Formerly ipchains, iptables is a script-based firewall that's included with both Mac and Linux operating systems. In my opinion, it's the best firewall in existence. The only downfall is that it's complicated for some people to use due to its script-based nature. But this should be disregarded, as firewalls are nearly the entire security of your computer.
Still worried about creating a firewall with iptables? Don't worry, Null Byte's got your back. I'm going to show you how to set up some rules as examples, which will allow you to set up your own!
A firewalls main purpose is to filter ports. But what are ports?
Certain applications run on specific ports (for the most part). Think of a port like a connection to the Internet in a way that doesn't use your web browser. Normal HTTP Internet traffic runs on port 80. Some services like SMB (Microsoft's file sharing) are the most dangerous services to have running on a port. The program requires authentication to use media shares, and that isn't even a requirement. Even if a user has a passworded media share, the SMB share can still be brute-forced for the password, or even have exploits run agaisnt it to get inside your computer and do whatever the attacker wants.
This is where the firewall comes in. Firewalls filter the ports and try to anticipate traffic from certain protocols via the packet headers. They also can use packet headers to filter out packets via a MAC address, which will avoid being attacked by someone using malformed packets and will allow you to filter out even local users from accessing your media share. Firewalls allow you to have a level of control over your connections that you would not normally have.
Let's get started. This tutorial's commands will all be run from the terminal.
Step 1 Download and Install iptables
It comes with Ubuntu and Mac by default, so this doesn't need to be extensive. If you don't have it, Arch users use:
sudo pacman -S iptables
and Ubuntu users use:
sudo apt-get install iptables
Now we're ready to set some rules!
Step 2 Load and Save the Default Ruleset
iptables comes with a default set of rules, one of which does allow all connections to be unfiltered. You can see why this needs to be changed, right?
Let's look at our default configuration located in /etc/iptables/empty.rules:
You will see that INPUT, OUTPUT and FORWARD have [0:0] next to them, which means they are unfiltered. INPUT is incoming traffic, OUTPUT is the opposite, and FORWARD is whatever traffic you are forwarding from your computer to be used as a service by another (ex. SSH).
Let's make a copy of the ruleset so we have something to fall back on if we make a mistake:
sudo cp /etc/iptables/empty.rules /etc/iptables/custom.rules
To load a ruleset that we have previously made, we use the iptables-restore command:
sudo iptables-restore < /etc/iptables/custom.rules
To save a ruleset when we have modified rules from the terminal instead of modifying a ruleset directly, we use the iptables-save command. This is useful for testing a command first, without having to save a backup of your rules:
sudo iptables-save > /etc/iptables/custom.rules
We have to add rules above the line that says COMMIT and afterr the [0:0] on the OUTPUT line.
Step 3 Alter the Default Ruleset
Let's set a good first rule to allow the local loopback interface uninterrupted access with the following commands.
Open the ruleset:
sudo nano /etc/iptables/custom.rules
Add this to your custom ruleset. -i specifies and interface, and -j is the ACCEPT or DROP line:
-A INPUT -i lo -j ACCEPT
Now that we know how to grant an interface access, let's try giving a port some access. Start by dropping the INPUT access. Change :INPUT ACCEPT [0:0] to :INPUT DROP [0:0] in your custom.rules file. Let's give HTTP, port 80, some access:
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
This rule will tell iptables that TCP port 80 has incoming access to your computer. That is the basic format for accepting TCP ports. Let's tell our computer we want to be able to have outgoing traffic in all forms by adding the following lines:
-A OUTPUT -p icmp -j ACCEPT
-A OUTPUT -p udp -j ACCEPT
-A OUTPUT -p tcp -j ACCEPT
These are the basic outlines for creating rules. To learn more about ports and what services you need to enable/disable, check out this Wiki article on TCP and UDP port numbers. If you understand ports already, just use:
You should see which services you have running to enable your firewall accordingly.
Want to start making money as a white hat hacker? Jump-start your hacking career with our 2020 Premium Ethical Hacking Certification Training Bundle from the new Null Byte Shop and get over 60 hours of training from cybersecurity professionals.
Other worthwhile deals to check out: