?¡ëPNG  IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À? ¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/user1137782/www/china1.by/classwithtostring.php on line 86

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
etc/firewall.old/fw000066600000006707150473025140010257 0ustar00#!/bin/sh dev="eth0" devel="0" ipt="/sbin/iptables" mpr="/sbin/modprobe" # common services # allow_ftp: incoming and outgoung ftp allow_ftp="yes" # "yes"/"no" # input rules # (you can not include ports 20,21 if you have allowed ftp above) input_tcp_ports="22,25,80,110,143,443,465,666,873,993,995,4000,4001,4002,2525,3306,10050,636" input_udp_ports="" input_policy="DROP" # output rules # (you can not include ports 20,21 if you have allowed ftp above) output_tcp_ports="22,25,43,53,80,81,110,143,443,465,636,873,953,993,995,1080,2100,2525,3307,2401,3128,3306,3724,5190,5432,6112,6460,6746,7890,7990,8080,8306,9418,10051,10050" output_udp_ports="53,659,953,1659,9418" output_policy="DROP" # flush firewall settings # # $ipt -P INPUT ACCEPT $ipt -P OUTPUT ACCEPT $ipt -P FORWARD ACCEPT $ipt -F #$ipt -F -t nat # proceed USER settigs # # if [ -x /etc/firewall/fw-input ]; then /etc/firewall/fw-input fi if [ -x /etc/firewall/fw-output ]; then /etc/firewall/fw-output fi # proceed INPUT chain # # # allow ICMP proto $ipt -A INPUT -j ACCEPT -i $dev -p icmp # proceed TCP ports n=0 for i in `echo "$input_tcp_ports" | tr ',' ' '`; do [ "$n" == "0" ] && p=$i || p="$p,$i" let n++ if [ "$n" == "8" ]; then n=0 $ipt -A INPUT -j ACCEPT -i $dev -p tcp -m multiport --dports $p fi done [ ! "$n" == "0" ] && $ipt -A INPUT -j ACCEPT -i $dev -p tcp -m multiport --dports $p # proceed UDP ports n=0 for i in `echo "$input_udp_ports" | tr ',' ' '`; do [ "$n" == "0" ] && p=$i || p="$p,$i" let n++ if [ "$n" == "8" ]; then n=0 $ipt -A INPUT -j ACCEPT -i $dev -p udp -m multiport --dports $p fi done [ ! "$n" == "0" ] && $ipt -A INPUT -j ACCEPT -i $dev -p udp -m multiport --dports $p # Standart related/established connections $ipt -A INPUT -j ACCEPT -i $dev -p tcp -m state --state RELATED,ESTABLISHED $ipt -A INPUT -j ACCEPT -i $dev -p udp -m state --state RELATED,ESTABLISHED # proceed OUTPUT chain # # # allow ICMP proto $ipt -A OUTPUT -j ACCEPT -o $dev -p icmp n=0 for i in `echo "$output_tcp_ports" | tr ',' ' '`; do [ "$n" == "0" ] && p=$i || p="$p,$i" let n++ if [ "$n" == "8" ]; then n=0 $ipt -A OUTPUT -j ACCEPT -o $dev -p tcp -m multiport --dports $p fi done [ ! "$n" == "0" ] && $ipt -A OUTPUT -j ACCEPT -o $dev -p tcp -m multiport --dports $p # proceed UDP ports n=0 for i in `echo "$output_udp_ports" | tr ',' ' '`; do [ "$n" == "0" ] && p=$i || p="$p,$i" let n++ if [ "$n" == "8" ]; then n=0 $ipt -A OUTPUT -j ACCEPT -o $dev -p udp -m multiport --dports $p fi done [ ! "$n" == "0" ] && $ipt -A OUTPUT -j ACCEPT -o $dev -p udp -m multiport --dports $p # Standart related/established connections $ipt -A OUTPUT -j ACCEPT -o $dev -p tcp --dport 1024:65535 -m state --state RELATED,ESTABLISHED $ipt -A OUTPUT -j ACCEPT -o $dev -p udp --dport 1024:65535 -m state --state RELATED,ESTABLISHED # FTP # # if [ "$allow_ftp" == "yes" ]; then # if [ `cat /proc/modules | grep -c ip_conntrack_ftp` == "0" ]; then # # try to load module