[arch-commits] Commit in iptables/repos/testing-x86_64 (26 files)
Bartłomiej Piotrowski
bpiotrowski at archlinux.org
Mon Aug 20 07:34:18 UTC 2018
Date: Monday, August 20, 2018 @ 07:34:17
Author: bpiotrowski
Revision: 332682
archrelease: copy trunk to testing-x86_64
Added:
iptables/repos/testing-x86_64/PKGBUILD
(from rev 332681, iptables/trunk/PKGBUILD)
iptables/repos/testing-x86_64/arptables
(from rev 332681, iptables/trunk/arptables)
iptables/repos/testing-x86_64/arptables.service
(from rev 332681, iptables/trunk/arptables.service)
iptables/repos/testing-x86_64/ebtables
(from rev 332681, iptables/trunk/ebtables)
iptables/repos/testing-x86_64/ebtables.service
(from rev 332681, iptables/trunk/ebtables.service)
iptables/repos/testing-x86_64/empty-filter.rules
(from rev 332681, iptables/trunk/empty-filter.rules)
iptables/repos/testing-x86_64/empty-mangle.rules
(from rev 332681, iptables/trunk/empty-mangle.rules)
iptables/repos/testing-x86_64/empty-nat.rules
(from rev 332681, iptables/trunk/empty-nat.rules)
iptables/repos/testing-x86_64/empty-raw.rules
(from rev 332681, iptables/trunk/empty-raw.rules)
iptables/repos/testing-x86_64/empty-security.rules
(from rev 332681, iptables/trunk/empty-security.rules)
iptables/repos/testing-x86_64/empty.rules
(from rev 332681, iptables/trunk/empty.rules)
iptables/repos/testing-x86_64/ip6tables.service
(from rev 332681, iptables/trunk/ip6tables.service)
iptables/repos/testing-x86_64/iptables-flush
(from rev 332681, iptables/trunk/iptables-flush)
iptables/repos/testing-x86_64/iptables.service
(from rev 332681, iptables/trunk/iptables.service)
iptables/repos/testing-x86_64/simple_firewall.rules
(from rev 332681, iptables/trunk/simple_firewall.rules)
Deleted:
iptables/repos/testing-x86_64/PKGBUILD
iptables/repos/testing-x86_64/empty-filter.rules
iptables/repos/testing-x86_64/empty-mangle.rules
iptables/repos/testing-x86_64/empty-nat.rules
iptables/repos/testing-x86_64/empty-raw.rules
iptables/repos/testing-x86_64/empty-security.rules
iptables/repos/testing-x86_64/empty.rules
iptables/repos/testing-x86_64/ip6tables.service
iptables/repos/testing-x86_64/iptables-flush
iptables/repos/testing-x86_64/iptables.service
iptables/repos/testing-x86_64/simple_firewall.rules
-----------------------+
PKGBUILD | 164 ++++++++++++++++++++++++------------------------
arptables | 21 ++++++
arptables.service | 13 +++
ebtables | 21 ++++++
ebtables.service | 13 +++
empty-filter.rules | 12 +--
empty-mangle.rules | 16 ++--
empty-nat.rules | 14 ++--
empty-raw.rules | 10 +-
empty-security.rules | 12 +--
empty.rules | 12 +--
ip6tables.service | 30 ++++----
iptables-flush | 36 +++++-----
iptables.service | 28 ++++----
simple_firewall.rules | 22 +++---
15 files changed, 247 insertions(+), 177 deletions(-)
Deleted: PKGBUILD
===================================================================
--- PKGBUILD 2018-08-20 07:34:08 UTC (rev 332681)
+++ PKGBUILD 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,81 +0,0 @@
-# $Id$
-# Maintainer: Ronald van Haren <ronald.archlinux.org>
-# Contributor: Thomas Baechler <thomas at archlinux.org>
-
-pkgname=iptables
-pkgver=1.8.0
-pkgrel=1
-pkgdesc='Linux kernel packet control tool'
-arch=(x86_64)
-license=(GPL2)
-url='http://www.netfilter.org/projects/iptables/index.html'
-depends=(glibc bash libnftnl libpcap)
-makedepends=(linux-api-headers)
