亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? netfilter-script.c

?? linux防火墻源代碼 需要用的人自己下載看看 程序比較簡(jiǎn)單啊
?? C
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
	fprintf (script, "if [ -e /proc/sys/net/ipv4/proxy_arp ]; then\n"	"  echo 0 > /proc/sys/net/ipv4/proxy_arp\nfi\n\n");		fprintf (script, "# Set FIB model to be RFC1812 Compliant\n");	fprintf (script, "# (certain policy based routers may break with this - if you find\n");	fprintf (script, "#  that you can't access certain hosts on your network - please set\n");	fprintf (script, "#  this option to '0' - which is the default)\n\n");	fprintf (script, "if [ -e /proc/sys/net/ipv4/ip_fib_model ]; then\n"	"  echo 2 > /proc/sys/net/ipv4/ip_fib_model\nfi\n\n");   fprintf (script, "\n# --------( Sysctl Tuning - ICMP/IGMP Parameters )--------\n\n");   	fprintf (script, "# ICMP Dead Error Messages protection\n");	fprintf (script, "if [ -e /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses ]; then\n"	"  echo 1 > /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses\nfi\n\n");	fprintf (script, "# ICMP Broadcasting protection\n");	fprintf (script, "if [ -e /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts ]; then\n"	"  echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts\nfi\n\n");		fprintf (script, "# IGMP Membership 'overflow' protection\n");	fprintf (script, "# (if you are planning on running your box as a router - you should either\n");	fprintf (script, "#  set this option to a number greater than 5, or disable this protection\n");	fprintf (script, "#  altogether by commenting out this option)\n\n");	fprintf (script, "if [ -e /proc/sys/net/ipv4/igmp_max_memberships ]; then\n"	"  echo 1 > /proc/sys/net/ipv4/igmp_max_memberships\nfi\n\n");   fprintf (script, "\n# --------( Sysctl Tuning - Miscellanous Parameters )--------\n\n");      	fprintf (script, "# Set TTL to '64' hops\n");   	fprintf (script, "# (If you are running a masqueraded network, or use policy-based\n");   	fprintf (script, "#  routing - you may want to increase this value depending on the load\n");   	fprintf (script, "#  on your link.)\n\n");	fprintf (script, "if [ -e /proc/sys/net/ipv4/conf/all/ip_default_ttl ]; then\n"	"  for f in /proc/sys/net/ipv4/conf/*/ip_default_ttl\n  do\n   echo 64 > $f\n  done\nfi\n\n");  	fprintf (script, "# Always defragment incoming packets\n");   	fprintf (script, "# (Some cable modems [ Optus @home ] will suffer intermittent connection\n");   	fprintf (script, "#  droputs with this setting. If you experience problems, set this to '0')\n\n");		fprintf (script, "if [ -e /proc/sys/net/ipv4/ip_always_defrag ]; then\n"	"  echo 1 > /proc/sys/net/ipv4/ip_always_defrag\nfi\n\n");	  	fprintf (script, "# Keep packet fragments in memory for 8 seconds\n");   	fprintf (script, "# (Note - this option has no affect if you turn packet defragmentation\n");   	fprintf (script, "#  (above) off!)