iptables issue

Hi everybody, sorry to descend upon you all and disturb your peace again.

On a post elsewhere I mentioned that I was having difficulties with OSSEC and decided to give up trying to sort it out opting to use Fail2Ban as used on another box.

Before I went ahead all gung-ho I decided to take a look around to see that all was ok. That was when the panic started.

When I run iptables -L I get what looks like thousands of lines which I guess are left over by OSSEC (happy to be corrected).

Here is the output of iptables -L

target prot opt source destination DROP all -- host-2-60-41-171.pppoe.omsknet.ru anywhere DROP all -- 175.106.48.52 anywhere DROP all -- 41.216.48.37 anywhere

hundreds of lines snipped out

DROP all -- bd3f8342.virtua.com.br anywhere ACCEPT udp -- anywhere anywhere udp dpt:ftp-data ACCEPT udp -- anywhere anywhere udp dpt:ftp ACCEPT udp -- anywhere anywhere udp dpt:domain ACCEPT tcp -- anywhere anywhere tcp dpt:dnp ACCEPT tcp -- anywhere anywhere tcp dpt:ndmp ACCEPT tcp -- anywhere anywhere tcp dpt:https ACCEPT tcp -- anywhere anywhere tcp dpt:http ACCEPT tcp -- anywhere anywhere tcp dpt:imaps ACCEPT tcp -- anywhere anywhere tcp dpt:imap ACCEPT tcp -- anywhere anywhere tcp dpt:pop3s ACCEPT tcp -- anywhere anywhere tcp dpt:pop3 ACCEPT tcp -- anywhere anywhere tcp dpt:ftp-data ACCEPT tcp -- anywhere anywhere tcp dpt:ftp ACCEPT tcp -- anywhere anywhere tcp dpt:domain ACCEPT tcp -- anywhere anywhere tcp dpt:smtp ACCEPT all -- anywhere anywhere

Hundreds more snipped

Chain FORWARD (policy ACCEPT) target prot opt source destination DROP all -- smtp-9.star.net.uk anywhere DROP all -- pingability.com anywhere DROP all -- 58.187.110.134 anywhere DROP all -- c94b0e05.virtua.com.br anywhere

Hundreds more snipped

DROP all -- localhost anywhere DROP all -- 187-35-231-149.dsl.telesp.net.br anywhere ACCEPT all -- anywhere anywhere DROP all -- 41.230.20.248 anywhere

Hundreds more snipped

This is obviously wrong and when I was reading trying to solve my OSSEC problem I found a post in these illustrious forums which mentioned thousands of log lines in iptables (was discussing a different issue) but for the life of me I can’t find it now.

So, onto the point of all this which is probably quite obvious I guess. How do I go about cleaning all that mess up?

I have Googled but can’t find a trusted reply.

Again, thanks for reading and any suggestions/pointers you might be able to offer.

Tim

Operating system CentOS Linux 5.7
Webmin version 1.562
Virtualmin version 3.88 Pro

Howdy,

So, onto the point of all this which is probably quite obvious I guess. How do I go about cleaning all that mess up?

Well, just to clarify – the above isn’t necessarily incorrect. If you don’t want it, we can get rid of it. But I don’t see anything in the above that suggests “horribly wrong”.

It looks like you have a lot of entries that were added to block this or that host… that sounds like OSSEC (or some other tool) was blocking hosts based on some criteria, perhaps too many failed login attempts.

Are you saying you wish to get rid of all your iptables entries?

-Eric

Thanks Eric,

Happy to be corrected on any of the following.

Obviously if nothing ever removed any of those entries they will remain permanently. I guess I wouldn’t be upset if some of them stayed, but even then, I have a customer who does extensive business with Russian companies so I couldn’t even leave the Russian ones permanently blocked. Some of the IP numbers are big ISPs here in the UK so that could be another problem.

Having used it before with great success (and I can understand it), I intend to install Fail2Ban on this server so it would probably be better to clear it out and start again.

Does all that sound sensible ?

Tim

Howdy,

Well, I don’t know anything about those rules, or whether they’re permanent or temporary (ie, if OSSEC did indeed add them, is it planning to remove them at some point?). That’s the part you’ll have to figure out :slight_smile:

If you do wish to clear all that out all your firewall rules, you can run these commands:

iptables -P INPUT ACCEPT iptables -P FORWARD ACCEPT iptables -P OUTPUT ACCEPT iptables -F iptables -X

Thanks Eric, that worked and I’m not locked out of my server either which is always a bonus. :slight_smile:

It would seem that those are built up over time by OSSEC because the server is actually quite a quiet one and OSSEC is supposed to only ban for a matter of 20 minutes as far as I can see. I guess it is not working for me, which is almost undoubtedly my fault somewhere along the line.

Now I can get to work on Fail2ban

Appreciate your help, it is always difficult to trust most sources on the web, but I do feel very safe here. Thanks for a great product and support.