-source=(http://www.netfilter.org/projects/iptables/files/${pkgname}-${pkgver}.tar.bz2{,.sig}
- empty.rules
- simple_firewall.rules
- empty-filter.rules
- empty-mangle.rules
- empty-nat.rules
- empty-raw.rules
- empty-security.rules
- iptables.service
- ip6tables.service
- iptables-flush)
-sha1sums=('04924fd00dbaf8189f0777af90f7bdb73ac7e47c'
- 'SKIP'
- '83b3363878e3660ce23b2ad325b53cbd6c796ecf'
- 'f085a71f467e4d7cb2cf094d9369b0bcc4bab6ec'
- 'd9f9f06b46b4187648e860afa0552335aafe3ce4'
- 'c45b738b5ec4cfb11611b984c21a83b91a2d58f3'
- '1694d79b3e6e9d9d543f6a6e75fed06066c9a6c6'
- '7db53bb882f62f6c677cc8559cff83d8bae2ef73'
- 'ebbd1424a1564fd45f455a81c61ce348f0a14c2e'
- '49be9443fc302dd0fda78b63d64e884cadb61603'
- '9cec592787e32451f58fa608ea057870e07aa704'
- 'e7abda09c61142121b6695928d3b71ccd8fdf73a')
-validpgpkeys=('C09DB2063F1D7034BA6152ADAB4655A126D292E4') # Netfilter Core Team
-
-prepare() {
- cd $pkgname-$pkgver
-
- # use system one
- rm include/linux/types.h
-}
-
-build() {
- cd $pkgname-$pkgver
-
- ./configure --prefix=/usr \
- --sysconfdir=/etc \
- --sbindir=/usr/bin \
- --libexecdir=/usr/lib/iptables \
- --with-xtlibdir=/usr/lib/iptables \
- --enable-bpf-compiler \
- --enable-devel \
- --enable-shared
-
- make
-}
-
-package() {
- cd $pkgname-$pkgver
- make DESTDIR="$pkgdir" install
-
- cd "$srcdir"
- install -Dm644 empty.rules "${pkgdir}"/etc/iptables/empty.rules
- install -Dm644 simple_firewall.rules "${pkgdir}"/etc/iptables/simple_firewall.rules
-
- install -d "$pkgdir"/var/lib/{iptables,ip6tables}
- install -m644 empty-{filter,mangle,nat,raw,security}.rules "${pkgdir}"/var/lib/iptables
- install -m644 empty-{filter,mangle,nat,raw,security}.rules "${pkgdir}"/var/lib/ip6tables
-
- # install systemd files
- install -Dm644 iptables.service \
- "$pkgdir/usr/lib/systemd/system/iptables.service"
- install -Dm644 ip6tables.service \
- "$pkgdir/usr/lib/systemd/system/ip6tables.service"
- install -Dm755 iptables-flush \
- "$pkgdir/usr/lib/systemd/scripts/iptables-flush"
-}
-
Copied: iptables/repos/testing-x86_64/PKGBUILD (from rev 332681, iptables/trunk/PKGBUILD)
===================================================================
--- PKGBUILD (rev 0)
+++ PKGBUILD 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,83 @@
+# $Id$
+# Maintainer: Ronald van Haren <ronald.archlinux.org>
+# Contributor: Thomas Baechler <thomas at archlinux.org>
+
+pkgname=iptables
+pkgver=1.8.0
+pkgrel=1
+pkgdesc='Linux kernel packet control tool'
+arch=(x86_64)
+license=(GPL2)
+url='http://www.netfilter.org/projects/iptables/index.html'
+depends=(glibc bash libnftnl libpcap)
+makedepends=(linux-api-headers)
+provides=(ebtables arptables)
+conflicts=(ebtables arptables)
+replaces=(ebtables arptables)
+source=(http://www.netfilter.org/projects/iptables/files/${pkgname}-${pkgver}.tar.bz2{,.sig}
+ empty.rules
+ simple_firewall.rules
+ empty-{filter,mangle,nat,raw,security}.rules
+ {iptables,ip6tables,ebtables,arptables}.service
+ iptables-flush arptables ebtables)
+sha1sums=('04924fd00dbaf8189f0777af90f7bdb73ac7e47c'
+ 'SKIP'
+ '83b3363878e3660ce23b2ad325b53cbd6c796ecf'
+ 'f085a71f467e4d7cb2cf094d9369b0bcc4bab6ec'
+ 'd9f9f06b46b4187648e860afa0552335aafe3ce4'
+ 'c45b738b5ec4cfb11611b984c21a83b91a2d58f3'
+ '1694d79b3e6e9d9d543f6a6e75fed06066c9a6c6'
+ '7db53bb882f62f6c677cc8559cff83d8bae2ef73'
+ 'ebbd1424a1564fd45f455a81c61ce348f0a14c2e'
+ '49be9443fc302dd0fda78b63d64e884cadb61603'
