iptables¶
Esta página es mitad teoría mitad práctica. Ver también Seguridad.
Es posible cargar extensiones o módulos con más reglas, objetivos, etc.
Se pueden hacer filtros stateful, esto significa que se analiza a cada paquete teniendo en cuenta su relación con paquetes anteriores (por ejemplo para conexiones TCP). No vemos filtros stateful, usamos todo stateless.
Reglas: Son líneas que especifican tipos de paquetes, llevan asociadas un objetivo (target) a utilizar en el caso en el que un paquete coincida.
Objetivos: Es lo que quiero hacer con los paquetes que coinciden con una regla: aceptar, rechazar, etc.
Cadenas: Es una de reglas a corroborar secuencialmente cada vez que llega un paquete. Ya vienen las cadenas INPUT, OUTPUT, FORWARD, etc. que contienen reglas a utilizar ante paquetes entrantes, salientes, redireccionados, etc.
Tablas: Es un conjunto de cadenas, cada tabla se usa para cosas distintas, la tabla por defecto es filter, cada una extá explicada abajo.
En esta imagen se ve por qué cadenas y tablas pasa cada paquete:
Tablas que hay:
filter: This is the default table (if no -t option is passed). It contains the built-in chains INPUT (for packets destined to local sockets), FORWARD (for packets being routed through the box), and OUTPUT (for locally-generated packets).
nat: This table is consulted when a packet that creates a new connection is encountered. It consists of four built-ins: PREROUTING (for altering packets as soon as they come in), INPUT (for altering packets destined for local sockets), OUTPUT (for altering locally-generated packets before routing), and POSTROUTING (for altering packets as they are about to go out). IPv6 NAT support is available since kernel 3.7.
mangle: This table is used for specialized packet alteration. Until kernel 2.4.17 it had two built-in chains: PREROUTING (for altering incoming packets before routing) and OUT‐ PUT (for altering locally-generated packets before routing). Since kernel 2.4.18, three other built-in chains are also supported: INPUT (for packets coming into the box itself), FORWARD (for altering packets being routed through the box), and POSTROUTING (for altering packets as they are about to go out).
raw: This table is used mainly for configuring exemptions from connection tracking in combination with the NOTRACK target. It registers at the netfilter hooks with higher priority and is thus called before ip_conntrack, or any other IP tables. It provides the following built-in chains: PREROUTING (for packets arriving via any network interface) OUTPUT (for packets generated by local processes)
security: This table is used for Mandatory Access Control (MAC) networking rules, such as those enabled by the SECMARK and CONNSECMARK targets. Mandatory Access Control is implemented by Linux Security Modules such as SELinux. The security table is called after the filter table, allowing any Discretionary Access Control (DAC) rules in the filter table to take effect before MAC rules. This table provides the following built-in chains: INPUT (for packets coming into the box itself), OUTPUT (for altering locally-generated packets before routing), and FORWARD (for altering packets being routed through the box).
Para ver alguna tabla:
iptables [-t table] -L
El uso simplificado del comando iptables es:
iptables [-t table] {-A|-C|-D} chain rule-specification
En ese comando, {-A|-C|-D} son ejemplos de opciones a dar, rule-specification vendría a ser un conjunto de parámetros que especifican la regla en sí. Al final se usa -j y el objetivo (target) para especificar la acción a realizar. Por ejemplo:
iptables -t filter -A INPUT -i eth0 -s 10.0.0.20 -j DROP
iptables -A INPUT -p tcp --dport 80 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
iptables -t filter -F FORWARD
iptables -t filter -F INPUT
iptables -t filter -A FORWARD -s 10.0.0.2/32 -d 10.1.0.2/32 -p icmp -j ACCEPT
iptables -t filter -A FORWARD -s 10.1.0.0/16 -p tcp --destination-port 80 -j DROP
iptables -t filter -A FORWARD -o emp2s0 -p tcp --destination-port 80 -j DROP
iptables -t filter -A FORWARD -s 10.0.0.2/32 -p icmp -j DROP
iptables -t filter -A INPUT -s 10.0.0.2/32 -p icmp -j REJECT
iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j REDIRECT --to-port 3128
Al buscar ayuda usar man iptables
y man iptables-extensions
. Sino se
puede usar por ejemplo iptables -p tcp --help
.
