Salut,
J'essaie d'utiliser Nanny depuis peu.
Je confirme que les limitations horaires ne marchent pas pour moi non plus. Je me demande s'il n'y a pas une sorte d'interaction avec gufw ou ufw, car les iptables résultantes contiennent des trucs mis par Nanny et d'autres par gufw.
Si un connaisseur d'iptables passe par ici, voici un spécimen à analyser
$ sudo iptables --list
Chain INPUT (policy DROP)
target prot opt source destination
ufw-before-logging-input all -- anywhere anywhere
ufw-before-input all -- anywhere anywhere
ufw-after-input all -- anywhere anywhere
ufw-after-logging-input all -- anywhere anywhere
ufw-reject-input all -- anywhere anywhere
ufw-track-input all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
ufw-before-logging-forward all -- anywhere anywhere
ufw-before-forward all -- anywhere anywhere
ufw-after-forward all -- anywhere anywhere
ufw-after-logging-forward all -- anywhere anywhere
ufw-reject-forward all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ufw-before-logging-output all -- anywhere anywhere
ufw-before-output all -- anywhere anywhere
ufw-after-output all -- anywhere anywhere
ufw-after-logging-output all -- anywhere anywhere
ufw-reject-output all -- anywhere anywhere
ufw-track-output all -- anywhere anywhere
Nanny all -- anywhere anywhere
Chain Nanny (1 references)
target prot opt source destination
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 00:00:00 to 07:00:00 on Wed
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 21:00:00 to 23:59:00 on Wed
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 00:00:00 to 07:00:00 on Sun
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 21:00:00 to 23:59:00 on Sun
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 00:00:00 to 07:00:00 on Thu
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 21:00:00 to 23:59:00 on Thu
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 00:00:00 to 07:00:00 on Tue
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 21:00:00 to 23:59:00 on Tue
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 00:00:00 to 07:00:00 on Mon
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 21:00:00 to 23:59:00 on Mon
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 00:00:00 to 07:00:00 on Fri
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 21:00:00 to 23:59:00 on Fri
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 00:00:00 to 07:00:00 on Sat
DROP tcp -- anywhere anywhere multiport dports www,https,http-alt owner UID match claire state NEW,RELATED,ESTABLISHED TIME from 21:00:00 to 23:59:00 on Sat
Chain ufw-after-forward (1 references)
target prot opt source destination
Chain ufw-after-input (1 references)
target prot opt source destination
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-ns
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-dgm
ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:netbios-ssn
ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:microsoft-ds
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootps
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootpc
ufw-skip-to-policy-input all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST
Chain ufw-after-logging-forward (1 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix `[UFW BLOCK] '
Chain ufw-after-logging-input (1 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix `[UFW BLOCK] '
Chain ufw-after-logging-output (1 references)
target prot opt source destination
Chain ufw-after-output (1 references)
target prot opt source destination
Chain ufw-before-forward (1 references)
target prot opt source destination
ufw-user-forward all -- anywhere anywhere
Chain ufw-before-input (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ufw-logging-deny all -- anywhere anywhere state INVALID
DROP all -- anywhere anywhere state INVALID
ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
ACCEPT icmp -- anywhere anywhere icmp source-quench
ACCEPT icmp -- anywhere anywhere icmp time-exceeded
ACCEPT icmp -- anywhere anywhere icmp parameter-problem
ACCEPT icmp -- anywhere anywhere icmp echo-request
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
ufw-not-local all -- anywhere anywhere
ACCEPT all -- BASE-ADDRESS.MCAST.NET/4 anywhere
ACCEPT all -- anywhere BASE-ADDRESS.MCAST.NET/4
ufw-user-input all -- anywhere anywhere
Chain ufw-before-logging-forward (1 references)
target prot opt source destination
Chain ufw-before-logging-input (1 references)
target prot opt source destination
Chain ufw-before-logging-output (1 references)
target prot opt source destination
Chain ufw-before-output (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ufw-user-output all -- anywhere anywhere
Chain ufw-logging-allow (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix `[UFW ALLOW] '
Chain ufw-logging-deny (2 references)
target prot opt source destination
RETURN all -- anywhere anywhere state INVALID limit: avg 3/min burst 10
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix `[UFW BLOCK] '
Chain ufw-not-local (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL
RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST
RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST
ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10
DROP all -- anywhere anywhere
Chain ufw-reject-forward (1 references)
target prot opt source destination
Chain ufw-reject-input (1 references)
target prot opt source destination
Chain ufw-reject-output (1 references)
target prot opt source destination
Chain ufw-skip-to-policy-forward (0 references)
target prot opt source destination
DROP all -- anywhere anywhere
Chain ufw-skip-to-policy-input (7 references)
target prot opt source destination
DROP all -- anywhere anywhere
Chain ufw-skip-to-policy-output (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain ufw-track-input (1 references)
target prot opt source destination
Chain ufw-track-output (1 references)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere state NEW
ACCEPT udp -- anywhere anywhere state NEW
Chain ufw-user-forward (1 references)
target prot opt source destination
Chain ufw-user-input (1 references)
target prot opt source destination
ACCEPT all -- gb4-bas.local anywhere
ACCEPT all -- gb4-laptop anywhere
ACCEPT all -- 192.168.1.7 anywhere
ACCEPT tcp -- 192.168.1.30 anywhere
Chain ufw-user-limit (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix `[UFW LIMIT BLOCK] '
REJECT all -- anywhere anywhere reject-with icmp-port-unreachable
Chain ufw-user-limit-accept (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain ufw-user-logging-forward (0 references)
target prot opt source destination
Chain ufw-user-logging-input (0 references)
target prot opt source destination
Chain ufw-user-logging-output (0 references)
target prot opt source destination
Chain ufw-user-output (1 references)
target prot opt source destination
Problème de liste noire: Une fois installé la liste noire d'exemple, et activé le filtrage de sa catégorie porno, je me retrouve avec un truc qui bloque même
www.google.com ! C'est incroyable. Pourtant j'ai fouillé dans les blacklists UT1 avec un grep, pas la moindre trace de
www.google.com (d'autres dérivés de google existent bien, mais pas celui là).
Bref, soit le filtrage lui même soit le processus qui est censé partir des listes UT1 avoir produit le nanny.nbl est buggué.
J'ai signalé le bug:
https://bugzilla.gnome.org/show_bug.cgi?id=644321
Quelqu'un sait il comment consulter/éditer/bâtir le fichier nanny.nbl ?