mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-21 08:22:59 +02:00
firewall: Always initialise DROP_HOSTILE chain, even if it's unused
This ensures collectd can keep track of it, and generate the RRD graphs correctly. Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
This commit is contained in:
@@ -141,8 +141,8 @@ iptables_init() {
|
||||
|
||||
# Log and drop any traffic from and to networks known as being hostile, posing
|
||||
# a technical threat to our users (i. e. listed at Spamhaus DROP et al.)
|
||||
iptables -N DROP_HOSTILE
|
||||
if [ "$DROPHOSTILE" == "on" ]; then
|
||||
iptables -N DROP_HOSTILE
|
||||
iptables -A DROP_HOSTILE -m limit --limit 10/second -j LOG --log-prefix "DROP_HOSTILE "
|
||||
|
||||
iptables -A INPUT -i $IFACE -m geoip --src-cc XD -j DROP_HOSTILE
|
||||
|
||||
Reference in New Issue
Block a user