
Enviado em 17/05/2018 - 14:34h
Os Sabayons antigos usavam UFW, os novos, usam firewalld em systemd.
UFW desativado;
ufw.service - Uncomplicated Firewall
Loaded: loaded (/usr/lib/systemd/system/ufw.service; disabled; vendor preset: disabled)
Active: inactive (dead)
sudo systemctl status iptables.service
Unit iptables.service could not be found.
sudo iptables --list
Senha:
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
ACCEPT all -- anywhere anywhere
INPUT_direct all -- anywhere anywhere
INPUT_ZONES_SOURCE all -- anywhere anywhere
INPUT_ZONES all -- anywhere anywhere
DROP all -- anywhere anywhere ctstate INVALID
REJECT all -- anywhere anywhere reject-with icmp-host-prohibited
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
ACCEPT all -- anywhere anywhere
FORWARD_direct all -- anywhere anywhere
FORWARD_IN_ZONES_SOURCE all -- anywhere anywhere
FORWARD_IN_ZONES all -- anywhere anywhere
FORWARD_OUT_ZONES_SOURCE all -- anywhere anywhere
FORWARD_OUT_ZONES all -- anywhere anywhere
DROP all -- anywhere anywhere ctstate INVALID
REJECT all -- anywhere anywhere reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
OUTPUT_direct all -- anywhere anywhere
Chain FORWARD_IN_ZONES (1 references)
target prot opt source destination
FWDI_public all -- anywhere anywhere [goto]
FWDI_public all -- anywhere anywhere [goto]
Chain FORWARD_IN_ZONES_SOURCE (1 references)
target prot opt source destination
Chain FORWARD_OUT_ZONES (1 references)
target prot opt source destination
FWDO_public all -- anywhere anywhere [goto]
FWDO_public all -- anywhere anywhere [goto]
Chain FORWARD_OUT_ZONES_SOURCE (1 references)
target prot opt source destination
Chain FORWARD_direct (1 references)
target prot opt source destination
Chain FWDI_public (2 references)
target prot opt source destination
FWDI_public_log all -- anywhere anywhere
FWDI_public_deny all -- anywhere anywhere
FWDI_public_allow all -- anywhere anywhere
ACCEPT icmp -- anywhere anywhere
Chain FWDI_public_allow (1 references)
target prot opt source destination
Chain FWDI_public_deny (1 references)
target prot opt source destination
Chain FWDI_public_log (1 references)
target prot opt source destination
Chain FWDO_public (2 references)
target prot opt source destination
FWDO_public_log all -- anywhere anywhere
FWDO_public_deny all -- anywhere anywhere
FWDO_public_allow all -- anywhere anywhere
Chain FWDO_public_allow (1 references)
target prot opt source destination
Chain FWDO_public_deny (1 references)
target prot opt source destination
Chain FWDO_public_log (1 references)
target prot opt source destination
Chain INPUT_ZONES (1 references)
target prot opt source destination
IN_public all -- anywhere anywhere [goto]
IN_public all -- anywhere anywhere [goto]
Chain INPUT_ZONES_SOURCE (1 references)
target prot opt source destination
Chain INPUT_direct (1 references)
target prot opt source destination
Chain IN_public (2 references)
target prot opt source destination
IN_public_log all -- anywhere anywhere
IN_public_deny all -- anywhere anywhere
IN_public_allow all -- anywhere anywhere
ACCEPT icmp -- anywhere anywhere
Chain IN_public_allow (1 references)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh ctstate NEW
Chain IN_public_deny (1 references)
target prot opt source destination
Chain IN_public_log (1 references)
target prot opt source destination
Chain OUTPUT_direct (1 references)
target prot opt source destination
firewall-cmd --get-default-zone
public
sudo systemctl status firewalld.service
Senha:
● firewalld.service - firewalld - dynamic firewall daemon
Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; vendor preset: disabled)
Active: active (running) since Thu 2018-05-17 13:58:49 -03; 30min ago
Docs: man:firewalld(1)
Main PID: 2010 (firewalld)
Tasks: 3 (limit: 4915)
CGroup: /system.slice/firewalld.service
└─2010 /usr/bin/python2.7 -Es /usr/lib/python-exec/python2.7/firewalld --nofork --nopid
mai 17 13:58:52 sabayon.local firewalld[2010]: WARNING: '/sbin/ip6tables-restore -n' failed:
mai 17 13:58:52 sabayon.local firewalld[2010]: ERROR: Failed to apply rules. A firewall reload might solve >
mai 17 13:58:52 sabayon.local firewalld[2010]: ERROR: '/sbin/ebtables -t broute -F' failed:
mai 17 13:58:52 sabayon.local firewalld[2010]: ERROR: '/sbin/iptables-restore -n' failed:
mai 17 13:58:52 sabayon.local firewalld[2010]: ERROR: Failed to apply rules. A firewall reload might solve >
mai 17 13:58:52 sabayon.local firewalld[2010]: ERROR: '/sbin/ebtables -t nat -D OUTPUT -j OUTPUT_direct' fa>
mai 17 13:58:52 sabayon.local firewalld[2010]: ERROR: COMMAND_FAILED
mai 17 13:58:54 sabayon.local firewalld[2010]: WARNING: '/sbin/ip6tables-restore -n' failed:
mai 17 13:58:54 sabayon.local firewalld[2010]: ERROR: '/sbin/iptables-restore -n' failed:
mai 17 13:58:54 sabayon.local firewalld[2010]: ERROR: COMMAND_FAILED
lines 1-19/19 (END)
Cirurgia para acelerar o openSUSE em HD externo via USB
Void Server como Domain Control
Modo Simples de Baixar e Usar o bash-completion
Monitorando o Preço do Bitcoin ou sua Cripto Favorita em Tempo Real com um Widget Flutuante
Como fazer a conversão binária e aplicar as restrições no Linux
Como quebrar a senha de um servidor Linux Debian
Como bloquear pendrive em uma rede Linux
Um autoinstall.yaml para Ubuntu com foco em quem vai fazer máquina virtual
Instalar GRUB sem archinstall no Arch Linux em UEFI Problemático