+ '9cec592787e32451f58fa608ea057870e07aa704'
+ '052fe6a802d5c7be015881787ed716819db1ca0a'
+ 'f15bd7937a10fbfcc6443f55a25cd566a460ebe7'
+ 'e7abda09c61142121b6695928d3b71ccd8fdf73a'
+ '1502ebe011f44e5553d9cbd5023755cd9f3e8c75'
+ '436f8adb727e93e92a07834ba0e93f4364587901')
+validpgpkeys=('C09DB2063F1D7034BA6152ADAB4655A126D292E4') # Netfilter Core Team
+
+prepare() {
+ cd $pkgname-$pkgver
+
+ # use system one
+ rm include/linux/types.h
+}
+
+build() {
+ cd $pkgname-$pkgver
+
+ ./configure --prefix=/usr \
+ --sysconfdir=/etc \
+ --sbindir=/usr/bin \
+ --libexecdir=/usr/lib/iptables \
+ --with-xtlibdir=/usr/lib/iptables \
+ --enable-bpf-compiler \
+ --enable-devel \
+ --enable-shared
+
+ make
+}
+
+package() {
+ cd $pkgname-$pkgver
+ make DESTDIR="$pkgdir" install
+
+ cd "$srcdir"
+ install -Dm644 empty.rules "$pkgdir/etc/iptables/empty.rules"
+ install -Dm644 simple_firewall.rules "$pkgdir/etc/iptables/simple_firewall.rules"
+
+ install -d "$pkgdir"/var/lib/{iptables,ip6tables}
+ install -m644 empty-{filter,mangle,nat,raw,security}.rules "$pkgdir/var/lib/iptables"
+ install -m644 empty-{filter,mangle,nat,raw,security}.rules "$pkgdir/var/lib/ip6tables"
+
+ for unit in iptables ip6tables arptables ebtables; do
+ install -Dm644 ${unit}.service "$pkgdir/usr/lib/systemd/system/${unit}.service"
+ done
+
+ for helper in iptables-flush arptables ebtables; do
+ install -Dm755 $helper \
+ "$pkgdir/usr/lib/systemd/scripts/$helper"
+ done
+}
Copied: iptables/repos/testing-x86_64/arptables (from rev 332681, iptables/trunk/arptables)
===================================================================
--- arptables (rev 0)
+++ arptables 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,21 @@
+#!/bin/bash
+
+CONFIG_FILE='/etc/arptables.conf'
+
+case $1 in
+ start)
+ arptables-restore < "$CONFIG_FILE"
+ ;;
+ stop)
+ arptables-restore < /dev/null
+ ;;
+ save)
+ arptables-save > "$CONFIG_FILE"
+ ;;
+ *)
+ echo "usage: ${0##*/} {start|stop|save}" >&2
+ exit 1
+ ;;
+esac
+
+# vim:set ts=2 sw=2 ft=sh et:
Copied: iptables/repos/testing-x86_64/arptables.service (from rev 332681, iptables/trunk/arptables.service)
===================================================================
--- arptables.service (rev 0)
+++ arptables.service 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,13 @@
+[Unit]
+Description=ARP Tables
+Before=network-pre.target
+Wants=network-pre.target
+
+[Service]
+Type=oneshot
+RemainAfterExit=yes
+ExecStart=/usr/lib/systemd/scripts/arptables start
+ExecStop=/usr/lib/systemd/scripts/arptables stop
+
+[Install]
+WantedBy=multi-user.target
Copied: iptables/repos/testing-x86_64/ebtables (from rev 332681, iptables/trunk/ebtables)
===================================================================
--- ebtables (rev 0)
+++ ebtables 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,21 @@
+#!/bin/bash
+
+CONFIG_FILE='/etc/ebtables.conf'
+
+case $1 in
+ start)
+ ebtables-restore < "$CONFIG_FILE"
+ ;;
+ stop)
+ ebtables -F
+ ;;
+ save)
+ ebtables-save > "$CONFIG_FILE"
+ ;;
+ *)
+ echo "usage: ${0##*/} {start|stop|save}" >&2
+ exit 1
+ ;;
+esac
+
+# vim:set ts=2 sw=2 ft=sh et:
Copied: iptables/repos/testing-x86_64/ebtables.service (from rev 332681, iptables/trunk/ebtables.service)
===================================================================
--- ebtables.service (rev 0)
+++ ebtables.service 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,13 @@
