Hi, I am relatively new to firewalls and netfilter. I have a Debian Stretch router box running dnsmasq, connected to a VPN. Occasionally dnsmasq polls all of the desired DNS servers to select the fastest. When it does this it responds to replies of the non-selected DNS servers with a icmp type three or "host unreachable". My firewall is very strict (I was hacked) and I am controlling sockets. I would like to respond to the DNS servers with this icmp message. I have tried many, many ways but none work, the message keeps on getting dropped. Here is an example rule set for one of the DNS servers:
Here is the rule script:
Here is the resulting script from the firewall log:
To me the firewall is not seeing the icmp rule for some reason. Can anyone see the problem? Thanks for you help!
---------- Post updated at 06:04 PM ---------- Previous update was at 05:36 PM ----------
Well, I'm replying to my own post 10 minutes after writing it. All I needed was a "RELATED" on the state. I was hesitant to use this state as it seems to open a can of worms on some web sites...
I'm trying to insert multiple new lines of text into an iptables script using sed in a while loop. I'm not sure if this is the most effective way. Searching the forums has helped me come up with a good beginning but it's not 100%. I'd like it to search out a unique line in my current iptables file... (2 Replies)
Hi
I have small home network and I want to block some forums on web
When I use this
iptables -A INPUT -s forum -j DROP
rules is applied but when I restart some of PC rules are not present any more also I tried to save firewall settings
iptables-save > /root/dsl.fw
but how to... (2 Replies)
Hello,
I was playing around with iptables to setup an isolated system. On a SLES10 system, I ran the below to setup my first draft of rules. I noticed that the rules come into effect immediately and do not require any restart of iptables.
iptables -A INPUT -j ACCEPT
iptables -A OUTPUT -m... (4 Replies)
Could someone help me with writing rules for iptables?
I need a dos attacks protection for a game server.
port type udp
ports 27015:27030
interface: eth0
Accept all packets from all IPs
Chek if IP sent more than 50 packets per second
Drop all packets from this IP for 5 minutes
I would be... (0 Replies)
Hi Gurus,
I need to add Multicast Port = xyz
Multicast Address = 123.134.143 ( example) to my firewall rules. Can you please guide me with the lines I need to update my iptables files with. (0 Replies)
Hi Champs
i am new in Iptables and trying to write rules for my Samba server.I took some help from internet, created one script and run from rc.local :
#Allow loopback
iptables -I INPUT -i lo -j ACCEPT
# Accept packets from Trusted network
iptables -A INPUT -s my-network/subnet -j... (0 Replies)
Hello,
I have iptables service running on my CentOS5 server. It has approx 50 rules right now.
The problem I am facing now is as follows -
I have to define a new chain in the filter table, say DOS_RULES & add all rules in this chain starting from index number 15 in the filter table.
... (1 Reply)
Hi,
I've been struggling with this all morning and seem to have a blind spot on what the problem is. I'm trying to use iptables to block traffic on a little cluster of raspberry pi's but to allow ssh and ping traffic within it.
The cluster has a firewall server with a wifi card connecting to... (4 Replies)
Hello,
I did 2 scripts. The second one is, I hope, more secure.
What do you think?
Basic connection (no server, no router, no DHCP and the Ipv6 is disabled)
#######script one
####################
iptables -F
iptables -X -t filter
iptables -P INPUT DROP
iptables -P FORWARD... (6 Replies)
Discussion started by: Thomas342
6 Replies
LEARN ABOUT SUSE
tnm::icmp
icmp(n) Tnm Tcl Extension icmp(n)
__________________________________________________________________________________________________________________________________________________NAME
icmp - Send ICMP messages to hosts on the Internet.
_________________________________________________________________DESCRIPTION
The icmp command allows to send Internet Control Messages (ICMP) (RFC 792, RFC 1122) to a list of hosts on the Internet. ICMP messages can
be used to check whether hosts are reachable. The icmp command can also be used to trace routes to Internet hosts by sending UDP datagrams
to unused UDP ports and interpreting the ICMP responses (Van Jacobsen and Steve Deering algorithm).
ICMP COMMAND
The icmp command always accepts a list of target hosts. ICMP messages are send to the targets in a round-robin fashion which allows to
check entire IP address ranges or a list of core routers efficiently. The user of the icmp command should be careful not to flood a network
with ICMP requests.
icmp [options]
Invoking the icmp command with options but without any command arguments allows to retrieve and change the default values. See the
description of supported options below. Default values are bound to a Tcl interpreter which allows to have multiple Tcl interpreter
with different defaults.
icmp [options] echo hosts
The icmp echo command can be used to test the reachability of IP devices by sending ICMP echo requests to the hosts. The command
returns a list of host / round trip time pairs. The round trip time is returned in milliseconds. A negative round trip time indi-
cates that a host did not respond in the timeout interval.
icmp [options] mask hosts
The icmp mask command sends ICMP mask requests and returns a list of host / netmask pairs. The mask will be set to 0.0.0.0 if a host
does not respond to ICMP mask requests.
icmp [options] timestamp hosts
The icmp timestamp command retrieves timestamps using the ICMP timestamp request. This command returns an estimate of the time dif-
ference between local time and the time on the hosts given in hosts. The command returns a list of host / time offset pairs. The
time offset is returned in milliseconds. An empty time offset indicates that a host did not respond in the timeout interval.
icmp [options] ttl num hosts
The icmp ttl command, which may not be supported on every operating system, sends a UDP packet to an unused port number with the
time to live field of the IP header set to num. This command returns a list of host / round trip time pairs, where the host is the
IP device being num hops away. The round trip time is returned in milliseconds. A negative round trip time indicates that a host did
not respond in the timeout interval.
icmp [options] trace num hosts
The icmp trace command works similar to the icmp ttl command but it always returns the destination address even when the responding
host chooses another interface with a different IP address to send the reply. This can be used to trace a route to a host since the
command returns the host that discards the packet if it does not reach the destination.
ICMP OPTIONS
The following options control how ICMP requests are send and how the icmp command deals with lost ICMP packets.
-timeout time
The -timeout option defines the time the icmp command will wait for a response. The time is defined in seconds with a default of 5
seconds.
-retries number
The -retries option defines how many times a request is retransmitted during the timeout interval. The default number of retries is
2.
-delay time
The -delay option defines the minimum delay between two outgoing ICMP packets. The delay time is defined in milliseconds with a
default delay of 0 milliseconds. Delays are useful to reduce the load on intermediate devices like gateways or bridges.
-size number
The -size option allows to control the size of ICMP packets. The number defines the size of ICMP packets in bytes with a default
size of 64 bytes. Sizes smaller than 64 bytes are silently rounded to 64 bytes.
BUGS
The icmp command requires the setuid root program ntping(8) because sending icmp packets requires access to raw sockets on most operating
systems.
SEE ALSO scotty(1), ntping(8), Tnm(n), Tcl(n)
AUTHORS
Juergen Schoenwaelder <schoenw@cs.utwente.nl>
Tnm icmp(n)