You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
COPED TO evilsocket#456
Hi. Please tell if it is possible to "catch" outgoing packets from wi-fi (wlan0) interface to outside (eth1).
I try use the Raspbery Pi 4 with hostapd and isc-dhcp-server, but it looks like v1.4.0rc2 don't work with any packets except localhosted.
Sorry for a noob question but may be I should use another iptables rules instead the standard:
I use
-P INPUT DROP
-P FORWARD DROP
-P OUTPUT ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p tcp --dport 22 -i wlan0 -j ACCEPT
-A INPUT -j DROP
-A FORWARD -i eth1 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i wlan0 -o eth1 -j ACCEPT
-A FORWARD -j DROP
-N PORT-SCAN
-A PORT-SCAN -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit --limit 1/s -j RETURN
-A PORT-SCAN -j DROP
-t nat -A POSTROUTING -o eth1 -j MASQUERADE
then opensnitch says firewall rules changed, reloading
but nothing hapen when computer behind the router goes outside.
Is there something to try/test/learn... or not even think about it?
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
COPED TO evilsocket#456
Hi. Please tell if it is possible to "catch" outgoing packets from wi-fi (wlan0) interface to outside (eth1).
I try use the Raspbery Pi 4 with hostapd and isc-dhcp-server, but it looks like v1.4.0rc2 don't work with any packets except localhosted.
Sorry for a noob question but may be I should use another iptables rules instead the standard:
-P INPUT DROP
-P FORWARD DROP
-P OUTPUT ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p tcp --dport 22 -i wlan0 -j ACCEPT
-A INPUT -j DROP
-A FORWARD -i eth1 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i wlan0 -o eth1 -j ACCEPT
-A FORWARD -j DROP
-N PORT-SCAN
-A PORT-SCAN -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit --limit 1/s -j RETURN
-A PORT-SCAN -j DROP
-t nat -A POSTROUTING -o eth1 -j MASQUERADE
Is there something to try/test/learn... or not even think about it?
Beta Was this translation helpful? Give feedback.
All reactions