Using Custom Firewall how can I block utorrent download?
I tried but did not help:
iptables -I FORWARD -p tcp -m multiport --dports 1024:65535 -m iprange --src-range 192.168.16.2-192.168.16.254 -j DROP
iptables -I FORWARD -p udp -m multiport --dports 1024:65535 -m iprange --src-range 192.168.16.2-192.168.16.254 -j DROP
I tried but did not help:
iptables -I FORWARD -p tcp -m multiport --dports 1024:65535 -m iprange --src-range 192.168.16.2-192.168.16.254 -j DROP
iptables -I FORWARD -p udp -m multiport --dports 1024:65535 -m iprange --src-range 192.168.16.2-192.168.16.254 -j DROP
Share this post:
Responses (35)
-
Accepted Answer
If you've done the downgrade, an update was pushed last night so you should now have:
If you have not done the downgrade, do:app-netify-fwa-core-2.3.2-1.v7.noarch
netify-fwa-2.2-1.v7.noarch
which should straighten thing out.yum downgrade app-netify* netify*
yum update app-netify* netify*
This should provide an interim fix for BitTorrent. The blocking will not be perfect but, if anything gets through, it should be very slow and the app should no longer stop. I hope to test myself in the next few days. -
Accepted Answer
-
Accepted Answer
Peter Baldwin wrote:
You should also know that the Bittorrent detection is not 100%. An end user will be able to start a torrent, but connections to most peers will fail and the download will be extremely slow (or maybe even nil).
I have been installed Protocol Filter from marketplace, but as soon as I turn on the utorrent download after a short time Protocol Filter action status STOPPED. -
Accepted Answer
-
Accepted Answer
-
Accepted Answer
-
Accepted Answer
It segfaulted on me earlier today and I was not in the house:
And I've just checked and those two files do not exist.Jan 4 18:17:44 server kernel: enp2s0[27194]: segfault at ffffffffffffffe8 ip 000000000041805b sp 00007f4727a147e0 error 5 in netifyd[400000+82000]
Jan 4 18:17:44 server netify-fwa[17281]: Netify socket hung-up, reconnecting...
Jan 4 18:17:44 server netify-fwa[17281]: Error connecting to Netify node: Connection refused
Jan 4 18:17:44 server systemd: netifyd.service: main process exited, code=killed, status=11/SEGV
Jan 4 18:17:44 server systemd: Unit netifyd.service entered failed state.
Jan 4 18:17:44 server systemd: netifyd.service failed.
Jan 4 18:17:45 server netifyd: Netify Agent v2.3
Jan 4 18:17:45 server netifyd: Unable to hash file: /var/lib/netifyd/app-content-match.csv: No such file or directory
Jan 4 18:17:45 server netifyd: Unable to hash file: /var/lib/netifyd/app-host-match.csv: No such file or directory
Jan 4 18:17:45 server netifyd: enp5s0: capture started on CPU: 0
Jan 4 18:17:45 server netifyd: enp2s0: capture started on CPU: 1
-
Accepted Answer
Edgars Volkovs wrote:
Nick Howitt wrote:
[quote]Edgars Volkovs wrote:
Want to see my / var / log / messages???
It can't harm and may help, so please post them but not the whole thing, just a relevant section.
Okey - I'll post tomorrow.[/quote]
Jan 4 10:38:30 gateway netifyd: void ndSocketThread::ClientHangup(std::map<int, ndSocket*>::iterator&
Jan 4 10:38:30 gateway netify-fwa[24814]:
Jan 4 10:38:30 gateway systemd: start request repeated too quickly for firewall.service
Jan 4 10:38:30 gateway systemd: Failed to start ClearOS Firewall Engine.
Jan 4 10:38:30 gateway systemd: firewall.service failed.
Jan 4 10:38:30 gateway exec-stop-post.sh: Job for firewall.service failed because start of the service was attempted too often. See "systemctl status firewall.service" and "journalctl -xe" for details.
Jan 4 10:38:30 gateway exec-stop-post.sh: To force a start use "systemctl reset-failed firewall.service" followed by "systemctl start firewall.service" again.
Jan 4 10:38:30 gateway systemd: netify-fwa.service: control process exited, code=exited status=1
Jan 4 10:38:30 gateway systemd: Failed to start Netify FWA Daemon.
Jan 4 10:38:30 gateway systemd: Unit netify-fwa.service entered failed state.
Jan 4 10:38:30 gateway systemd: netify-fwa.service failed.
Jan 4 10:38:32 gateway webconfig: Redirecting to /bin/systemctl start netify-fwa.service
Jan 4 10:38:32 gateway systemd: Starting Netify FWA Daemon...
Jan 4 10:38:32 gateway php: Netify Firewall Agent v1.8/1.5
Jan 4 10:38:32 gateway php: Netify Firewall Agent v1.8 starting...
Jan 4 10:38:32 gateway netify-fwa[24924]:
Jan 4 10:38:32 gateway systemd: start request repeated too quickly for firewall.service
Jan 4 10:38:32 gateway systemd: Failed to start ClearOS Firewall Engine.
Jan 4 10:38:32 gateway systemd: firewall.service failed.
Jan 4 10:38:32 gateway exec-start-post.sh: Job for firewall.service failed because start of the service was attempted too often. See "systemctl status firewall.service" and "journalctl -xe" for details.
Jan 4 10:38:32 gateway exec-start-post.sh: To force a start use "systemctl reset-failed firewall.service" followed by "systemctl start firewall.service" again.
Jan 4 10:38:32 gateway systemd: netify-fwa.service: control process exited, code=exited status=1
Jan 4 10:38:32 gateway netify-fwa[25128]: Exiting... -
Accepted Answer
-
Accepted Answer
-
Accepted Answer
Nick Howitt wrote:
Digging further, I am seeing the following in /var/log/messages:
and the firewall seems to restart 5 times.Jan 3 18:19:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:19:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:07 server netify-fwa[19754]: Exiting...
Jan 3 18:21:07 server netify-fwa[19754]:
Jan 3 18:21:07 server netifyd: void ndSocketThread::ClientHangup(std::map<int, ndSocket*>::iterator&
Jan 3 18:21:08 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:11 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:11 server php: Netify Firewall Agent v1.8/1.5
Jan 3 18:21:12 server php: Netify Firewall Agent v1.8 starting...
Jan 3 18:21:12 server netify-fwa[15651]:
Jan 3 18:21:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:12 server netify-fwa[15703]: Exiting...
Jan 3 18:21:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:12 server netify-fwa[15703]:
Jan 3 18:21:12 server netifyd: void ndSocketThread::ClientHangup(std::map<int, ndSocket*>::iterator&
Jan 3 18:21:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:16 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:16 server php: Netify Firewall Agent v1.8/1.5
Jan 3 18:21:16 server php: Netify Firewall Agent v1.8 starting...
Jan 3 18:21:16 server netify-fwa[17237]:
Jan 3 18:21:16 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:20 server clearsyncd[18063]: System Events: Socket hang-up: 33
Want to see my / var / log / messages??? -
Accepted Answer
Digging further, I am seeing the following in /var/log/messages:
and the firewall seems to restart 5 times.Jan 3 18:19:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:19:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:07 server netify-fwa[19754]: Exiting...
Jan 3 18:21:07 server netify-fwa[19754]:
Jan 3 18:21:07 server netifyd: void ndSocketThread::ClientHangup(std::map<int, ndSocket*>::iterator&
Jan 3 18:21:08 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:11 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:11 server php: Netify Firewall Agent v1.8/1.5
Jan 3 18:21:12 server php: Netify Firewall Agent v1.8 starting...
Jan 3 18:21:12 server netify-fwa[15651]:
Jan 3 18:21:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:12 server netify-fwa[15703]: Exiting...
Jan 3 18:21:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:12 server netify-fwa[15703]:
Jan 3 18:21:12 server netifyd: void ndSocketThread::ClientHangup(std::map<int, ndSocket*>::iterator&
Jan 3 18:21:12 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:16 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:16 server php: Netify Firewall Agent v1.8/1.5
Jan 3 18:21:16 server php: Netify Firewall Agent v1.8 starting...
Jan 3 18:21:16 server netify-fwa[17237]:
Jan 3 18:21:16 server clearsyncd[18063]: System Events: Socket hang-up: 33
Jan 3 18:21:20 server clearsyncd[18063]: System Events: Socket hang-up: 33
-
Accepted Answer
-
Accepted Answer
-
Accepted Answer
-
Accepted Answer
Nick Howitt wrote:
Hmm, it looks like you also need to update netify-fwa:
For me I did not get the stopping with the basic installation. If I installed the updates-testing netifyd on its own then the protocol filter would stop. Updating to the netify-fwa version in updates-testing allowed the protocol filter to run. I found it did not block Transmission running on my server from downloading. I don't know if it is supposed to or if it is only meant to block apps downloading on the LAN.yum --enablerepo=clearos-contribs-testing upgrade netify*
Updated:
netify-fwa.noarch 0:2.0-1.v7
Complete!
[root@gateway ~]# -
Accepted Answer
Nick Howitt wrote:
App Version 2.3.0-1 is the version of the app-protocol-filter. What is the netify version (and for the sake of it the netify-fwa version):rpm -q netifyd netify-fwa
Rather than doing a print screen, you can copy text from PuTTy just by selecting it. Then paste it into your post between "code" tags (the piece of paper icon with a <> on it)
[root@gateway ~]# rpm -q netifyd netify-fwa
netifyd-2.3-1.v7.x86_64
netify-fwa-1.6-1.v7.noarch -
Accepted Answer
Hmm, it looks like you also need to update netify-fwa:
For me I did not get the stopping with the basic installation. If I installed the updates-testing netifyd on its own then the protocol filter would stop. Updating to the netify-fwa version in updates-testing allowed the protocol filter to run. I found it did not block Transmission running on my server from downloading. I don't know if it is supposed to or if it is only meant to block apps downloading on the LAN.yum --enablerepo=clearos-contribs-testing upgrade netify*
-
Accepted Answer
App Version 2.3.0-1 is the version of the app-protocol-filter. What is the netify version (and for the sake of it the netify-fwa version):rpm -q netifyd netify-fwa
Rather than doing a print screen, you can copy text from PuTTy just by selecting it. Then paste it into your post between "code" tags (the piece of paper icon with a <> on it) -
Accepted Answer
-
Accepted Answer
-
Accepted Answer
-
Accepted Answer
-
Accepted Answer
-
Accepted Answer
Edgars Volkovs wrote:
Yes i have been installed Protocol Filter from marketplace, but as soon as I turn on the utorrent download after a short time Protocol Filter action status STOPPED.
There's some corruption in the Bittorrent detection engine. This has been fixed but not yet pushed out for final release. To install the fix, run:
yum --enablerepo=clearos-contribs-testing upgrade netifyd
-
Accepted Answer
-
Accepted Answer
-
Accepted Answer
-
Accepted Answer
Have you had a look at the Protocol Filter app from the marketplace?
What happened when you used your rules? Did utorrent use low ports? or did the firewall rules fail. Note at a minimum you should use "iptables -w" and not just "iptables". Better is to use $IPTABLES (but it won't work at the command line.
Please login to post a reply
You will need to be logged in to be able to post a reply. Login using the form on the right or register an account if you are new here.
Register Here »