufw6-before-forward -m rt --rt-type 0 -j DROP
|
||||
-A ufw6-before-output -m rt --rt-type 0 -j DROP
|
||||
|
||||
# quickly process packets for which we already have a connection
|
||||
-A ufw6-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
-A ufw6-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
-A ufw6-before-forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
|
||||
|
||||
# multicast ping replies are part of the ok icmp codes for INPUT (rfc4890,
|
||||
# 4.4.1 and 4.4.2), but don't have an associated connection and are otherwise
|
||||
# be marked INVALID, so allow here instead.
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type echo-reply -j ACCEPT
|
||||
|
||||
# drop INVALID packets (logs these in loglevel medium and higher)
|
||||
-A ufw6-before-input -m conntrack --ctstate INVALID -j ufw6-logging-deny
|
||||
-A ufw6-before-input -m conntrack --ctstate INVALID -j DROP
|
||||
|
||||
# ok icmp codes for INPUT (rfc4890, 4.4.1 and 4.4.2)
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type packet-too-big -j ACCEPT
|
||||
# codes 0 and 1
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type time-exceeded -j ACCEPT
|
||||
# codes 0-2 (echo-reply needs to be before INVALID, see above)
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type parameter-problem -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type echo-request -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type router-solicitation -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type router-advertisement -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type neighbor-solicitation -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type neighbor-advertisement -m hl --hl-eq 255 -j ACCEPT
|
||||
# IND solicitation
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 141 -m hl --hl-eq 255 -j ACCEPT
|
||||
# IND advertisement
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 142 -m hl --hl-eq 255 -j ACCEPT
|
||||
# MLD query
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 130 -s fe80::/10 -j ACCEPT
|
||||
# MLD report
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 131 -s fe80::/10 -j ACCEPT
|
||||
# MLD done
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 132 -s fe80::/10 -j ACCEPT
|
||||
# MLD report v2
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 143 -s fe80::/10 -j ACCEPT
|
||||
# SEND certificate path solicitation
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 148 -m hl --hl-eq 255 -j ACCEPT
|
||||
# SEND certificate path advertisement
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 149 -m hl --hl-eq 255 -j ACCEPT
|
||||
# MR advertisement
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 151 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
# MR solicitation
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 152 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
# MR termination
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 153 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
|
||||
# ok icmp codes for OUTPUT (rfc4890, 4.4.1 and 4.4.2)
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type packet-too-big -j ACCEPT
|
||||
# codes 0 and 1
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type time-exceeded -j ACCEPT
|
||||
# codes 0-2
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type parameter-problem -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type echo-request -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type echo-reply -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type router-solicitation -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type neighbor-advertisement -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type neighbor-solicitation -m hl --hl-eq 255 -j ACCEPT
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type router-advertisement -m hl --hl-eq 255 -j ACCEPT
|
||||
# IND solicitation
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 141 -m hl --hl-eq 255 -j ACCEPT
|
||||
# IND advertisement
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 142 -m hl --hl-eq 255 -j ACCEPT
|
||||
# MLD query
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 130 -s fe80::/10 -j ACCEPT
|
||||
# MLD report
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 131 -s fe80::/10 -j ACCEPT
|
||||
# MLD done
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 132 -s fe80::/10 -j ACCEPT
|
||||
# MLD report v2
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 143 -s fe80::/10 -j ACCEPT
|
||||
# SEND certificate path solicitation
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 148 -m hl --hl-eq 255 -j ACCEPT
|
||||
# SEND certificate path advertisement
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 149 -m hl --hl-eq 255 -j ACCEPT
|
||||
# MR advertisement
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 151 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
# MR solicitation
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 152 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
# MR termination
|
||||
-A ufw6-before-output -p icmpv6 --icmpv6-type 153 -s fe80::/10 -m hl --hl-eq 1 -j ACCEPT
|
||||
|
||||
# ok icmp codes for FORWARD (rfc4890, 4.3.1)
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type packet-too-big -j ACCEPT
|
||||
# codes 0 and 1
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type time-exceeded -j ACCEPT
|
||||
# codes 0-2
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type parameter-problem -j ACCEPT
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type echo-request -j ACCEPT
|
||||
-A ufw6-before-forward -p icmpv6 --icmpv6-type echo-reply -j ACCEPT
|
||||
# ok icmp codes for FORWARD (rfc4890, 4.3.2)
|
||||
# Home Agent Address Discovery Reques
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 144 -j ACCEPT
|
||||
# Home Agent Address Discovery Reply
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 145 -j ACCEPT
|
||||
# Mobile Prefix Solicitation
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 146 -j ACCEPT
|
||||
# Mobile Prefix Advertisement
|
||||
-A ufw6-before-input -p icmpv6 --icmpv6-type 147 -j ACCEPT
|
||||
|
||||
# allow dhcp client to work
|
||||
-A ufw6-before-input -p udp -s fe80::/10 --sport 547 -d fe80::/10 --dport 546 -j ACCEPT
