Warning: THE VOID WIKI IS DEPRECATED. It is no longer being maintained, contains outdated and incorrect information, and will eventually be shut down. Please refer to the Void Handbook, https://docs.voidlinux.org/, for the official documentation. If you can't find the information you're seeking, please raise an issue at https://github.com/void-linux/void-docs/issues

Difference between revisions of "Firewall Guide"

From Void Linux Wiki
Jump to navigation Jump to search
(Added - ufw service down during single user session)
(Moved ufw to Firewall Configuration)
Line 65: Line 65:
  ACCEPT    all  --  
  ACCEPT    all  --  
= ufw - Uncomplicated Firewall =
Alternatively, basic firewall rules (deny incoming, allow outgoing) can be established by default by installing and enabling [https://en.wikipedia.org/wiki/Uncomplicated_Firewall ufw]:
$ sudo xbps-install ufw
$ sudo xbps-reconfigure ufw
$ sudo ufw enable
To check whether the ufw firewall is active during the session:
$ sudo ufw status
To list rules:
$ sudo ufw status verbose
For the service to persist on reboot:
$ sudo ln -s /etc/sv/ufw /var/service
ufw pulls iptables as a dependency.  Rules can be modified using iptables, by following ufw's [http://manpages.ubuntu.com/manpages/xenial/en/man8/ufw.8.html man page], or through gufw, a graphical interface for ufw:
$ sudo xbps-install gufw 
$ sudo gufw
{{Note|The '''ufw''' service will not start, and therefore the ufw will be '''inactive''',  if your session is launched in '''single user mode'''.
Other services, including the network service, will not start either by default during that session except for the '''sulogin''' service, used for single user mode. 
Single user mode can be entered through the Grub menu at startup:  Select 'Advanced options'  followed by 'recovery mode'. 
Services modified during that session are not persistent.}}

Latest revision as of 02:22, 29 August 2017

Icon delete.svgThis section (or entire page if this is at the beginning of it) has been marked for removal.

Reason: This page should be either removed or merged with Firewall Configuration (Discuss in Talk:Firewall Guide#)


First off, install the iptables package:

# xbps-install iptables

Now let's set up our firewall configuration:

 # Set default chain policies
 iptables -P INPUT DROP
 iptables -P FORWARD DROP
 iptables -P OUTPUT ACCEPT

 # Accept on localhost
 iptables -A INPUT -i lo -j ACCEPT
 iptables -A OUTPUT -o lo -j ACCEPT

 # Allow established sessions to receive traffic
 iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

 # Allow SSH remote
 # iptables -I INPUT -p tcp --dport 22 -j ACCEPT
 iptables-save > /etc/firewall.conf


# Generated by iptables-save v1.4.21 on Mon Oct 27 16:52:51 2014
:INPUT DROP [1:52]
:OUTPUT ACCEPT [518:49547]
-A INPUT -i lo -j ACCEPT
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
# Completed on Mon Oct 27 16:52:51 2014


iptables-restore < /etc/firewall.conf
chmod +x /etc/sv/iptables/run
ln -s /etc/sv/iptables /var/service/

Reboot and test

$ sudo iptables -L -n
 Chain INPUT (policy DROP)
 target     prot opt source               destination         
 ACCEPT     all  --             
 ACCEPT     all  --              ctstate RELATED,ESTABLISHED

 Chain FORWARD (policy DROP)
 target     prot opt source               destination         

 Chain OUTPUT (policy ACCEPT)
 target     prot opt source               destination         
 ACCEPT     all  --