In 5.3.3.0.1.20150127115148_446974b, the default is still ACCEPT
Can we make this optional? Drop all is good for security, but is very difficult for getting it up and running. And very difficult to diagnose problems
Pete, can you take a stab at this and see what happens. Thanks.
New commit detected on manageiq/master: https://github.com/ManageIQ/manageiq/commit/999d2ae0743ece4d1bbb6bc1d465fbf21e8097b8 commit 999d2ae0743ece4d1bbb6bc1d465fbf21e8097b8 Author: Joe Rafaniello <jrafanie> AuthorDate: Fri Apr 10 21:41:08 2015 -0400 Commit: Joe Rafaniello <jrafanie> CommitDate: Fri Apr 10 21:44:42 2015 -0400 Drop INPUT/FORWARD packets not whitelisted in the firewall setup https://bugzilla.redhat.com/show_bug.cgi?id=1182654 **Before** (cf9f8924d685) We accepted all INPUT packets. We allowed icmp, loopback and whitelisted ports we use. Any other INPUT ports were logged and dropped. We accepted all FORWARD packets. **After this commit** We drop all INPUT packets by default excluding icmp, loopback, and whitelisted ports we use. We drop all FORWARD packets. OUTPUT packets have NOT been changed, we accept them. [skip ci] build/kickstarts/base.ks.erb | 8 ++++++++ 1 file changed, 8 insertions(+)
We moved to building the firewall rules in https://github.com/ManageIQ/manageiq/pull/2562 for https://bugzilla.redhat.com/show_bug.cgi?id=1173216. In https://github.com/ManageIQ/manageiq/pull/2592, we drop INPUT/FORWARD packets by default in kickstart setup of the firewall. See that PR for more information.
I'm renaming the bug because we can't easily change OUTPUT to drop by default without greatly decreasing usability. This bug will only change INPUT, FORWARD to drop by default.
This is confirmed in 5.4.0.4 INPUT and FORWARD are DROP by default.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2015-1100.html