Skip to content
Snippets Groups Projects
Unverified Commit f4b34091 authored by Michal 'vorner' Vaner's avatar Michal 'vorner' Vaner
Browse files

fake: The exceptions are granted only for IPs not explicitly refused

If we mark them as explicitly rejected or dropped by an IPset from the
server-side blacklists, then don't let it in. We don't need to test if
the IP is attacker, we already know that.
parent f322a6f0
No related branches found
No related tags found
No related merge requests found
......@@ -100,11 +100,14 @@ initialize() {
$COMMAND -t nat -E ucollect_fake_new ucollect_fake
$COMMAND -t nat -A PREROUTING -j ucollect_fake
$COMMAND -D turris-log-incoming -j ucollect_fake >/dev/null 2>&1
# Remove it from the old chain it was in the previous version as well. Just in case it is still there.
$COMMAND -D reject -j ucollect_fake >/dev/null 2>&1
$COMMAND -F ucollect_fake >/dev/null 2>&1
$COMMAND -X ucollect_fake >/dev/null 2>&1
$COMMAND -E ucollect_fake_new ucollect_fake
$COMMAND -I reject 2 -j ucollect_fake
# We place it in the turris-log-incoming. These are the packets that are just left as incoming without being explicitly allowed and would be either dropped or rejected. But they are not explicitly rejected by an IPset iether, which would mean we don't want them at all.
$COMMAND -I turris-log-incoming 2 -j ucollect_fake
$COMMAND -D delegate_input -j ucollect_fake_accept >/dev/null 2>&1
$COMMAND -F ucollect_fake_accept >/dev/null 2>&1
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment