Whole document tree 7. Using iptablesiptables has a fairly detailed manual page ( There are several different things you can do with
There are several ways to manipulate rules inside a chain:
7.1 What You'll See When Your Computer Starts Upiptables may be a module, called (`iptable_filter.o'), which should be
automatically loaded when you first run Before any iptables commands have been run (be careful: some distributions will run iptables in their initialization scripts), there will be no rules in any of the built-in chains (`INPUT', `FORWARD' and `OUTPUT'), all the chains will have a policy of ACCEPT. You can alter the default policy of the FORWARD chain by providing the `forward=0' option to the iptable_filter module. 7.2 Operations on a Single RuleThis is the bread-and-butter of packet filtering; manipulating rules. Most commonly, you will probably use the append (-A) and delete (-D) commands. The others (-I for insert and -R for replace) are simple extensions of these concepts. Each rule specifies a set of conditions the packet must meet, and what to do if it meets them (a `target'). For example, you might want to drop all ICMP packets coming from the IP address 127.0.0.1. So in this case our conditions are that the protocol must be ICMP and that the source address must be 127.0.0.1. Our target is `DROP'. 127.0.0.1 is the `loopback' interface, which you will have even if you have no real network connection. You can use the `ping' program to generate such packets (it simply sends an ICMP type 8 (echo request) which all cooperative hosts should obligingly respond to with an ICMP type 0 (echo reply) packet). This makes it useful for testing.
You can see here that the first ping succeeds (the `-c 1' tells ping to only send a single packet). Then we append (-A) to the `INPUT' chain, a rule specifying that for packets from 127.0.0.1 (`-s 127.0.0.1') with protocol ICMP (`-p icmp') we should jump to DROP (`-j DROP'). Then we test our rule, using the second ping. There will be a pause before the program gives up waiting for a response that will never come. We can delete the rule in one of two ways. Firstly, since we know that it is the only rule in the input chain, we can use a numbered delete, as in:
To delete rule number 1 in the INPUT chain.
The second way is to mirror the -A command, but replacing the -A with -D. This is useful when you have a complex chain of rules and you don't want to have to count them to figure out that it's rule 37 that you want to get rid of. In this case, we would use:
The syntax of -D must have exactly the same options as the -A (or -I
or -R) command. If there are multiple identical rules in the same
chain, only the first will be deleted.
7.3 Filtering SpecificationsWe have seen the use of `-p' to specify protocol, and `-s' to specify source address, but there are other options we can use to specify packet characteristics. What follows is an exhaustive compendium. Specifying Source and Destination IP AddressesSource (`-s', `--source' or `--src') and destination (`-d', `--destination' or `--dst') IP addresses can be specified in four ways. The most common way is to use the full name, such as `localhost' or `www.linuxhq.com'. The second way is to specify the IP address such as `127.0.0.1'. The third and fourth ways allow specification of a group of IP addresses, such as `199.95.207.0/24' or `199.95.207.0/255.255.255.0'. These both specify any IP address from 199.95.207.0 to 199.95.207.255 inclusive; the digits after the `/' tell which parts of the IP address are significant. `/32' or `/255.255.255.255' is the default (match all of the IP address). To specify any IP address at all `/0' can be used, like so:
This is rarely used, as the effect above is the same as not specifying the `-s' option at all. Specifying InversionMany flags, including the `-s' (or `--source') and `-d' (`--destination') flags can have their arguments preceded by `!' (pronounced `not') to match addresses NOT equal to the ones given. For example. `-s ! localhost' matches any packet not coming from localhost. Specifying ProtocolThe protocol can be specified with the `-p' (or `--protocol') flag. Protocol can be a number (if you know the numeric protocol values for IP) or a name for the special cases of `TCP', `UDP' or `ICMP'. Case doesn't matter, so `tcp' works as well as `TCP'. The protocol name can be prefixed by a `!', to invert it, such as `-p ! TCP' to specify packets which are not TCP. Specifying an InterfaceThe `-i' (or `--in-interface') and `-o' (or `--out-interface') options
specify the name of an interface to match. An interface is
the physical device the packet came in on (`-i') or is going out on
(`-o'). You can use the Packets traversing the Only packets traversing the It is perfectly legal to specify an interface that currently does not
exist; the rule will not match anything until the interface comes up.
This is extremely useful for dial-up PPP links (usually interface
As a special case, an interface name ending with a `+' will match all
interfaces (whether they currently exist or not) which begin with that
string. For example, to specify a rule which matches all PPP
interfaces, the The interface name can be preceded by a `!' with spaces around it, to
match a packet which does not match the specified
interface(s), eg Specifying FragmentsSometimes a packet is too large to fit down a wire all at once. When this happens, the packet is divided into fragments, and sent as multiple packets. The other end reassembles these fragments to reconstruct the whole packet. The problem with fragments is that the initial fragment has the complete header fields (IP + TCP, UDP and ICMP) to examine, but subsequent packets only have a subset of the headers (IP without the additional protocol fields). Thus looking inside subsequent fragments for protocol headers (such as is done by the TCP, UDP and ICMP extensions) is not possible. If you are doing connection tracking or NAT, then all fragments will get merged back together before they reach the packet filtering code, so you need never worry about fragments. Please also note that in the INPUT chain of the filter table (or any other table hooking into the NF_IP_LOCAL_IN hook) is traversed after defragmentation of the core IP stack. Otherwise, it is important to understand how fragments get treated by
the filtering rules. Any filtering rule that asks for information we
don't have will not match. This means that the first fragment is
treated like any other packet. Second and further fragments won't be.
Thus a rule However, you can specify a rule specifically for second and further fragments, using the `-f' (or `--fragment') flag. It is also legal to specify that a rule does not apply to second and further fragments, by preceding the `-f' with ` ! '. Usually it is regarded as safe to let second and further fragments through, since filtering will effect the first fragment, and thus prevent reassembly on the target host; however, bugs have been known to allow crashing of machines simply by sending fragments. Your call. Note for network-heads: malformed packets (TCP, UDP and ICMP packets too short for the firewalling code to read the ports or ICMP code and type) are dropped when such examinations are attempted. So are TCP fragments starting at position 8. As an example, the following rule will drop any fragments going to 192.168.1.1:
Extensions to iptables: New Matches
Some of these extensions are standard, and other are more exotic. Extensions can be made by other people and distributed separately for niche users. Kernel extensions normally live in the kernel module subdirectory, such as /lib/modules/2.4.0-test10/kernel/net/ipv4/netfilter. They are demand loaded if your kernel was compiled with CONFIG_KMOD set, so you should not need to manually insert them. Extensions to the iptables program are shared libraries which usually live in /usr/local/lib/iptables/, although a distribution would put them in /lib/iptables or /usr/lib/iptables. Extensions come in two types: new targets, and new matches (we'll talk about new targets a little later). Some protocols automatically offer new tests: currently these are TCP, UDP and ICMP as shown below. For these you will be able to specify the new tests on the command line after the `-p' option, which will load the extension. For explicit new tests, use the `-m' option to load the extension, after which the extended options will be available. To get help on an extension, use the option to load it (`-p', `-j' or `-m') followed by `-h' or `--help', eg:
TCP ExtensionsThe TCP extensions are automatically loaded if `-p tcp' is specified. It provides the following options (none of which match fragments).
An Explanation of TCP FlagsIt is sometimes useful to allow TCP connections in one direction, but not the other. For example, you might want to allow connections to an external WWW server, but not connections from that server. The naive approach would be to block TCP packets coming from the server. Unfortunately, TCP connections require packets going in both directions to work at all. The solution is to block only the packets used to request a connection. These packets are called SYN packets (ok, technically they're packets with the SYN flag set, and the RST and ACK flags cleared, but we call them SYN packets for short). By disallowing only these packets, we can stop attempted connections in their tracks. The `--syn' flag is used for this: it is only valid for rules which specify TCP as their protocol. For example, to specify TCP connection attempts from 192.168.1.1:
This flag can be inverted by preceding it with a `!', which means every packet other than the connection initiation. UDP ExtensionsThese extensions are automatically loaded if `-p udp' is specified. It provides the options `--source-port', `--sport', `--destination-port' and `--dport' as detailed for TCP above. ICMP ExtensionsThis extension is automatically loaded if `-p icmp' is specified. It provides only one new option:
Other Match ExtensionsThe other extensions in the netfilter package are demonstration extensions, which (if installed) can be invoked with the `-m' option.
The State MatchThe most useful match criterion is supplied by the `state' extension, which interprets the connection-tracking analysis of the `ip_conntrack' module. This is highly recommended. Specifying `-m state' allows an additional `--state' option, which is a comma-separated list of states to match (the `!' flag indicates not to match those states). These states are:
An example of this powerful match extension would be:
7.4 Target SpecificationsNow we know what examinations we can do on a packet, we need a way of saying what to do to the packets which match our tests. This is called a rule's target. There are two very simple built-in targets: DROP and ACCEPT. We've already met them. If a rule matches a packet and its target is one of these two, no further rules are consulted: the packet's fate has been decided. There are two types of targets other than the built-in ones: extensions and user-defined chains. User-defined chainsOne powerful feature which When a packet matches a rule whose target is a user-defined chain, the packet begins traversing the rules in that user-defined chain. If that chain doesn't decide the fate of the packet, then once traversal on that chain has finished, traversal resumes on the next rule in the current chain. Time for more ASCII art. Consider two (silly) chains:
Consider a TCP packet coming from 192.168.1.1, going to 1.2.3.4. It
enters the So the packet path is:
User-defined chains can jump to other user-defined chains (but don't make loops: your packets will be dropped if they're found to be in a loop). Extensions to iptables: New TargetsThe other type of extension is a target. A target extension
consists of a kernel module, and an optional extension to
Special Built-In TargetsThere are two special built-in targets:
The following is a quick example of how to use iptables to queue packets for userspace processing:
With this rule, locally generated outgoing ICMP packets (as created with,
say, ping) are passed to the ip_queue module, which then attempts to deliver
the packets to a userspace application. If no userspace application is
waiting, the packets are dropped.
To write a userspace application, use the libipq API. This is distributed with iptables. Example code may be found in the testsuite tools (e.g. redirect.c) in CVS. The status of ip_queue may be checked via:
The maximum length of the queue (i.e. the number packets delivered
to userspace with no verdict issued back) may be controlled via:
The default value for the maximum queue length is 1024. Once this limit
is reached, new packets will be dropped until the length of the queue falls
below the limit again. Nice protocols such as TCP interpret dropped packets
as congestion, and will hopefully back off when the queue fills up. However,
it may take some experimenting to determine an ideal maximum queue length
for a given situation if the default value is too small.
7.5 Operations on an Entire ChainA very useful feature of Creating a New ChainLet's create a new chain. Because I am such an imaginative fellow,
I'll call it
It's that simple. Now you can put rules in it as detailed above. Deleting a ChainDeleting a chain is simple as well, using the `-X' or `--delete-chain' options. Why `-X'? Well, all the good letters were taken.
There are a couple of restrictions to deleting chains: they must be empty (see Flushing a Chain below) and they must not be the target of any rule. You can't delete any of the three built-in chains. If you don't specify a chain, then all user-defined chains will be deleted, if possible. Flushing a ChainThere is a simple way of emptying all rules out of a chain, using the `-F' (or `--flush') commands.
If you don't specify a chain, then all chains will be flushed. Listing a ChainYou can list all the rules in a chain by using the `-L' (or `--list') command. The `refcnt' listed for each user-defined chain is the number of rules which have that chain as their target. This must be zero (and the chain be empty) before this chain can be deleted. If the chain name is omitted, all chains are listed, even empty ones. There are three options which can accompany `-L'. The `-n' (numeric)
option is very useful as it prevents The `-v' options shows you all the details of the rules, such as the the packet and byte counters, the TOS comparisons, and the interfaces. Otherwise these values are omitted. Note that the packet and byte counters are printed out using the suffixes `K', `M' or `G' for 1000, 1,000,000 and 1,000,000,000 respectively. Using the `-x' (expand numbers) flag as well prints the full numbers, no matter how large they are. Resetting (Zeroing) CountersIt is useful to be able to reset the counters. This can be done with the `-Z' (or `--zero') option. Consider the following:
In the above example, some packets could pass through between the `-L' and `-Z' commands. For this reason, you can use the `-L' and `-Z' together, to reset the counters while reading them. Setting PolicyWe glossed over what happens when a packet hits the end of a built-in
chain when we discussed how a packet walks through chains earlier. In
this case, the policy of the chain determines the fate of the
packet. Only built-in chains ( The policy can be either
Next Previous Contents |