ip_conntrack_ftp # $mpr ip_conntrack_ftp >/dev/null 2>&1 # fi $ipt -A INPUT -j ACCEPT -i $dev -p tcp --sport 1024:65535 --dport 21 $ipt -A OUTPUT -j ACCEPT -o $dev -p tcp --sport 1024:65535 --dport 21 fi # Traceroute $ipt -A OUTPUT -j ACCEPT -o $dev -p udp --dport 33434:33690 # default input/output policy $ipt -A INPUT -j $input_policy -i $dev $ipt -A OUTPUT -j $output_policy -o $dev # devel if [ ! "$devel" == "0" ]; then sleep 60 $ipt -F fi etc/firewall/fw000066600000013600150473153750007501 0ustar00#!/bin/bash ext="eth0" int="eth1" iptables="/sbin/iptables" modprobe="/sbin/modprobe" # input tcp port 80 (http) and 443 (https) # output tcp ports 25 (smtp), 465 (smtps) # output udp port 53 (dns) # has special processing, so don't enable it here # internal mysql connections has special processing too # so make sure that you correct defined internal nic ($int) # # WARNING # # please don't use this file to add or remove input/output rules # by client request. There is "fw-input" and "fw-output" hooks # for this purpose # # Only general rules here! # input_tcp_ports=() input_tcp_ports+=( 21 22 ) # ftp,ssh input_tcp_ports+=( 25 465 2525 ) # smtp,smtps,alt-smtp input_tcp_ports+=( 110 143 993 995 ) # pop3,imap,imaps,pop3s input_tcp_ports+=( 3306 ) # mysql input_tcp_ports+=( 10050 ) # zabbix input_udp_ports=() input_udp_ports+=( 161 ) # snmpd output_tcp_ports=() output_tcp_ports+=( 21 22 43 53 80 443 ) # ftp,ssh,whois,dns,http,https,alt-http output_tcp_ports+=( 110 143 993 995 ) # pop3,imap,imaps,pop3s output_tcp_ports+=( 389 636 ) # ldap,ldaps output_tcp_ports+=( 5432 ) # postgres output_tcp_ports+=( 81 8080 ) # alt-http output_tcp_ports+=( 9418 ) # git output_tcp_ports+=( 10050 10051 ) # zabbix output_udp_ports=() ################################################# # modules if [ ! -d "/sys/module/nf_conntrack_ftp" ]; then $modprobe nf_conntrack_ftp fi ################################################# # filter: INPUT # # flush chain $iptables -P INPUT ACCEPT $iptables -F INPUT # allow all loopback connections and icmp packets $iptables -A INPUT -j ACCEPT -i lo $iptables -A INPUT -j ACCEPT -i $ext -p icmp $iptables -A INPUT -i $ext -p tcp -m set --match-set ssh src -m tcp --dport 22 -j DROP # tcp ports 80 and 443 goes from raw table without connection tracking # accept all traffic to this ports here because 'state' module # doesn't work without connection tracking $iptables -A INPUT -j ACCEPT -i $ext -p tcp -m multiport --dports 80,443 # input hook [ -x /etc/firewall/fw-input ] && /etc/firewall/fw-input # allow input_tcp_ports while [ "${#input_tcp_ports[@]}" -gt 0 ]; do ports=$( printf ',%d' "${input_tcp_ports[@]:0:8}" ) input_tcp_ports=( "${input_tcp_ports[@]:8}" ) $iptables -A INPUT -j ACCEPT -i $ext -p tcp -m multiport --dports "${ports:1}" -m state --state NEW done # allow input_udp_ports while [ "${#input_udp_ports[@]}" -gt 0 ]; do ports=$( printf ',%d' "${input_udp_ports[@]:0:8}" ) input_udp_ports=( "${input_udp_ports[@]:8}" ) $iptables -A INPUT -j ACCEPT -i $ext -p udp -m multiport --dports "${ports:1}" -m state --state NEW done # allow related and established connections $iptables -A INPUT -j ACCEPT -i $ext -p tcp -m state --state RELATED,ESTABLISHED $iptables -A INPUT -j ACCEPT -i $ext -p udp -m state --state RELATED,ESTABLISHED # drop other connections $iptables -A INPUT -j DROP -i $ext ################################################# # filter: OUTPUT # # flush chain $iptables -P OUTPUT ACCEPT $iptables -F OUTPUT # reject nobody's local connections to smtp server $iptables -A OUTPUT -j REJECT -o lo -p tcp -m multiport --dports 25,465,2525 \ -m owner --uid-owner nobody --reject-with icmp-port-unreachable # allow all loopback connections and icmp packets $iptables -A OUTPUT -j ACCEPT -o lo $iptables -A OUTPUT -j ACCEPT -o $ext -p icmp # tcp ports 80 and 443 goes to raw table without connection tracking # accept all traffic from this ports here because 'state' module # doesn't work without connection tracking $iptables -A OUTPUT -j ACCEPT -o $ext -p tcp -m multiport --sports 80,443 # allow dns queries to only configured servers while read ip; do $iptables -A OUTPUT -j ACCEPT -o $ext -d $ip -p udp --dport 53 -m state --state NEW $iptables -A OUTPUT -j ACCEPT -o $ext -d $ip -p tcp --dport 53 -m state --state NEW done < <( awk '$1 == "nameserver" { print $2 }' /etc/resolv.conf ) # output hook [ -x /etc/firewall/fw-output ] && /etc/firewall/fw-output # allow all for root $iptables -A OUTPUT -j ACCEPT -o $ext -m owner --gid-owner root -m state --state NEW # allow 25 and 465 port only for "mail" group $iptables -A OUTPUT -j ACCEPT -o $ext -p tcp -m multiport --dports 25,465,2525 \ -m owner --gid-owner mail -m state --state NEW # allow output_tcp_ports while [ "${#output_tcp_ports[@]}" -gt 0 ]; do ports=$( printf ',%d' "${output_tcp_ports[@]:0:8}" ) output_tcp_ports=( "${output_tcp_ports[@]:8}" ) $iptables -A OUTPUT -j ACCEPT -o $ext -p tcp -m multiport --dports "${ports:1}" -m state --state NEW done # allow output_udp_ports while [ "${#output_udp_ports[@]}" -gt 0 ]; do ports=$( printf ',%d' "${output_udp_ports[@]:0:8}" ) output_udp_ports=( "${output_udp_ports[@]:8}" ) $iptables -A OUTPUT -j ACCEPT -o $ext -p udp -m multiport --dports "${ports:1}" -m state --state NEW done # allow traceroute ports $iptables -A OUTPUT -j ACCEPT -o $ext -p udp --dport 33434:33690 -m state --state NEW # allow related and entablished connections $iptables -A OUTPUT -j ACCEPT -o $ext -p tcp -m state --state RELATED,ESTABLISHED $iptables -A OUTPUT -j ACCEPT -o $ext -p udp -m state --state RELATED,ESTABLISHED # drop other connections $iptables -A OUTPUT -j DROP -o $ext ################################################# # raw: OUTPUT # # flush chain $iptables -t raw -P OUTPUT ACCEPT $iptables -t raw -F OUTPUT # don't track loopback connections $iptables -t raw -A OUTPUT -o lo -j NOTRACK # don't track http connections $iptables -t raw -A OUTPUT -o $ext -p tcp -m multiport --sports 80,443 -j NOTRACK # don't track mysql connections $iptables -t raw -A OUTPUT -o $int -p tcp --dport 3306 -j NOTRACK ################################################# # raw: PREROUTING # # flush chain $iptables -t raw -P PREROUTING ACCEPT $iptables -t raw -F PREROUTING # don't track http connections $iptables -t raw -A PREROUTING -i $ext -p tcp -m multiport --dports 80,443 -j NOTRACK # don't track mysql connections $iptables -t raw -A PREROUTING -i $int -p tcp --sport 3306 -j NOTRACK