Properly block ports on openwrt












0















I want to block certain protocols to be used, and I do this by blocking their ports such as 53.



I tried to edit /etc/config/firewall adding:



   config rule 'stopdns'
option name 'stopdns'
option proto 'tcpudp'
option dest_port '53'
option target 'DROP'


and /etc/firewall.user (when the first option did not succeed):



   iptables -A OUTPUT -p tcp --dport 53 -j DROP
iptables -A OUTPUT -p udp --dport 53 -j DROP


Same things with ports 80 and 443 to try because none of the things above worked. After each edit I run /etc/init.d/firewall restart.










share|improve this question























  • In the iptables rules you appear to be locking the Output chain. You probably want to block the FORWARD chain to prevent devices on the LAN sending traffic through the router. Also, if you block the output chain, you will stop recusive DNS working from the router.

    – davidgo
    Jan 14 at 0:45











  • @davidgo seems not the right fix; for example iptables -A FORWARD -p tcp/udp --dport 443 -j DROP and still this website and any other load

    – pomur
    Jan 14 at 19:22











  • Try use -I to INPUT at the start of the chain, not -A to append - there may be an earlier rule with a matching allow so your Appended rule is never reached.

    – davidgo
    Jan 14 at 19:25













  • @davidgo can I accept yours as answer?

    – pomur
    Jan 16 at 22:16











  • Thanks for thiat - I'm pleased it worked for you. I've made it an answer.

    – davidgo
    Jan 17 at 0:33
















0















I want to block certain protocols to be used, and I do this by blocking their ports such as 53.



I tried to edit /etc/config/firewall adding:



   config rule 'stopdns'
option name 'stopdns'
option proto 'tcpudp'
option dest_port '53'
option target 'DROP'


and /etc/firewall.user (when the first option did not succeed):



   iptables -A OUTPUT -p tcp --dport 53 -j DROP
iptables -A OUTPUT -p udp --dport 53 -j DROP


Same things with ports 80 and 443 to try because none of the things above worked. After each edit I run /etc/init.d/firewall restart.










share|improve this question























  • In the iptables rules you appear to be locking the Output chain. You probably want to block the FORWARD chain to prevent devices on the LAN sending traffic through the router. Also, if you block the output chain, you will stop recusive DNS working from the router.

    – davidgo
    Jan 14 at 0:45











  • @davidgo seems not the right fix; for example iptables -A FORWARD -p tcp/udp --dport 443 -j DROP and still this website and any other load

    – pomur
    Jan 14 at 19:22











  • Try use -I to INPUT at the start of the chain, not -A to append - there may be an earlier rule with a matching allow so your Appended rule is never reached.

    – davidgo
    Jan 14 at 19:25













  • @davidgo can I accept yours as answer?

    – pomur
    Jan 16 at 22:16











  • Thanks for thiat - I'm pleased it worked for you. I've made it an answer.

    – davidgo
    Jan 17 at 0:33














0












0








0








I want to block certain protocols to be used, and I do this by blocking their ports such as 53.



I tried to edit /etc/config/firewall adding:



   config rule 'stopdns'
option name 'stopdns'
option proto 'tcpudp'
option dest_port '53'
option target 'DROP'


and /etc/firewall.user (when the first option did not succeed):



   iptables -A OUTPUT -p tcp --dport 53 -j DROP
iptables -A OUTPUT -p udp --dport 53 -j DROP


Same things with ports 80 and 443 to try because none of the things above worked. After each edit I run /etc/init.d/firewall restart.










share|improve this question














I want to block certain protocols to be used, and I do this by blocking their ports such as 53.



I tried to edit /etc/config/firewall adding:



   config rule 'stopdns'
option name 'stopdns'
option proto 'tcpudp'
option dest_port '53'
option target 'DROP'


and /etc/firewall.user (when the first option did not succeed):



   iptables -A OUTPUT -p tcp --dport 53 -j DROP
iptables -A OUTPUT -p udp --dport 53 -j DROP


Same things with ports 80 and 443 to try because none of the things above worked. After each edit I run /etc/init.d/firewall restart.







firewall iptables port openwrt






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Jan 13 at 22:16









pomurpomur

82




82













  • In the iptables rules you appear to be locking the Output chain. You probably want to block the FORWARD chain to prevent devices on the LAN sending traffic through the router. Also, if you block the output chain, you will stop recusive DNS working from the router.

