From 0dd637d0978498d6b2452ec6b133676ccd5d36df Mon Sep 17 00:00:00 2001 From: Tim Niemeyer Date: Fri, 25 Jan 2013 23:12:27 +0100 Subject: [PATCH] Revert "ssh reopened in firewall config for debugging purposes, should be closed again in stable release" This isn't really needed for debugging. The default port number 22 is often targeted for brute-force attacks. Dropbear on 16M memory isn't relly capable of handling this. This reverts commit 2083df18d17e354292c4bfc6b20555a3bea583fa. --- bsp/default/root_file_system/etc/firewall.user | 2 -- 1 file changed, 2 deletions(-) diff --git a/bsp/default/root_file_system/etc/firewall.user b/bsp/default/root_file_system/etc/firewall.user index fcd3e04..d6a1931 100755 --- a/bsp/default/root_file_system/etc/firewall.user +++ b/bsp/default/root_file_system/etc/firewall.user @@ -7,7 +7,5 @@ iptables -A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss- # Das wirkt bei kleinen Geräten wir ein DOS WAN=$(uci get network.wan.ifname) iptables -A INPUT -i $WAN -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -#ssh open for debugging purposes, should be removed in stable release -iptables -A INPUT -i $WAN -p tcp --dport 22 -j ACCEPT iptables -A INPUT -i $WAN -j REJECT