From b423c982d97c17d8079b0ef6d6b25e94265f27d9 Mon Sep 17 00:00:00 2001 From: bbruns Date: Sun, 16 Feb 2014 20:44:23 +0000 Subject: [PATCH] Custom chains work... --- bin/firewall-sosdg | 16 +++++++++------- 1 file changed, 9 insertions(+), 7 deletions(-) diff --git a/bin/firewall-sosdg b/bin/firewall-sosdg index b3b04fb..279a565 100755 --- a/bin/firewall-sosdg +++ b/bin/firewall-sosdg @@ -202,15 +202,17 @@ if [ "$IPTABLES_MULTIPORT" ]; then esac fi -# Trying to better clean up some of my code, so lets try using a blackhole target for -# in and out -$IPTABLES -N BLACKHOLE-IN -$IPTABLES -N BLACKHOLE-OUT +# Trying to better clean up some of my code, so lets try using some custom chains +$IPTABLES -N BLACKHOLE +$IPTABLES -N TRUSTED +$IPTABLES -A INPUT -j TRUSTED +$IPTABLES -A OUTPUT -j TRUSTED +$IPTABLES -A INPUT -j BLACKHOLE +$IPTABLES -A OUTPUT -j BLACKHOLE - -$IPTABLES -A INPUT -i lo -j ACCEPT -$IPTABLES -A OUTPUT -o lo -j ACCEPT +$IPTABLES -A TRUSTED -i lo -j ACCEPT +$IPTABLES -A TRUSTED -o lo -j ACCEPT if [ -s "$BASEDIR/include/ipv4_custom_trust" ]; then display_c YELLOW "Loading custom trust rules..."