firmware/bsp/default/root_file_system/etc/firewall.user
Tim Niemeyer 0dd637d097 Revert "ssh reopened in firewall config for debugging purposes, should be closed again in stable release"
This isn't really needed for debugging. The default port number 22 is often
targeted for brute-force attacks. Dropbear on 16M memory isn't relly capable
of handling this.

This reverts commit 2083df18d1.
2013-02-02 01:01:21 +01:00

11 lines
410 B
Bash
Executable file
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

#!/bin/sh
#solves MTU problem with bad ISP´s
iptables -A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
# Wenn ein router direkt am Netz hängt, ist er auch ssh Angriffen ausgesetzt.
# Das wirkt bei kleinen Geräten wir ein DOS
WAN=$(uci get network.wan.ifname)
iptables -A INPUT -i $WAN -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -i $WAN -j REJECT