|
||||
|
||||
# allow MULTICAST mDNS for service discovery
|
||||
-A ufw6-before-input -p udp -d ff02::fb --dport 5353 -j ACCEPT
|
||||
|
||||
# allow MULTICAST UPnP for service discovery
|
||||
-A ufw6-before-input -p udp -d ff02::f --dport 1900 -j ACCEPT
|
||||
|
||||
# don't delete the 'COMMIT' line or these rules won't be processed
|
||||
COMMIT
|
||||
|
|
@ -0,0 +1,41 @@
|
|||
#
|
||||
# Configuration file for setting network variables. Please note these settings
|
||||
# override /etc/sysctl.conf and /etc/sysctl.d. If you prefer to use
|
||||
# /etc/sysctl.conf, please adjust IPT_SYSCTL in /etc/default/ufw. See
|
||||
# Documentation/networking/ip-sysctl.txt in the kernel source code for more
|
||||
# information.
|
||||
#
|
||||
|
||||
# Uncomment this to allow this host to route packets between interfaces
|
||||
#net/ipv4/ip_forward=1
|
||||
#net/ipv6/conf/default/forwarding=1
|
||||
#net/ipv6/conf/all/forwarding=1
|
||||
|
||||
# Disable ICMP redirects. ICMP redirects are rarely used but can be used in
|
||||
# MITM (man-in-the-middle) attacks. Disabling ICMP may disrupt legitimate
|
||||
# traffic to those sites.
|
||||
net/ipv4/conf/all/accept_redirects=0
|
||||
net/ipv4/conf/default/accept_redirects=0
|
||||
net/ipv6/conf/all/accept_redirects=0
|
||||
net/ipv6/conf/default/accept_redirects=0
|
||||
|
||||
# Ignore bogus ICMP errors
|
||||
net/ipv4/icmp_echo_ignore_broadcasts=1
|
||||
net/ipv4/icmp_ignore_bogus_error_responses=1
|
||||
net/ipv4/icmp_echo_ignore_all=0
|
||||
|
||||
# Don't log Martian Packets (impossible addresses)
|
||||
# packets
|
||||
net/ipv4/conf/all/log_martians=0
|
||||
net/ipv4/conf/default/log_martians=0
|
||||
|
||||
#net/ipv4/tcp_fin_timeout=30
|
||||
#net/ipv4/tcp_keepalive_intvl=1800
|
||||
|
||||
# Uncomment this to turn off ipv6 autoconfiguration
|
||||
#net/ipv6/conf/default/autoconf=1
|
||||
#net/ipv6/conf/all/autoconf=1
|
||||
|
||||
# Uncomment this to enable ipv6 privacy addressing
|
||||
#net/ipv6/conf/default/use_tempaddr=2
|
||||
#net/ipv6/conf/all/use_tempaddr=2
|
||||
|
|
@ -0,0 +1,10 @@
|
|||
# /etc/ufw/ufw.conf
|
||||
#
|
||||
|
||||
# Set to yes to start on boot. If setting this remotely, be sure to add a rule
|
||||
# to allow your remote connection before starting ufw. Eg: 'ufw allow 22/tcp'
|
||||
ENABLED=yes
|
||||
|
||||
# Please use the 'ufw' command to set the loglevel. Eg: 'ufw logging medium'.
|
||||
# See 'man ufw' for details.
|
||||
LOGLEVEL=low
|
||||
|
|
@ -0,0 +1,59 @@
|
|||
*filter
|
||||
:ufw-user-input - [0:0]
|
||||
:ufw-user-output - [0:0]
|
||||
:ufw-user-forward - [0:0]
|
||||
:ufw-before-logging-input - [0:0]
|
||||
:ufw-before-logging-output - [0:0]
|
||||
:ufw-before-logging-forward - [0:0]
|
||||
:ufw-user-logging-input - [0:0]
|
||||
:ufw-user-logging-output - [0:0]
|
||||
:ufw-user-logging-forward - [0:0]
|
||||
:ufw-after-logging-input - [0:0]
|
||||
:ufw-after-logging-output - [0:0]
|
||||
:ufw-after-logging-forward - [0:0]
|
||||
:ufw-logging-deny - [0:0]
|
||||
:ufw-logging-allow - [0:0]
|
||||
:ufw-user-limit - [0:0]
|
||||
:ufw-user-limit-accept - [0:0]
|
||||
### RULES ###
|
||||
|
||||
### tuple ### allow tcp 22 0.0.0.0/0 any 0.0.0.0/0 in
|
||||
-A ufw-user-input -p tcp --dport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow tcp 80 0.0.0.0/0 any 0.0.0.0/0 in
|
||||
-A ufw-user-input -p tcp --dport 80 -j ACCEPT
|
||||
|
||||
### tuple ### allow any 443 0.0.0.0/0 any 0.0.0.0/0 in
|
||||
-A ufw-user-input -p tcp --dport 443 -j ACCEPT
|
||||
-A ufw-user-input -p udp --dport 443 -j ACCEPT
|