Opciones¶
Especifican si la regla dada se debe agregar, borrar, reemplazar, etc.:
-A, --append chain rule-specification
Append one or more rules to the end of the selected chain. When the
source and/or destination names resolve to more than one address, a rule
will be added for each possible address combination.
-C, --check chain rule-specification
Check whether a rule matching the specification does exist in the
selected chain. This command uses the same logic as -D to find a
matching entry, but does not alter the existing iptables configura‐
tion and uses its exit code to indicate success or failure.
-D, --delete chain rule-specification
-D, --delete chain rulenum
Delete one or more rules from the selected chain. There are two
versions of this command: the rule can be specified as a number in the
chain (starting at 1 for the first rule) or a rule to match.
-I, --insert chain [rulenum] rule-specification
Insert one or more rules in the selected chain as the given rule
number. So, if the rule number is 1, the rule or rules are inserted at
the head of the chain. This is also the default if no rule number
is specified.
-R, --replace chain rulenum rule-specification
Replace a rule in the selected chain. If the source and/or
destination names resolve to multiple addresses, the command will fail.
Rules are numbered starting at 1.
-L, --list [chain]
List all rules in the selected chain. If no chain is selected, all
chains are listed. Like every other iptables command, it applies to
the specified table (filter is the default), so NAT rules get listed by
iptables -t nat -n -L Please note that it is often used with the -n
option, in order to avoid long reverse DNS lookups. It is legal
to specify the -Z (zero) option as well, in which case the chain(s)
will be atomically listed and zeroed. The exact output is affected by
the other arguments given. The exact rules are suppressed until you
use iptables -L -v or iptables-save(8).
-S, --list-rules [chain]
Print all rules in the selected chain. If no chain is selected, all
chains are printed like ipta‐ bles-save. Like every other iptables
command, it applies to the specified table (filter is the
default).
-F, --flush [chain]
Flush the selected chain (all the chains in the table if none is
given). This is equivalent to deleting all the rules one by one.
-Z, --zero [chain [rulenum]]
Zero the packet and byte counters in all chains, or only the given
chain, or only the given rule in a chain. It is legal to specify
the -L, --list (list) option as well, to see the counters immedi‐ ately
before they are cleared. (See above.)
-N, --new-chain chain
Create a new user-defined chain by the given name. There must be no
target of that name already.
-X, --delete-chain [chain]
Delete the optional user-defined chain specified. There must be no
references to the chain. If there are, you must delete or
replace the referring rules before the chain can be deleted. The chain
must be empty, i.e. not contain any rules. If no argument is given, it
will attempt to delete every non-builtin chain in the table.
-P, --policy chain target
Set the policy for the built-in (non-user-defined) chain to the
given target. The policy target must be either ACCEPT or DROP.
-E, --rename-chain old-chain new-chain
Rename the user specified chain to the user supplied name. This is
cosmetic, and has no effect on the structure of the table.
-h Help. Give a (currently very brief) description of the command syntax.
Parámetros¶
Especifican a la regla. Estas son algunos parámetros disponibles, ver man
iptables-extensions
:
-4, --ipv4
This option has no effect in iptables and iptables-restore. If a
rule using the -4 option is inserted with (and only with)
ip6tables-restore, it will be silently ignored. Any other uses will
throw an error. This option allows IPv4 and IPv6 rules in a single rule
file for use with both ipta‐ bles-restore and ip6tables-restore.
