How to install KISS Firewall

KISS My Firewall is a FREE iptables script designed for a typical web server. It takes advantage of the latest firewall technologies including stateful packet inspection and connection tracking. It also contains some preventative measures for port scanning, DoS attacks, and IP spoofing, among other things.

KISS My Firewall 2 is very easy to install and does not require any initial configuration. It will work with any stock installation of Ensim WEBppliance Basic & Pro, Plesk, and Webmin. Cpanel installations require some modifications. Available at: http://www.geocities.com/steve93138/

What’s New in Version 2?

The biggest change is that it does not require any initial configuration. With version 2, you won’t automatically lock yourself out of your server unless you set some of the variables incorrectly. It also does extensive error checking and is distributed as a tar file. This solves a lot of the issues that were present with the older version. In addition, version 2 is highly configurable and was tested to work with the latest version of iptables – version 1.2.8.

HOW TO: Install KISS My Firewall

1) When logged in as root ( “su -” ), type:

2) cd /usr/bin

3) Download KISS firewall
wget http://www.geocities.com/steve93138/kiss-2.0.1.tar.gz

4) Extract it
tar zxvf kiss-2.0.1.tar.gz

If you want to block an offenders IP address/subnet, simply edit the BLOCK_LIST variable in the /usr/bin/kiss file. You can separate IP addresses and subnet’s with a space. Once you are finished, restart the firewall.

5) Editing the config
pico -w /usr/bin/kiss

You must change config from: NOTE see our Printer friendly version to avoid text wrapping!

# Uncomment to allow DNS zone transfers
#
#$IPTABLES -A INPUT -i eth0 -p udp –sport 53 –dport 53 -m state –state NEW -j ACCEPT
#$IPTABLES -A INPUT -i eth0 -p tcp –sport 53 –dport 53 -m state –state NEW -j ACCEPT
#$IPTABLES -A OUTPUT -o eth0 -p udp –sport 53 –dport 53 -m state –state NEW -j ACCEPT
#$IPTABLES -A OUTPUT -o eth0 -p tcp –sport 53 –dport 53 -m state –state NEW -j ACCEPT

To:

# Uncomment to allow DNS zone transfers
#
$IPTABLES -A INPUT -i eth0 -p udp –sport 53 –dport 53 -m state –state NEW -j ACCEPT
$IPTABLES -A INPUT -i eth0 -p tcp –sport 53 –dport 53 -m state –state NEW -j ACCEPT
$IPTABLES -A OUTPUT -o eth0 -p udp –sport 53 –dport 53 -m state –state NEW -j ACCEPT
$IPTABLES -A OUTPUT -o eth0 -p tcp –sport 53 –dport 53 -m state –state NEW -j ACCEPT

6) Cpanel Users Config – other users ignore this step
In the /usr/bin/kiss file scroll down until you see the line: TCP_IN and replace it with this.

TCP_IN=”20 21 25 53 80 110 143 443 995 2082:2083 2086:2087 2095:2096 3306″

Now find the line that says TCP_OUT and replace it with this.

TCP_OUT=”21 22 25 37 43 53 80 443 873 2089″

7) Save the changes and restart the firewall
Ctrl + X then Y

Restart KISS by typing:
kiss restart

That’s it! You now have a nice IPtables firewall running that’s easy to configure and use.

Firewall Commands
That’s it! To get it running anywhere on the command line, you simply type:
kiss start

To stop the firewall, type:
kiss stop

To get status information, type:
kiss status

Restart KISS by typing:
kiss restart

Similar Articles : Compile 2.6.7, 2.6.8, 2.6.8.1, 2.6.9, 2.6.10, 2.6.11.6 Kernel w/module-init-toolsRkhunter Installation,Detect and Clean a hacked server T0rnkit TutorialHow to install KISS FirewallHow to Disable TelnetHow to install mod_security for ApacheHow to install BFD (Brute Force Detection)How to install APF (Advanced Policy Firewall)E-mail Alert on Root SSH LoginMask Your Web Server for Enhanced SecurityGuide to Chkrootkit – checking for intruders,Creating a Welcome message for SSH loginsDisable Direct Root LoginRootCheck – Root CheckChanging APF log for TDP/UDP drop’s