
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
iptables-manager
Advanced tools
Easy to use CLI iptables manager. Built-in templates for easy management. Scripts persist on system reboot.
Manage iptables easier. Just simple bash scripts.
The best feature of iptables manager is the templates. Just type: sudo ipm tpl RULE_NAME input and it will ask you everything you need 99.9% of the time.
Or type ipm tpl --help to get a list of all templates.
A "rule" in iptables manager is basically a bash script that executes whatever you write in it. Of course, we should use it with the iptables command. Example:
# Allow all input
iptables -A INPUT -p tcp -m state --state NEW,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -p tcp -m state --state ESTABLISHED -j ACCEPT
A service called iptables-manager will be created on install and you should start it with:
sudo service iptables-manager start
sudo service iptables-manager restart
sudo service iptables-manager stop
On start/restart, iptables is reset with -F and then all rule scripts are executed.
On install, a basic rule will be added to allow all tcp traffic, otherwise you will be kicked out of the server, if you are using ssh, vnc or anything like that. After you setup your ssh rules, you must delete the all-default rule.
sudo ipm remove all-default
Another rule will be created by default on install: output-all. It allows all outgoing traffic. That's the default setting for most servers.
If you want to remove it:
sudo ipm remove output-all
ipm --help # If the ipm command is used, use iptables-manager
iptables-manager --help
Usage: ipm <cmd> <args ...>
Commands:
ipm add <rule> [file] Add a rule from a file or stdin.
ipm tpl <rule> <tpl> Add a rule from a template.
ipm edit <rule> Edit a rule script with nano.
ipm remove <rule> Remove a rule (requires reload).
ipm get <rule> Show a rule script.
ipm list List all rules.
ipm run [rule] Run a single rule or all rules.
ipm reload Reload all rules.
ipm install Run install script.
Options:
--version Show version number [boolean]
--help Show help [boolean]
ipm add can be used with pipe like cat file.sh | sudo ipm add RULE_NAME or sudo ipm add RULE_NAME < file.sh.ipm add should only be used if you really need custom things or you want to use ipm as an API for another app. In most cases just use ipm tpl.ipm tpl can add multiple rules with one command in one rule file.curl -sL https://deb.nodesource.com/setup_9.x | sudo -E bash -; sudo apt-get install -y nodejs
If you are installing as root:
npm install -g --unsafe-perm iptables-manager
For normal users:
npm install -g iptables-manager
The install script will install the required directory structure. If you don't see: All done. or
Configs already exist., you will need to run ipm install later. To check if install is ok, run:
cat /etc/iptables-manager/vars.env
And you should see something like:
POLICY_INPUT=DROP
POLICY_OUTPUT=DROP
POLICY_FORWARD=DROP
LOG_SPAM=1
FAQs
Easy to use CLI iptables manager. Built-in templates for easy management. Scripts persist on system reboot.
We found that iptables-manager demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.