mirror of
https://github.com/zulip/zulip.git
synced 2025-11-17 04:12:02 +00:00
This means that services will only open their ports if they are actually run, without having to clutter rules.v4 with a log of `if` statements. This does not go as far as using `puppetlabs/firewall`[1] because that would represent an additional DSL to learn; raw IPtables sections can easily be inserted into the generated iptables file via `concat::fragment` (either inline, or as a separate file), but config can be centralized next to the appropriate service. [1] https://forge.puppet.com/modules/puppetlabs/firewall
10 lines
368 B
Plaintext
10 lines
368 B
Plaintext
# Accept incoming traffic on UDP port 2104 (zhm)
|
|
-A INPUT -p udp --dport 2104 -j ACCEPT
|
|
|
|
# It's hard to know what ephemeral ports the zephyr clients are listening on.
|
|
# Apparently they do not send outgoing traffic sufficient for the
|
|
# ESTABLISHED,RELATED rule above. So for now we allow all UDP traffic.
|
|
#
|
|
# FIXME: do something better here.
|
|
-A INPUT -p udp -j ACCEPT
|