linuxsecurityiptables

iptables LOG and DROP in one rule


I am trying to log outgoing connections with iptables. What I want is, drop and accept connection while logging them also. I have found that -j option takes DROP/REJECT/ACCEPT/LOG. But I want to do something like DROP and LOG or ACCEPT and LOG. Is there a way to achieve this ?


Solution

  • Example:

    iptables -A INPUT -j LOG --log-prefix "INPUT:DROP:" --log-level 6
    iptables -A INPUT -j DROP
    

    Log Exampe:

    Feb 19 14:18:06 servername kernel: INPUT:DROP:IN=eth1 OUT= MAC=aa:bb:cc:dd:ee:ff:11:22:33:44:55:66:77:88 SRC=x.x.x.x DST=x.x.x.x LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=x PROTO=TCP SPT=x DPT=x WINDOW=x RES=0x00 SYN URGP=0
    

    Other options:

       LOG
           Turn on kernel logging of matching packets.  When this option 
           is set for a rule, the Linux kernel will print some 
           information  on  all  matching  packets
           (like most IP header fields) via the kernel log (where it can 
           be read with dmesg or syslogd(8)).  This is a "non-terminating 
           target", i.e. rule traversal
           continues at the next rule.  So if you want to LOG the packets 
           you refuse, use two separate rules with the same matching 
           criteria, first using target LOG
           then DROP (or REJECT).
    
           --log-level level
                  Level of logging (numeric or see syslog.conf(5)).
    
           --log-prefix prefix
                  Prefix log messages with the specified prefix; up to 29 
                  letters long, and useful for distinguishing messages in 
                  the logs.
    
           --log-tcp-sequence
                  Log TCP sequence numbers. This is a security risk if the 
                  log is readable by users.
    
           --log-tcp-options
                  Log options from the TCP packet header.
    
           --log-ip-options
                  Log options from the IP packet header.
    
           --log-uid
                  Log the userid of the process which generated the packet.