-6, --ipv6
If a rule using the -6 option is inserted with (and only with)
iptables-restore, it will be silently ignored. Any other uses will
throw an error. This option allows IPv4 and IPv6 rules in a single rule
file for use with both iptables-restore and ip6tables-restore.
This option has no effect in ip6tables and ip6tables-restore.
[!] -p, --protocol protocol
The protocol of the rule or of the packet to check. The specified
protocol can be one of tcp, udp, udplite, icmp, icmpv6,esp, ah, sctp,
mh or the special keyword "all", or it can be a numeric value,
representing one of these protocols or a different one. A protocol
name from /etc/protocols is also allowed. A "!" argument before
the protocol inverts the test. The number zero is equivalent to all.
"all" will match with all protocols and is taken as default when this
option is omitted. Note that, in ip6tables, IPv6 extension headers
except esp are not allowed. esp and ipv6-nonext can be used with
Kernel version 2.6.11 or later. The number zero is equivalent to all,
which means that you cannot test the protocol field for the value
0 directly. To match on a HBH header, even if it were the last, you
cannot use -p 0, but always need -m hbh.
[!] -s, --source address[/mask][,...]
Source specification. Address can be either a network name, a hostname,
a network IP address (with /mask), or a plain IP address. Hostnames
will be resolved once only, before the rule is submitted to the kernel.
Please note that specifying any name to be resolved with a remote query
such as DNS is a really bad idea. The mask can be either an ipv4
network mask (for iptables) or a plain number, specifying the number of
1's at the left side of the network mask. Thus, an iptables mask of 24
is equivalent to 255.255.255.0. A "!" argument before the address
specification inverts the sense of the address. The flag --src is an
alias for this option. Multiple addresses can be specified, but this
will expand to multiple rules (when adding with -A), or will cause
multiple rules to be deleted (with -D).
[!] -d, --destination address[/mask][,...]
Destination specification. See the description of the -s (source) flag
for a detailed description of the syntax. The flag --dst is an alias
for this option.
-m, --match match
Specifies a match to use, that is, an extension module that tests for
a specific property. The set of matches make up the condition under
which a target is invoked. Matches are evaluated first to last as
specified on the command line and work in short-circuit fashion,
i.e. if one extension yields false, evaluation will stop.
-j, --jump target
This specifies the target of the rule; i.e., what to do if the packet
matches it. The target can be a user-defined chain (other than the
one this rule is in), one of the special builtin targets which decide
the fate of the packet immediately, or an extension (see EXTENSIONS
below). If this option is omitted in a rule (and -g is not
used), then matching the rule will have no effect on the packet's fate,
but the counters on the rule will be incremented.
-g, --goto chain
This specifies that the processing should continue in a user specified
chain. Unlike the --jump option return will not continue processing
in this chain but instead in the chain that called us via --jump.
[!] -i, --in-interface name
Name of an interface via which a packet was received (only for packets
entering the INPUT, FORWARD and PREROUTING chains). When the
"!" argument is used before the interface name, the sense is inverted.
If the interface name ends in a "+", then any interface which begins
with this name will match. If this option is omitted, any interface
name will match.
[!] -o, --out-interface name
Name of an interface via which a packet is going to be sent (for
packets entering the FORWARD, OUT‐ PUT and POSTROUTING chains). When
the "!" argument is used before the interface name, the sense is
inverted. If the interface name ends in a "+", then any interface
which begins with this name will match. If this option is omitted, any
interface name will match.
[!] -f, --fragment
This means that the rule only refers to second and further IPv4
fragments of fragmented packets. Since there is no way to tell the
source or destination ports of such a packet (or ICMP type), such a
packet will not match any rules which specify them. When the "!"
argument precedes the "-f" flag, the rule will only match head
fragments, or unfragmented packets. This option is IPv4 specific, it is
not available in ip6tables.
-c, --set-counters packets bytes
This enables the administrator to initialize the packet and byte
counters of a rule (during INSERT, APPEND, REPLACE operations).