    – davidgo
    Jan 14 at 0:45











  • @davidgo seems not the right fix; for example iptables -A FORWARD -p tcp/udp --dport 443 -j DROP and still this website and any other load

    – pomur
    Jan 14 at 19:22











  • Try use -I to INPUT at the start of the chain, not -A to append - there may be an earlier rule with a matching allow so your Appended rule is never reached.

    – davidgo
    Jan 14 at 19:25













  • @davidgo can I accept yours as answer?

    – pomur
    Jan 16 at 22:16











  • Thanks for thiat - I'm pleased it worked for you. I've made it an answer.

    – davidgo
    Jan 17 at 0:33



















  • In the iptables rules you appear to be locking the Output chain. You probably want to block the FORWARD chain to prevent devices on the LAN sending traffic through the router. Also, if you block the output chain, you will stop recusive DNS working from the router.

    – davidgo
    Jan 14 at 0:45











  • @davidgo seems not the right fix; for example iptables -A FORWARD -p tcp/udp --dport 443 -j DROP and still this website and any other load

    – pomur
    Jan 14 at 19:22











  • Try use -I to INPUT at the start of the chain, not -A to append - there may be an earlier rule with a matching allow so your Appended rule is never reached.

    – davidgo
    Jan 14 at 19:25













  • @davidgo can I accept yours as answer?

    – pomur
    Jan 16 at 22:16











  • Thanks for thiat - I'm pleased it worked for you. I've made it an answer.

    – davidgo
    Jan 17 at 0:33

















In the iptables rules you appear to be locking the Output chain. You probably want to block the FORWARD chain to prevent devices on the LAN sending traffic through the router. Also, if you block the output chain, you will stop recusive DNS working from the router.

– davidgo
Jan 14 at 0:45





In the iptables rules you appear to be locking the Output chain. You probably want to block the FORWARD chain to prevent devices on the LAN sending traffic through the router. Also, if you block the output chain, you will stop recusive DNS working from the router.

– davidgo
Jan 14 at 0:45













@davidgo seems not the right fix; for example iptables -A FORWARD -p tcp/udp --dport 443 -j DROP and still this website and any other load

– pomur
Jan 14 at 19:22





@davidgo seems not the right fix; for example iptables -A FORWARD -p tcp/udp --dport 443 -j DROP and still this website and any other load

– pomur
Jan 14 at 19:22













Try use -I to INPUT at the start of the chain, not -A to append - there may be an earlier rule with a matching allow so your Appended rule is never reached.

– davidgo
Jan 14 at 19:25







Try use -I to INPUT at the start of the chain, not -A to append - there may be an earlier rule with a matching allow so your Appended rule is never reached.

– davidgo
Jan 14 at 19:25















@davidgo can I accept yours as answer?

– pomur
Jan 16 at 22:16





@davidgo can I accept yours as answer?

– pomur
Jan 16 at 22:16













Thanks for thiat - I'm pleased it worked for you. I've made it an answer.

– davidgo
Jan 17 at 0:33





Thanks for thiat - I'm pleased it worked for you. I've made it an answer.

– davidgo
Jan 17 at 0:33










1 Answer
1






active

oldest

votes


















0














As per comments - The solution is to Insert the iptables rule at the top of the chain, rather then Append it, so an appropriate firewall line would be:



iptables -I FORWARD -p tcp/udp --dport 443 -j DROP





share|improve this answer























    Your Answer








    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "3"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1393912%2fproperly-block-ports-on-openwrt%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    0














    As per comments - The solution is to Insert the iptables rule at the top of the chain, rather then Append it, so an appropriate firewall line would be:



    iptables -I FORWARD -p tcp/udp --dport 443 -j DROP





    share|improve this answer




























      0














      As per comments - The solution is to Insert the iptables rule at the top of the chain, rather then Append it, so an appropriate firewall line would be:



      iptables -I FORWARD -p tcp/udp --dport 443 -j DROP





      share|improve this answer


























        0












        0








        0







        As per comments - The solution is to Insert the iptables rule at the top of the chain, rather then Append it, so an appropriate firewall line would be:



        iptables -I FORWARD -p tcp/udp --dport 443 -j DROP





        share|improve this answer













        As per comments - The solution is to Insert the iptables rule at the top of the chain, rather then Append it, so an appropriate firewall line would be:



        iptables -I FORWARD -p tcp/udp --dport 443 -j DROP






        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered Jan 17 at 0:32









        davidgodavidgo

        44k75292




        44k75292






























            draft saved

            draft discarded




















































            Thanks for contributing an answer to Super User!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1393912%2fproperly-block-ports-on-openwrt%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Сан-Квентин

            8-я гвардейская общевойсковая армия

            Алькесар