From 56f079289e8f5236ec9dc08a5331d90835b3fd0c Mon Sep 17 00:00:00 2001 From: Michael Date: Mon, 22 Aug 2016 20:14:34 +0100 Subject: [PATCH] Changed iptables to not lookup hosts Should be faster lookup on iptables if firewall rules contain lots of host IP addresses (no need for a DNS lookup on each one!) --- openvpn-install.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/openvpn-install.sh b/openvpn-install.sh index 1e24c9a..279a1e7 100644 --- a/openvpn-install.sh +++ b/openvpn-install.sh @@ -138,7 +138,7 @@ if [[ -e /etc/openvpn/server.conf ]]; then firewall-cmd --permanent --zone=public --remove-port=$PORT/udp firewall-cmd --permanent --zone=trusted --remove-source=10.8.0.0/24 fi - if iptables -L | grep -qE 'REJECT|DROP'; then + if iptables -L -n | grep -qE 'REJECT|DROP'; then sed -i "/iptables -I INPUT -p udp --dport $PORT -j ACCEPT/d" $RCLOCAL sed -i "/iptables -I FORWARD -s 10.8.0.0\/24 -j ACCEPT/d" $RCLOCAL sed -i "/iptables -I FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT/d" $RCLOCAL @@ -310,7 +310,7 @@ crl-verify crl.pem" >> /etc/openvpn/server.conf firewall-cmd --permanent --zone=public --add-port=$PORT/udp firewall-cmd --permanent --zone=trusted --add-source=10.8.0.0/24 fi - if iptables -L | grep -qE 'REJECT|DROP'; then + if iptables -L -n | grep -qE 'REJECT|DROP'; then # If iptables has at least one REJECT rule, we asume this is needed. # Not the best approach but I can't think of other and this shouldn't # cause problems.