\n\n");		fprintf (script, "if [ -e /proc/sys/net/ipv4/ipfrag_time ]; then\n"	"  echo 8 > /proc/sys/net/ipv4/ipfrag_time\nfi\n\n");  	fprintf (script, "# Do not reply to Address Mask Notification Warnings\n");   	fprintf (script, "# (If you are using your machine as a DMZ router or a PPP dialin server\n");   	fprintf (script, "#  that relies on proxy_arp requests to provide addresses to it's clients\n");   	fprintf (script, "#  you may wish to disable this option by setting the value to '1'\n\n");	fprintf (script, "if [ -e /proc/sys/net/ipv4/ip_addrmask_agent ]; then\n"	"  echo 0 > /proc/sys/net/ipv4/ip_addrmask_agent\nfi\n\n");	fprintf (script, "if [ \"$EXT_PPP\" = \"on\" ]; then\n"	        	 "	# Turn on dynamic TCP/IP address hacking\n"			 "	# (Some broken PPPoE clients require this option to be enabled)\n"			 "	if [ -e /proc/sys/net/ipv4/ip_dynaddr ]; then\n"			 "		echo 1 > /proc/sys/net/ipv4/ip_dynaddr\n"			 "	fi\n"			 "else\n"			 "	if [ -e /proc/sys/net/ipv4/ip_dynaddr ]; then\n"			 "		echo 0 > /proc/sys/net/ipv4/ip_dynaddr\n"			 "	fi\n"			 "fi");       fprintf (script, "\n# --------( Sysctl Tuning - IPTables Specific Parameters )--------\n\n");   	fprintf (script, "# Doubling current limit for ip_conntrack\n");	fprintf (script, "if [ -e /proc/sys/net/ipv4/ip_conntrack_max ]; then\n"	"  echo 16384 > /proc/sys/net/ipv4/ip_conntrack_max\nfi\n\n");	fclose (script);}/* [ write_netfilter_script ] * Creates the netfilter shell script */voidwrite_netfilter_script (void){	gchar *scriptpath = FIRESTARTER_FIREWALL_SCRIPT;	FILE *script = fopen (scriptpath, "w");	time_t now;	struct tm *tm;	char timestamp[17];        if (script == NULL) {                /* Use perror to get sane error messages */                perror(scriptpath);                g_printerr("Script not written!");		return;	}	chmod (scriptpath, 00440);	write_sysctl_tuning_script ();	write_inbound_script ();	write_outbound_script ();		now = time(NULL);	tm = localtime(&now);	strftime(timestamp, 17, "%F %R", tm);	fprintf (script, "#-----------( Firestarter " VERSION ", Netfilter kernel subsystem in use )----------#\n");	fprintf (script, "#                                                                             #\n");	fprintf (script, "# This firewall was generated by Firestarter on %s              #\n", timestamp);	fprintf (script, "# http://www.fs-security.com                                                  #\n");	fprintf (script, "#                                                                             #\n");	fprintf (script, "#-----------------------------------------------------------------------------#\n\n");  				/* Autoloading of netfilter modules must be done before chains are flushed.*/    fprintf (script, "\n# --------( Initial Setup - Firewall Modules Autoloader )--------\n\n");	fprintf (script, "# Remove ipchains module if found\n");	fprintf (script, "$LSM | grep ipchains -q -s && $RMM ipchains\n\n");	fprintf (script, "# Try to load every module we need\n");	fprintf (script, "$MPB ip_tables 2> /dev/null\n");	fprintf (script, "$MPB iptable_filter 2> /dev/null\n");	fprintf (script, "$MPB ipt_state 2> /dev/null\n");			fprintf (script, "$MPB ip_conntrack 2> /dev/null\n");	fprintf (script, "$MPB ip_conntrack_ftp 2> /dev/null\n");	fprintf (script, "$MPB ip_conntrack_irc 2> /dev/null\n");	fprintf (script, "$MPB ipt_REJECT 2> /dev/null\n");	/* fprintf (script, "$MPB ipt_REDIRECT 2> /dev/null\n"); */	fprintf (script, "$MPB ipt_TOS 2> /dev/null\n");	fprintf (script, "$MPB ipt_MASQUERADE 2> /dev/null\n");	fprintf (script, "$MPB ipt_LOG 2> /dev/null\n");	fprintf (script, "$MPB iptable_mangle 2> /dev/null\n");	fprintf (script, "$MPB ipt_ipv4optsstrip 2> /dev/null\n");	fprintf (script, "if [ \"$NAT\" = \"on\" ]; then\n"			 "	$MPB iptable_nat 2> /dev/null\n"			 "	$MPB ip_nat_ftp 2> /dev/null\n"			 "	$MPB ip_nat_irc 2> /dev/null\n"			 "fi\n");	fprintf (script, "if [ \"EXT_PPP\" = \"on\" ]; then\n"			 "	$MPB bsd_comp 2> /dev/null\n"			 "	$MPB ppp_deflate 2> /dev/null\n"			 "fi\n\n");   fprintf (script, "\n# --------( Initial Setup - Firewall Capabilities Check )--------\n\n");	fprintf (script, "# Make sure the test chains does not exist\n");	fprintf (script, "$IPT -F test 2> /dev/null\n"			 "$IPT -X test 2> /dev/null\n"			 "if [ \"$NAT\" = \"on\" ]; then\n"			 "	$IPT -t nat -F test 2> /dev/null\n"			 "	$IPT -t nat -X test 2> /dev/null\n"			 "fi\n\n");	fprintf (script, "# Iptables support check, mandatory feature\n"	                 "if [ \"`$IPT -N test 2>&1`\" ]; then\n"			 "	echo Fatal error: Your kernel does not support iptables.\n"			 "	return %d\n"			 "fi\n\n", RETURN_NO_IPTABLES);	fprintf (script, "# Logging support check\n"			 "log_supported=1\n"			 "if [ \"`$IPT -A test -j LOG 2>&1`\" ]; then\n"			 "	echo Warning: Logging not supported by kernel, you will recieve no firewall event updates.\n"			 "	log_supported=\"\"\n"			 "fi\n\n");	fprintf (script, "if [ \"$NAT\" = \"on\" ]; then\n"			 "	# NAT support check\n"			 "	nat_supported=1\n"			 "	if [ \"`$IPT -t nat -N test 2>&1`\" ]; then\n"			 "		echo Warning: Network address translation not supported by kernel, feature disabled.\n"			 "		nat_supported=\"\"\n"			 "	fi\n"			 "fi\n\n");	fprintf (script, "# Mangle support check\n"			 "mangle_supported=1\n"			 "if [ \"`$IPT -t mangle -F 2>&1`\" ]; then\n"			 "	echo Warning: Packet mangling not supported by kernel, feature disabled.\n"			 "	mangle_supported=\"\"\n"			 "fi\n\n");	fprintf (script, "# IP options stripping support check\n");	fprintf (script, "stripoptions_supported=1\n");	fprintf (script, "if [ \"`$IPT -t mangle -A test -j IPV4OPTSSTRIP 2>&1`\" ]; then\n"		/*"  echo Warning: IP options stripping not supported by kernel, feature disabled.\n"*/		"  stripoptions_supported=\"\"\n"		"fi\n\n");   fprintf (script, "\n# --------( Chain Configuration - Flush Existing Chains )--------\n\n");	fprintf (script, "# Purge standard chains (INPUT, OUTPUT, FORWARD).\n\n");	fprintf (script, "$IPT -F\n$IPT -X\n$IPT -Z\n\n");	fprintf (script, "# Purge extended chains (MANGLE & NAT) if they exist.\n\n");	fprintf (script, "if [ \"$mangle_supported\" ]; then\n");	fprintf (script, "  $IPT -t mangle -F\n  $IPT -t mangle -X\n  $IPT -t mangle -Z\nfi\n");	fprintf (script, "if [ \"$nat_supported\" ]; then\n");	fprintf (script, "  $IPT -t nat -F\n  $IPT -t nat -X\n  $IPT -t nat -Z\nfi\n\n");   fprintf (script, "\n# --------( Chain Configuration - Configure Default Policy )--------\n\n");	fprintf (script, "# Configure standard chains (INPUT, OUTPUT, FORWARD).\n\n");	fprintf (script, "$IPT -P INPUT DROP\n");	fprintf (script, "$IPT -P OUTPUT DROP\n");	fprintf (script, "$IPT -P FORWARD DROP\n\n");	fprintf (script, "# Configure extended chains (MANGLE & NAT) if required.\n\n");	fprintf (script, "if [ \"$mangle_supported\" ]; then\n");	fprintf (script, "  $IPT -t mangle -P INPUT ACCEPT\n");	fprintf (script, "  $IPT -t mangle -P OUTPUT ACCEPT\n");	fprintf (script, "  $IPT -t mangle -P PREROUTING ACCEPT\n");	fprintf (script, "  $IPT -t mangle -P POSTROUTING ACCEPT\nfi\n");	fprintf (script, "if [ \"$nat_supported\" ]; then\n");	fprintf (script, "  $IPT -t nat -P OUTPUT ACCEPT\n");	fprintf (script, "  $IPT -t nat -P PREROUTING ACCEPT\n");	fprintf (script, "  $IPT -t nat -P POSTROUTING ACCEPT\nfi\n\n");   fprintf (script, "\n# --------( Chain Configuration - Create Default Result Chains )--------\n\n");	fprintf (script, "# Create a new chain for filtering the input before logging is performed\n"	                 "$IPT -N LOG_FILTER 2> /dev/null\n"	                 "$IPT -F LOG_FILTER\n\n");	fprintf (script, "# Hosts for which logging is disabled\n");	fprintf (script, "while read host garbage\n\tdo\n");	fprintf (script, "\t\t$IPT -A LOG_FILTER -s $host -j $STOP_TARGET\n");	fprintf (script, "\tdone < "FIRESTARTER_FILTER_HOSTS_SCRIPT"\n\n");	fprintf (script, "# Ports for which logging is disabled\n");	fprintf (script, "while read port garbage\n\tdo\n");	fprintf (script, "\t\t$IPT -A LOG_FILTER -p tcp --dport $port -j $STOP_TARGET\n");	fprintf (script, "\t\t$IPT -A LOG_FILTER -p udp --dport $port -j $STOP_TARGET\n");	fprintf (script, "\tdone < "FIRESTARTER_FILTER_PORTS_SCRIPT"\n\n");	fprintf (script, "# Create a new log and stop input (LSI) chain.\n");	fprintf (script, "$IPT -N LSI 2> /dev/null\n"	                 "$IPT -F LSI\n"	                 "$IPT -A LSI -j LOG_FILTER\n"	                 "if [ \"$log_supported\" ]; then\n"	                 "	# Syn-flood protection\n"	                 "	$IPT -A LSI -p tcp --syn -m limit --limit 1/s -j LOG --log-level=$LOG_LEVEL --log-prefix \"Inbound \"\n"	                 "	$IPT -A LSI -p tcp --syn -j $STOP_TARGET\n"	                 "	# Rapid portscan protection\n"	                 "	$IPT -A LSI -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit --limit 1/s -j LOG --log-level=$LOG_LEVEL --log-prefix \"Inbound \"\n"	                 "	$IPT -A LSI -p tcp --tcp-flags SYN,ACK,FIN,RST RST -j $STOP_TARGET\n"	                 "	# Ping of death protection\n"	                 "	$IPT -A LSI -p icmp --icmp-type echo-request -m limit --limit 1/s -j LOG --log-level=$LOG_LEVEL --log-prefix \"Inbound \"\n"	                 "	$IPT -A LSI -p icmp --icmp-type echo-request -j $STOP_TARGET\n"	                 "	# Log everything\n"	                 "	$IPT -A LSI -m limit --limit 5/s -j LOG --log-level=$LOG_LEVEL --log-prefix \"Inbound \"\n"	                 "fi\n"	                 "$IPT -A LSI -j $STOP_TARGET # Terminate evaluation\n\n");	fprintf (script, "# Create a new log and stop output (LSO) chain.\n");	fprintf (script, "$IPT -N LSO 2> /dev/null\n"	                 "$IPT -F LSO\n"	                 "$IPT -A LSO -j LOG_FILTER\n"	                 "if [ \"$log_supported\" ]; then\n"	                 "	# Log everything\n"	                 "	$IPT -A LSO -m limit --limit 5/s -j LOG --log-level=$LOG_LEVEL --log-prefix \"Outbound \"\n"	                 "fi\n"	                 "$IPT -A LSO -j REJECT # Terminate evaluation\n\n");	fprintf (script, "\n# --------( Initial Setup - Nameservers )--------\n\n");	fprintf (script, "# Allow regular DNS traffic\n"			 "while read keyword server garbage\n"			 "	do\n"			 "		if [ \"$keyword\" = \"nameserver\" ]; then\n"

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲青青青在线视频| 久久综合色婷婷| 日韩午夜三级在线| 国产亚洲精品资源在线26u| 国产精品视频免费看| 依依成人综合视频| 激情图片小说一区| 91丨porny丨国产| 欧美精品777| 国产精品美女久久久久高潮| 亚洲成年人网站在线观看| 国产曰批免费观看久久久| 91免费看片在线观看| 日韩一区和二区| 欧美国产1区2区| 免费国产亚洲视频| 99久久精品免费| 欧美一二三区在线观看| 成人免费在线观看入口| 蜜臀av性久久久久av蜜臀妖精 | 日韩三级精品电影久久久 | 91老师片黄在线观看| 91精品久久久久久蜜臀| 中文字幕一区二区三区视频 | 中文字幕不卡的av| 日本午夜一本久久久综合| 91亚洲精品久久久蜜桃网站| 亚洲精品在线免费播放| 亚洲大片一区二区三区| 99精品偷自拍| 久久免费美女视频| 日韩主播视频在线| 91高清视频免费看| 中文字幕av一区二区三区高| 奇米在线7777在线精品| 色一情一伦一子一伦一区| 久久九九久久九九| 日本最新不卡在线| 在线中文字幕不卡| 国产精品国产三级国产有无不卡 | 综合亚洲深深色噜噜狠狠网站| 久草精品在线观看| 欧美日本免费一区二区三区| 成人欧美一区二区三区黑人麻豆| 韩国v欧美v亚洲v日本v| 69p69国产精品| 亚洲一区在线观看网站| 99精品国产99久久久久久白柏 | a级精品国产片在线观看| 精品久久一区二区| 美女任你摸久久| 欧美伦理视频网站| 亚洲国产视频a| 日本精品一级二级| 亚洲免费高清视频在线| av激情亚洲男人天堂| 欧美经典三级视频一区二区三区| 黄页视频在线91| 日韩欧美成人激情| 美女被吸乳得到大胸91| 日韩亚洲欧美一区| 日韩高清不卡一区二区| 555www色欧美视频| 午夜精品爽啪视频| 欧美日韩精品是欧美日韩精品| 亚洲一卡二卡三卡四卡五卡| 91浏览器入口在线观看| 亚洲免费高清视频在线| 91福利视频久久久久| 亚洲欧美色图小说| 91久久香蕉国产日韩欧美9色| 亚洲欧洲av另类| 91免费在线视频观看| 亚洲人成在线播放网站岛国 | 亚洲高清一区二区三区| 欧美综合一区二区| 午夜国产不卡在线观看视频| 欧美日韩精品二区第二页| 日韩制服丝袜av| 日韩欧美精品在线| 韩国三级电影一区二区| 国产欧美一区二区精品性色超碰| 成人一区二区视频| 亚洲视频网在线直播| 在线视频国产一区| 午夜精品久久久久久久久久| 日韩三级电影网址| 国产成人免费视频| 亚洲品质自拍视频| 欧美美女一区二区三区| 久久精品99国产国产精| 久久久久久久久久美女| av一区二区三区四区| 亚洲女子a中天字幕| 欧美军同video69gay| 美国一区二区三区在线播放| 久久先锋影音av鲁色资源| 成人av免费在线观看| 亚洲午夜免费电影| 精品国一区二区三区| av电影在线观看一区| 亚洲成人av福利| 久久久综合九色合综国产精品| 99久久精品免费看国产免费软件| 亚洲国产精品久久人人爱蜜臀| 欧美一区二区高清| 粉嫩蜜臀av国产精品网站| 亚洲另类色综合网站| 日韩一区二区三区免费看| 国产福利91精品| 亚洲午夜在线观看视频在线| 在线观看一区二区视频| 韩国av一区二区三区在线观看| 国产精品欧美一区二区三区| 欧美色图一区二区三区| 精品一区二区在线视频| 亚洲欧美日本韩国| 精品久久久久香蕉网| 色哟哟亚洲精品| 国产乱人伦偷精品视频免下载| 一区二区在线观看免费| 精品久久久久99| 91最新地址在线播放| 韩国一区二区在线观看| 亚洲影院理伦片| 久久这里只精品最新地址| 色婷婷狠狠综合| 激情综合色播激情啊| 亚洲激情图片一区| 久久久久久久性| 日韩一区二区在线播放| 色婷婷综合久久久久中文| 国产老肥熟一区二区三区| 亚洲一本大道在线| 国产精品色婷婷久久58| 日韩美女主播在线视频一区二区三区| 91一区一区三区| 国产精品一级二级三级| 天天av天天翘天天综合网| 亚洲免费资源在线播放| 国产清纯美女被跳蛋高潮一区二区久久w| 欧美乱妇15p| 在线视频国产一区| 99久久精品国产导航| 国产精品一区二区三区四区 | 久久你懂得1024| 在线观看欧美精品| av亚洲产国偷v产偷v自拍| 极品美女销魂一区二区三区| 亚洲成av人片在线| 亚洲摸摸操操av| 国产精品伦理在线| 久久欧美中文字幕| 日韩午夜在线观看视频| 91超碰这里只有精品国产| 色婷婷激情久久| 99riav久久精品riav| 国产精品一区二区久久不卡| 久久国产夜色精品鲁鲁99| 日韩福利视频导航| 亚洲成a人v欧美综合天堂下载| 一区二区在线观看免费| 亚洲天堂网中文字| 国产精品乱码一区二区三区软件| 26uuu久久综合| 欧美成人vps| 日韩你懂的电影在线观看| 7777精品伊人久久久大香线蕉经典版下载| 日本精品裸体写真集在线观看 | 亚洲成av人片www| 亚洲午夜久久久久久久久久久 | 欧美一区二区黄| 91精品国产一区二区三区蜜臀 | 成人一道本在线| 国产激情一区二区三区| 国产黄色精品网站| 国产·精品毛片| 成人丝袜18视频在线观看| 国产福利一区在线观看| 国产盗摄精品一区二区三区在线 | 亚洲欧美色图小说| 亚洲日本一区二区| 亚洲综合一区二区三区| 亚洲成人av一区二区| 国产麻豆午夜三级精品| 天堂成人免费av电影一区| 日韩av电影天堂| 久久99精品久久久久久国产越南| 麻豆专区一区二区三区四区五区| 麻豆精品一区二区三区| 国产精品资源站在线| 国产不卡一区视频| thepron国产精品| 91福利在线观看| 8v天堂国产在线一区二区| 欧美r级电影在线观看| 亚洲精品在线观看网站| 久久精品网站免费观看| 中文字幕亚洲欧美在线不卡| 一区二区三区国产精华|