+[Unit]
+Description=Ethernet bridge table
+Before=network-pre.target
+Wants=network-pre.target
+
+[Service]
+Type=oneshot
+RemainAfterExit=yes
+ExecStart=/usr/lib/systemd/scripts/ebtables start
+ExecStop=/usr/lib/systemd/scripts/ebtables stop
+
+[Install]
+WantedBy=multi-user.target
Deleted: empty-filter.rules
===================================================================
--- empty-filter.rules 2018-08-20 07:34:08 UTC (rev 332681)
+++ empty-filter.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,6 +0,0 @@
-# Empty iptables filter table rule file
-*filter
-:INPUT ACCEPT [0:0]
-:FORWARD ACCEPT [0:0]
-:OUTPUT ACCEPT [0:0]
-COMMIT
Copied: iptables/repos/testing-x86_64/empty-filter.rules (from rev 332681, iptables/trunk/empty-filter.rules)
===================================================================
--- empty-filter.rules (rev 0)
+++ empty-filter.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,6 @@
+# Empty iptables filter table rule file
+*filter
+:INPUT ACCEPT [0:0]
+:FORWARD ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+COMMIT
Deleted: empty-mangle.rules
===================================================================
--- empty-mangle.rules 2018-08-20 07:34:08 UTC (rev 332681)
+++ empty-mangle.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,8 +0,0 @@
-# Empty iptables mangle table rules file
-*mangle
-:PREROUTING ACCEPT [0:0]
-:INPUT ACCEPT [0:0]
-:FORWARD ACCEPT [0:0]
-:OUTPUT ACCEPT [0:0]
-:POSTROUTING ACCEPT [0:0]
-COMMIT
Copied: iptables/repos/testing-x86_64/empty-mangle.rules (from rev 332681, iptables/trunk/empty-mangle.rules)
===================================================================
--- empty-mangle.rules (rev 0)
+++ empty-mangle.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,8 @@
+# Empty iptables mangle table rules file
+*mangle
+:PREROUTING ACCEPT [0:0]
+:INPUT ACCEPT [0:0]
+:FORWARD ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+:POSTROUTING ACCEPT [0:0]
+COMMIT
Deleted: empty-nat.rules
===================================================================
--- empty-nat.rules 2018-08-20 07:34:08 UTC (rev 332681)
+++ empty-nat.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,7 +0,0 @@
-# Empty iptables nat table rules file
-*nat
-:PREROUTING ACCEPT [0:0]
-:INPUT ACCEPT [0:0]
-:OUTPUT ACCEPT [0:0]
-:POSTROUTING ACCEPT [0:0]
-COMMIT
Copied: iptables/repos/testing-x86_64/empty-nat.rules (from rev 332681, iptables/trunk/empty-nat.rules)
===================================================================
--- empty-nat.rules (rev 0)
+++ empty-nat.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,7 @@
+# Empty iptables nat table rules file
+*nat
+:PREROUTING ACCEPT [0:0]
+:INPUT ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+:POSTROUTING ACCEPT [0:0]
+COMMIT
Deleted: empty-raw.rules
===================================================================
--- empty-raw.rules 2018-08-20 07:34:08 UTC (rev 332681)
+++ empty-raw.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,5 +0,0 @@
-# Empty iptables raw table rules file
-*raw
-:PREROUTING ACCEPT [0:0]
-:OUTPUT ACCEPT [0:0]
-COMMIT
Copied: iptables/repos/testing-x86_64/empty-raw.rules (from rev 332681, iptables/trunk/empty-raw.rules)
===================================================================
--- empty-raw.rules (rev 0)
+++ empty-raw.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,5 @@
+# Empty iptables raw table rules file
+*raw
+:PREROUTING ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+COMMIT
Deleted: empty-security.rules
===================================================================
--- empty-security.rules 2018-08-20 07:34:08 UTC (rev 332681)
+++ empty-security.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,6 +0,0 @@
-# Empty iptables security table rules file
-*security
-:INPUT ACCEPT [0:0]
-:FORWARD ACCEPT [0:0]
-:OUTPUT ACCEPT [0:0]
-COMMIT
Copied: iptables/repos/testing-x86_64/empty-security.rules (from rev 332681, iptables/trunk/empty-security.rules)
===================================================================
--- empty-security.rules (rev 0)
+++ empty-security.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,6 @@
+# Empty iptables security table rules file
+*security
+:INPUT ACCEPT [0:0]
+:FORWARD ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+COMMIT
Deleted: empty.rules
===================================================================
--- empty.rules 2018-08-20 07:34:08 UTC (rev 332681)
+++ empty.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,6 +0,0 @@
-# Empty iptables rule file
-*filter
-:INPUT ACCEPT [0:0]
-:FORWARD ACCEPT [0:0]
-:OUTPUT ACCEPT [0:0]
-COMMIT
Copied: iptables/repos/testing-x86_64/empty.rules (from rev 332681, iptables/trunk/empty.rules)
===================================================================
--- empty.rules (rev 0)
+++ empty.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,6 @@
+# Empty iptables rule file
+*filter
+:INPUT ACCEPT [0:0]
+:FORWARD ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+COMMIT
Deleted: ip6tables.service
===================================================================
--- ip6tables.service 2018-08-20 07:34:08 UTC (rev 332681)
+++ ip6tables.service 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,15 +0,0 @@
-[Unit]
-Description=IPv6 Packet Filtering Framework
-Before=network-pre.target
-Wants=network-pre.target
-After=iptables.service
-
-[Service]
-Type=oneshot
-ExecStart=/usr/bin/ip6tables-restore /etc/iptables/ip6tables.rules
-ExecReload=/usr/bin/ip6tables-restore /etc/iptables/ip6tables.rules
-ExecStop=/usr/lib/systemd/scripts/iptables-flush 6
-RemainAfterExit=yes
-
-[Install]
-WantedBy=multi-user.target
Copied: iptables/repos/testing-x86_64/ip6tables.service (from rev 332681, iptables/trunk/ip6tables.service)
===================================================================
--- ip6tables.service (rev 0)
+++ ip6tables.service 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,15 @@
+[Unit]
+Description=IPv6 Packet Filtering Framework
+Before=network-pre.target
+Wants=network-pre.target
+After=iptables.service
+
+[Service]
+Type=oneshot
+ExecStart=/usr/bin/ip6tables-restore /etc/iptables/ip6tables.rules
+ExecReload=/usr/bin/ip6tables-restore /etc/iptables/ip6tables.rules
+ExecStop=/usr/lib/systemd/scripts/iptables-flush 6
+RemainAfterExit=yes
+
+[Install]
+WantedBy=multi-user.target
Deleted: iptables-flush
===================================================================
--- iptables-flush 2018-08-20 07:34:08 UTC (rev 332681)
+++ iptables-flush 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,18 +0,0 @@
-#!/bin/bash
-#
-# Usage: iptables-flush [6]
-#
-
-iptables=ip$1tables
-if ! type -p "$iptables"; then
- echo "error: invalid argument"
- exit 1
-fi
-
-while read -r table; do