||||
|
||||
### tuple ### allow any any 0.0.0.0/0 any 172.16.254.11 in
|
||||
-A ufw-user-input -s 172.16.254.11 -j ACCEPT
|
||||
|
||||
### tuple ### allow any any 0.0.0.0/0 any 172.16.254.125 in
|
||||
-A ufw-user-input -s 172.16.254.125 -j ACCEPT
|
||||
|
||||
### tuple ### allow udp 443 0.0.0.0/0 any 0.0.0.0/0 in
|
||||
-A ufw-user-input -p udp --dport 443 -j ACCEPT
|
||||
|
||||
### tuple ### allow udp 80 0.0.0.0/0 any 0.0.0.0/0 in
|
||||
-A ufw-user-input -p udp --dport 80 -j ACCEPT
|
||||
|
||||
### tuple ### allow tcp 10051 0.0.0.0/0 any 0.0.0.0/0 in
|
||||
-A ufw-user-input -p tcp --dport 10051 -j ACCEPT
|
||||
|
||||
### END RULES ###
|
||||
|
||||
### LOGGING ###
|
||||
-A ufw-after-logging-forward -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
|
||||
-I ufw-logging-deny -m conntrack --ctstate INVALID -j RETURN -m limit --limit 3/min --limit-burst 10
|
||||
-A ufw-logging-deny -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
|
||||
-A ufw-logging-allow -j LOG --log-prefix "[UFW ALLOW] " -m limit --limit 3/min --limit-burst 10
|
||||
### END LOGGING ###
|
||||
|
||||
### RATE LIMITING ###
|
||||
-A ufw-user-limit -m limit --limit 3/minute -j LOG --log-prefix "[UFW LIMIT BLOCK] "
|
||||
-A ufw-user-limit -j REJECT
|
||||
-A ufw-user-limit-accept -j ACCEPT
|
||||
### END RATE LIMITING ###
|
||||
COMMIT
|
||||
|
|
@ -0,0 +1,53 @@
|
|||
*filter
|
||||
:ufw6-user-input - [0:0]
|
||||
:ufw6-user-output - [0:0]
|
||||
:ufw6-user-forward - [0:0]
|
||||
:ufw6-before-logging-input - [0:0]
|
||||
:ufw6-before-logging-output - [0:0]
|
||||
:ufw6-before-logging-forward - [0:0]
|
||||
:ufw6-user-logging-input - [0:0]
|
||||
:ufw6-user-logging-output - [0:0]
|
||||
:ufw6-user-logging-forward - [0:0]
|
||||
:ufw6-after-logging-input - [0:0]
|
||||
:ufw6-after-logging-output - [0:0]
|
||||
:ufw6-after-logging-forward - [0:0]
|
||||
:ufw6-logging-deny - [0:0]
|
||||
:ufw6-logging-allow - [0:0]
|
||||
:ufw6-user-limit - [0:0]
|
||||
:ufw6-user-limit-accept - [0:0]
|
||||
### RULES ###
|
||||
|
||||
### tuple ### allow tcp 22 ::/0 any ::/0 in
|
||||
-A ufw6-user-input -p tcp --dport 22 -j ACCEPT
|
||||
|
||||
### tuple ### allow tcp 80 ::/0 any ::/0 in
|
||||
-A ufw6-user-input -p tcp --dport 80 -j ACCEPT
|
||||
|
||||
### tuple ### allow any 443 ::/0 any ::/0 in
|
||||
-A ufw6-user-input -p tcp --dport 443 -j ACCEPT
|
||||
-A ufw6-user-input -p udp --dport 443 -j ACCEPT
|
||||
|
||||
### tuple ### allow udp 443 ::/0 any ::/0 in
|
||||
-A ufw6-user-input -p udp --dport 443 -j ACCEPT
|
||||
|
||||
### tuple ### allow udp 80 ::/0 any ::/0 in
|
||||
-A ufw6-user-input -p udp --dport 80 -j ACCEPT
|
||||
|
||||
### tuple ### allow tcp 10051 ::/0 any ::/0 in
|
||||
-A ufw6-user-input -p tcp --dport 10051 -j ACCEPT
|
||||
|
||||
### END RULES ###
|
||||
|
||||
### LOGGING ###
|
||||
-A ufw6-after-logging-forward -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
|
||||
-I ufw6-logging-deny -m conntrack --ctstate INVALID -j RETURN -m limit --limit 3/min --limit-burst 10
|
||||
-A ufw6-logging-deny -j LOG --log-prefix "[UFW BLOCK] " -m limit --limit 3/min --limit-burst 10
|
||||
-A ufw6-logging-allow -j LOG --log-prefix "[UFW ALLOW] " -m limit --limit 3/min --limit-burst 10
|
||||
### END LOGGING ###
|
||||
|
||||
### RATE LIMITING ###
|
||||
-A ufw6-user-limit -m limit --limit 3/minute -j LOG --log-prefix "[UFW LIMIT BLOCK] "
|
||||
-A ufw6-user-limit -j REJECT
|
||||
-A ufw6-user-limit-accept -j ACCEPT
|
||||
### END RATE LIMITING ###
|
||||
COMMIT
|
||||
Loading…
Reference in New Issue