Objetivos¶
Cada cadena tiene su propia política por defecto, que se puede ver al mostrar las tablas. Para cambiarla se usa:
iptables [-t table] --policy chain target
La política por defecto es la que se utiliza si el paquete no coincide con ninguna regla.
Estos son algunos de los objetivos posibles, ver man iptables-extensions
:
ACCEPT: Deja pasar el paquete.
DROP: Descarta el paquete.
REJECT: Descarta el paquete y responde con un ICMP (unreachable port por defecto, pero se puede cambiar).
SNAT: Significa Source NAT. This target is only valid in the nat table, in the POSTROUTING and INPUT chains, and user-defined chains which are only called from those chains. It specifies that the source address of the packet should be modified (and all future packets in this connection will also be mangled), and rules should cease being examined. Generalmente se usa con la opción
--to-source [ipaddr[-ipaddr]][:port[-port]]
: Which can specify a single new source IP address, an inclusive range of IP addresses. Optionally a port range, if the rule also specifies one of the following protocols: tcp, udp, dccp or sctp. If no port range is specified, then source ports below 512 will be mapped to other ports below 512: those between 512 and 1023 inclusive will be mapped to ports below 1024, and other ports will be mapped to 1024 or above. Where possible, no port alteration will occur.
Ejemplo:
iptables -t nat -A POSTROUTING -o {interfaz WAN} -j SNAT --to {IP salida}
MASQUERADE: This target is only valid in the nat table, in the POSTROUTING chain. It should only be used with dynamically assigned IP (dialup) connections: if you have a static IP address, you should use the SNAT target. Masquerading is equivalent to specifying a mapping to the IP address of the interface the packet is going out, but also has the effect that connections are forgotten when the interface goes down. This is the correct behavior when the next dialup is unlikely to have the same interface address (and hence any established connections are lost anyway). La única opción interesante que tiene es:
--to-ports port[-port]
: This specifies a range of source ports to use, overriding the default SNAT source port-selection heuristics (see above). This is only valid if the rule also specifies one of the following protocols: tcp, udp, dccp or sctp.
Ejemplo:
iptables -t nat -A POSTROUTING -o {interfaz WAN} -j MASQUERADE
DNAT: Significa Destination NAT. This target is only valid in the nat table, in the PREROUTING and OUTPUT chains, and user-defined chains which are only called from those chains. It specifies that the destination address of the packet should be modified (and all future packets in this connection will also be mangled), and rules should cease being examined. Generalmente se usa con la opción:
--to-destination [ipaddr[-ipaddr]][:port[-port]]
Which can specify a single new destination IP address, an inclusive range of IP addresses. Optionally a port range, if the rule also specifies one of the following protocols: tcp, udp, dccp or sctp. If no port range is specified, then the destination port will never be modified. If no IP address is specified then only the destination port will be modified.
LOG: Turn on kernel logging of matching packets. When this option is set for a rule, the Linux kernel will print some information on all matching packets (like most IP/IPv6 header fields) via the kernel log (where it can be read with dmesg or read in the syslog). This is a «non-terminating target», i.e. rule traversal continues at the next rule. So if you want to LOG the packets you refuse, use two separate rules with the same matching criteria, first using target LOG then DROP (or REJECT).
--log-level level
: Level of logging, which can be (system-specific) numeric or a mnemonic. Possible values are (in decreasing order of priority): emerg, alert, crit, error, warning, notice, info or debug.--log-prefix prefix
: Prefix log messages with the specified prefix; up to 29 letters long, and useful for distinguishing messages in the logs.--log-tcp-sequence
: Log TCP sequence numbers. This is a security risk if the log is readable by users.--log-tcp-options
: Log options from the TCP packet header.--log-ip-options
: Log options from the IP/IPv6 packet header.--log-uid
: Log the userid of the process which generated the packet.