- tables+=("/var/lib/$iptables/empty-$table.rules")
-done <"/proc/net/ip$1_tables_names"
-
-if (( ${#tables[*]} )); then
- cat "${tables[@]}" | "$iptables-restore"
-fi
Copied: iptables/repos/testing-x86_64/iptables-flush (from rev 332681, iptables/trunk/iptables-flush)
===================================================================
--- iptables-flush (rev 0)
+++ iptables-flush 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,18 @@
+#!/bin/bash
+#
+# Usage: iptables-flush [6]
+#
+
+iptables=ip$1tables
+if ! type -p "$iptables"; then
+ echo "error: invalid argument"
+ exit 1
+fi
+
+while read -r table; do
+ tables+=("/var/lib/$iptables/empty-$table.rules")
+done <"/proc/net/ip$1_tables_names"
+
+if (( ${#tables[*]} )); then
+ cat "${tables[@]}" | "$iptables-restore"
+fi
Deleted: iptables.service
===================================================================
--- iptables.service 2018-08-20 07:34:08 UTC (rev 332681)
+++ iptables.service 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,14 +0,0 @@
-[Unit]
-Description=Packet Filtering Framework
-Before=network-pre.target
-Wants=network-pre.target
-
-[Service]
-Type=oneshot
-ExecStart=/usr/bin/iptables-restore /etc/iptables/iptables.rules
-ExecReload=/usr/bin/iptables-restore /etc/iptables/iptables.rules
-ExecStop=/usr/lib/systemd/scripts/iptables-flush
-RemainAfterExit=yes
-
-[Install]
-WantedBy=multi-user.target
Copied: iptables/repos/testing-x86_64/iptables.service (from rev 332681, iptables/trunk/iptables.service)
===================================================================
--- iptables.service (rev 0)
+++ iptables.service 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,14 @@
+[Unit]
+Description=Packet Filtering Framework
+Before=network-pre.target
+Wants=network-pre.target
+
+[Service]
+Type=oneshot
+ExecStart=/usr/bin/iptables-restore /etc/iptables/iptables.rules
+ExecReload=/usr/bin/iptables-restore /etc/iptables/iptables.rules
+ExecStop=/usr/lib/systemd/scripts/iptables-flush
+RemainAfterExit=yes
+
+[Install]
+WantedBy=multi-user.target
Deleted: simple_firewall.rules
===================================================================
--- simple_firewall.rules 2018-08-20 07:34:08 UTC (rev 332681)
+++ simple_firewall.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -1,11 +0,0 @@
-*filter
-:INPUT DROP [0:0]
-:FORWARD DROP [0:0]
-:OUTPUT ACCEPT [0:0]
--A INPUT -p icmp -j ACCEPT
--A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
--A INPUT -i lo -j ACCEPT
--A INPUT -p tcp -j REJECT --reject-with tcp-reset
--A INPUT -p udp -j REJECT --reject-with icmp-port-unreachable
--A INPUT -j REJECT --reject-with icmp-proto-unreachable
-COMMIT
Copied: iptables/repos/testing-x86_64/simple_firewall.rules (from rev 332681, iptables/trunk/simple_firewall.rules)
===================================================================
--- simple_firewall.rules (rev 0)
+++ simple_firewall.rules 2018-08-20 07:34:17 UTC (rev 332682)
@@ -0,0 +1,11 @@
+*filter
+:INPUT DROP [0:0]
+:FORWARD DROP [0:0]
+:OUTPUT ACCEPT [0:0]
+-A INPUT -p icmp -j ACCEPT
+-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
+-A INPUT -i lo -j ACCEPT
+-A INPUT -p tcp -j REJECT --reject-with tcp-reset
+-A INPUT -p udp -j REJECT --reject-with icmp-port-unreachable
+-A INPUT -j REJECT --reject-with icmp-proto-unreachable
+COMMIT
More information about the arch-commits
mailing list