This repository has been archived by the owner on Jun 11, 2019. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 41
New iptables module defaults #34
Comments
|
Freeaqingme
added a commit
to Freeaqingme/puppet-iptables-ex42
that referenced
this issue
Oct 8, 2013
See: example42#34 Resolves example42#34
Freeaqingme
added a commit
to Freeaqingme/puppet-iptables-ex42
that referenced
this issue
Oct 8, 2013
See: example42#34 Resolves example42#34
@example42 See #40 |
See #43 Propose to => close |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Some comments on the default rules that are generated with the new iptables module:
1- There's no more a failsafe ssh rule:
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
this can be dangerous , I 'd keep the option that inserts it and enable it by default
2- There's not a rule to manage ESTABLISHED connections:
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
I've always considered them safe and useful
The text was updated successfully, but these errors were encountered: