Re: Iptables

2017-03-31 Thread Russell Coker
On Fri, 31 Mar 2017 09:44:01 PM R Calleja wrote: > can anybody help me. I have security issues and I have to reinstall > the system every year. > Set up a firewall with iptables as the attachment and now block > connections as you can see in the dmesg attachment. Debian-user is probably a better l

Re: iptables and nmap

2007-06-09 Thread Joan Hérisson
You got it Tibor !!! I applied the command Andreas gave to me and tomcat55 listens on 8180. However, it does not resolve my firewall problem. I will explore differents ways that have been proposed to me. Thank to all of you, I will inform you on the state of things, Joan L

Re: iptables and nmap

2007-06-08 Thread Repasi Tibor
Joan Hérisson wrote: Hello, Config: - Debian 2.4.18 - iptables with many rules Problems: - I have installed a tomcat 5.5 server. The server is unreachable (connection failed from locahost or another host on my local network). Hey Joan, how do You installed tomcat? Because, if installed fro

Re: iptables and nmap

2007-06-08 Thread Andreas Kreuzinger
Hi ! * Manuel García <[EMAIL PROTECTED]> [2007-06-07 10:01]: > On 6/7/07, Joan Hérisson <[EMAIL PROTECTED]> wrote: [...snip...] > > Results: > > - The server is still unreachable. > > - When I do nmap localhost, I have port 80 open but not 8080. > > - When I comment out the line for port 80 in fir

Re: iptables and nmap

2007-06-08 Thread Giacomo A. Catenazzi
Joan Hérisson wrote: Chain INPUT (policy DROP 17 packets, 1088 bytes) pkts bytes target prot opt in out source destination 164 ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 225 18816 bad_tcp_packets tcp --

Re: iptables and nmap

2007-06-07 Thread Lee Braiden
Hi Joan, On Thursday 07 June 2007 14:51:51 Joan Hérisson wrote: > Hello, > > Config: > - Debian 2.4.18 This is very old. For security and better features, you'd be best to upgrade to a more recent version of Debian, with a more recent kernel. > - iptables with

Re: iptables and nmap

2007-06-07 Thread Joan Hérisson
Ok, thank you for your answers. I will try to sum up mine. It is true that it is not me who wrote the firewall script and that I do not understand what all rules do. I tried different solutions that you proposed but none works, from localhost, local network or from the internet. The

Re: iptables and nmap

2007-06-07 Thread Gian Piero Carrubba
Il giorno Thu, 7 Jun 2007 15:51:51 +0200 "Joan Hérisson" <[EMAIL PROTECTED]> ha scritto: > So I added this rule : > "iptables -A tcp_packets -p TCP -i eth1 -s > 0/0 --dport 8080 -j allowed" > where eth1 is the way toward my local network >

Re: iptables and nmap

2007-06-07 Thread Németh Tamás
Can you send the output of 'iptables -t filter -L -n -v ' to this mailing list? 2007. június 7. 15.51 dátummal Joan Hérisson ezt írta: > Hello, > > Config: > - Debian 2.4.18 > - iptables with many rules > > Problems: > - I have installed a to

Re: iptables and nmap

2007-06-07 Thread Giacomo A. Catenazzi
Joan Hérisson wrote: Hello, Config: - Debian 2.4.18 - iptables with many rules Problems: - I have installed a tomcat 5.5 server. The server is unreachable (connection failed from locahost or another host on my local network). Tries: - I have to open port 8080. I have this rule in /etc/init.d

Re: iptables and nmap

2007-06-07 Thread Vladislav Kurz
On Thursday 07 June 2007 15:51, Joan Hérisson wrote: > Hello, > > Config: > - Debian 2.4.18 > - iptables with many rules > > Problems: > - I have installed a tomcat 5.5 server. The server is > unreachable > (connection failed from locahost or a

Re: iptables and nmap

2007-06-07 Thread Manuel García
On 6/7/07, Joan Hérisson <[EMAIL PROTECTED]> wrote: Hello, Config: - Debian 2.4.18 - iptables with many rules Problems: - I have installed a tomcat 5.5 server. The server is unreachable (connection failed from locahost or another host on my local network). Tries: - I have to open port

Re: iptables connlimit

2005-03-09 Thread Bjørn Mork
Adrian Minta <[EMAIL PROTECTED]> writes: > and a module ipt_limit.ko exist in the kernel directory ( 2.6.8-2-k7) ipt_limit != ipt_connlimit You are probably lacking kernel support for ipt_connlimit. It's not part of the Linux kernel yet, and I guess the connlimit patch isn't in Debian kernels ei

Re: iptables connlimit

2005-03-08 Thread Adrian Minta
On Tue, 08 Mar 2005 00:42:01 +0100 Bernd Eckenfels <[EMAIL PROTECTED]> wrote: > In article <[EMAIL PROTECTED]> you wrote: > >> >server# iptables -A INPUT -p tcp --dport 80 -m connlimit > >--connlimit-above > >3 -j REJECT --reject-with tcp-reset > > Have you tried: > > iptables -m connlimit -h

Re: iptables connlimit

2005-03-07 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: >> >server# iptables -A INPUT -p tcp --dport 80 -m connlimit --connlimit-above >> >3 -j REJECT --reject-with tcp-reset Have you tried: iptables -m connlimit -h does it show the connlimit options? BTW: my iptables manpage knows about -m connrate --con

Re: iptables connlimit

2005-03-07 Thread Adrian Minta
On Mon, 07 Mar 2005 09:29:19 +0100 Guillaume Tournat <[EMAIL PROTECTED]> wrote: > Adrian Minta a écrit : > > >Is iptables connlimit available in sarge ? > >I try to limit incoming connection to my webserver: > > > >server# iptables -A INPUT -p tcp --dport 80 -m connlimit --connlimit-above > >3 -j

Re: iptables connlimit

2005-03-07 Thread Guillaume Tournat
Adrian Minta a écrit : Is iptables connlimit available in sarge ? I try to limit incoming connection to my webserver: server# iptables -A INPUT -p tcp --dport 80 -m connlimit --connlimit-above 3 -j REJECT --reject-with tcp-reset the error: iptables: No chain/target/match by that name What I'm doing

Re: iptables requires packets counter

2005-01-13 Thread Andreas Kretschmer
am 13.01.2005, um 18:04:06 +0100 mailte RatÓn folgendes: > Hello. > > I´m new to packet-filtering. As you can imaging starting to use > iptables. Well once I´ve reached my first configuration I want to test > it by asking iptables if a certain type of traffic is going to be > ACCEPTED or not. To

Re: iptables requires packets counter

2005-01-13 Thread s. keeling
Incoming from RatÓn: > So it is not ment for iptables testing. How can I test my config then?? Here's how I do it: iptables -A INPUT -s ! 127.0.0.1/32 -m state --state NEW -j LOG iptables -A INPUT -s ! 127.0.0.1/32 -m state --state NEW -j DROP Then I just watch Xconsole. Modify those to LOG & D

Re: iptables requires packets counter

2005-01-13 Thread s. keeling
Incoming from RatÓn: > > I´m new to packet-filtering. As you can imaging starting to use > iptables. Well once I´ve reached my first configuration I want to test > it by asking iptables if a certain type of traffic is going to be > ACCEPTED or not. To do this I make use of the -c option as follows

Re: iptables problem

2004-10-19 Thread Geoff
Thiago Ribeiro wrote: Hello, I have any problems with DNAT iptables. I'm redirecting my external http port to remote host. I have 8 networks, beginning with 192.168.1-8. My remote machine and destination is 192.168.5.2 and all networks excluding 192.168.5.0/24 can navigate in this. When I'm runnin

Re: iptables problem

2004-10-19 Thread martin f krafft
also sprach Thiago Ribeiro <[EMAIL PROTECTED]> [2004.10.19.2203 +0200]: > -A PREROUTING -d 200.210.101.37 -p tcp -m tcp --dport 80 -j DNAT --to > 192.168.5.2:80 > > I'm using network 7's address and the redirecting is perfect. Only > network 5 can't to do this. If I read you correctly, this is be

Re: iptables - inside accessing outside ip and being bounced back inside

2003-11-30 Thread Geoff Crompton
You may find that the internal web server is sending its reply IP packets directly to the internal client, instead of via the firewall. This can occur if the internal client and the internal web server have the same subnet mask. The internal web server sends the packets straight back to the in

Re: iptables - inside accessing outside ip and being bounced back inside

2003-11-30 Thread Geoff Crompton
You may find that the internal web server is sending its reply IP packets directly to the internal client, instead of via the firewall. This can occur if the internal client and the internal web server have the same subnet mask. The internal web server sends the packets straight back to the in

Re: iptables - inside accessing outside ip and being bounced back inside

2003-11-29 Thread Roland Mas
Hanasaki JiJi, 2003-11-29 05:50:12 +0100 : > i have a firewwall with 2 nics .. its running iptables. the outside > nic forwards port 80 to an internal webserver on an internal ip. this > works great. if an internal host hits the external ip. traffic does > not go to the internal web server.

Re: iptables - inside accessing outside ip and being bounced back inside

2003-11-29 Thread Roland Mas
Hanasaki JiJi, 2003-11-29 05:50:12 +0100 : > i have a firewwall with 2 nics .. its running iptables. the outside > nic forwards port 80 to an internal webserver on an internal ip. this > works great. if an internal host hits the external ip. traffic does > not go to the internal web server.

Re: iptables and X (KDE)

2003-06-29 Thread Mark L. Kahnt
On Thu, 2003-06-26 at 14:37, Matteo Vescovi wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Hi all, > I already posted this message to the list but "murphy" decided it wasn't > written well enough (just to say it never arrived!). [***SNIP!!!***] I wouldn't fault murphy directly - a

Re: iptables and X (KDE)

2003-06-29 Thread Matteo Vescovi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 26 June 2003 20:37, Matteo Vescovi wrote: > Hi all, > I already posted this message to the list but "murphy" decided it wasn't > written well enough (just to say it never arrived!). Not my fault!!! See the date and time of the message. Sor

Re: iptables and X (KDE)

2003-06-29 Thread Mark L. Kahnt
On Thu, 2003-06-26 at 14:37, Matteo Vescovi wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Hi all, > I already posted this message to the list but "murphy" decided it wasn't > written well enough (just to say it never arrived!). [***SNIP!!!***] I wouldn't fault murphy directly - a

Re: iptables and X (KDE)

2003-06-29 Thread Matteo Vescovi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 26 June 2003 20:37, Matteo Vescovi wrote: > Hi all, > I already posted this message to the list but "murphy" decided it wasn't > written well enough (just to say it never arrived!). Not my fault!!! See the date and time of the message. Sor

Re: iptables and X (KDE)

2003-06-29 Thread Matteo Vescovi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 26 June 2003 23:15, Matt Zimmerman wrote: > Use the LOG target to see which packets are being rejected. Done. Thanks. Phillip gave me right hints. Now everything works fine. Thanks everyone. See you. Matteo - -- Matteo Vescovi Email: mb

Re: iptables and X (KDE)

2003-06-29 Thread Jan Eringa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Try ... iptables -A OUTPUT -o lo -j ACCEPT iptables -A INPUT -i lo -j ACCEPT KDE needs to be able to talk to it's sub systems via the localhost interface. On Thursday 26 Jun 2003 11:34 am, Matteo Vescovi wrote: : Hi all, : I'm a newbie on firewalli

Re: iptables and X (KDE)

2003-06-29 Thread Jan Eringa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ran into this one a few weeks ago KDE & some of it's component subsystems seem to use connections via the localhost interface I used the following to allow all and any traffic on lo: /sbin/iptables -A OUTPUT -o lo -j ACCEPT /sbin/iptables -A INPUT -

Re: iptables and X (KDE)

2003-06-29 Thread Matteo Vescovi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 26 June 2003 23:15, Matt Zimmerman wrote: > Use the LOG target to see which packets are being rejected. Done. Thanks. Phillip gave me right hints. Now everything works fine. Thanks everyone. See you. Matteo - -- Matteo Vescovi Email: mb

Re: iptables and X (KDE)

2003-06-28 Thread Jan Eringa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Try ... iptables -A OUTPUT -o lo -j ACCEPT iptables -A INPUT -i lo -j ACCEPT KDE needs to be able to talk to it's sub systems via the localhost interface. On Thursday 26 Jun 2003 11:34 am, Matteo Vescovi wrote: : Hi all, : I'm a newbie on firewalli

Re: iptables and X (KDE)

2003-06-28 Thread Jan Eringa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ran into this one a few weeks ago KDE & some of it's component subsystems seem to use connections via the localhost interface I used the following to allow all and any traffic on lo: /sbin/iptables -A OUTPUT -o lo -j ACCEPT /sbin/iptables -A INPUT -

Re: iptables and X (KDE)

2003-06-27 Thread Matt Zimmerman
On Thu, Jun 26, 2003 at 12:34:29PM +0200, Matteo Vescovi wrote: > I'm really needing help and suggestions about this little problem. Use the LOG target to see which packets are being rejected. -- - mdz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble?

Re: iptables and X (KDE)

2003-06-26 Thread Phillip Hofmeister
pgp0.pgp Description: PGP message

Re: iptables and X (KDE)

2003-06-26 Thread Matt Zimmerman
On Thu, Jun 26, 2003 at 12:34:29PM +0200, Matteo Vescovi wrote: > I'm really needing help and suggestions about this little problem. Use the LOG target to see which packets are being rejected. -- - mdz

Re: iptables and X (KDE)

2003-06-26 Thread Phillip Hofmeister
pgp1e103FExbX.pgp Description: PGP message

Re: iptables rule to drop from sources that are -nat postrouting from the outside to inside

2003-05-31 Thread Kristof Goossens
On Fri, May 30, 2003 at 09:20:19AM +0200, Filippi Marco wrote: [snip] > > > how can they be dropped? > > > > not sure, but I think that it'll work when you specify the outside > > interface... For example: if you want to drop the http requests from > > w.x.y.z then your rule should look like: > >

Re: iptables rule to drop from sources that are -nat postrouting from the outside to inside

2003-05-31 Thread Kristof Goossens
On Fri, May 30, 2003 at 09:20:19AM +0200, Filippi Marco wrote: [snip] > > > how can they be dropped? > > > > not sure, but I think that it'll work when you specify the outside > > interface... For example: if you want to drop the http requests from > > w.x.y.z then your rule should look like: > >

Re: iptables rule to drop from sources that are -nat postroutingfrom the outside to inside

2003-05-30 Thread Filippi Marco
On Fri, 30 May 2003, Kristof Goossens wrote: > On Thu, May 29, 2003 at 11:19:24PM -0500, Hanasaki JiJi wrote: > > I have a nat postrouting rule that passes traffice from the outside > > world to an internal host to handle port 80 (webserver) > > > > there are also rules to drop certain source addr

Re: iptables rules

2003-05-30 Thread David Hardne
Hanasaki JiJi wrote on May 29, 2003 at 11:19:24 PM: > I have a nat postrouting rule that passes traffice from the outside > world to an internal host to handle port 80 (webserver) > > there are also rules to drop certain source addresses yet these > addresses are still coming through > > how c

Re: iptables rule to drop from sources that are -nat postrouting from the outside to inside

2003-05-30 Thread Kristof Goossens
On Thu, May 29, 2003 at 11:19:24PM -0500, Hanasaki JiJi wrote: > I have a nat postrouting rule that passes traffice from the outside > world to an internal host to handle port 80 (webserver) > > there are also rules to drop certain source addresses yet these > addresses are still coming through

Re: iptables rule to drop from sources that are -nat postrouting from the outside to inside

2003-05-30 Thread Filippi Marco
On Fri, 30 May 2003, Kristof Goossens wrote: > On Thu, May 29, 2003 at 11:19:24PM -0500, Hanasaki JiJi wrote: > > I have a nat postrouting rule that passes traffice from the outside > > world to an internal host to handle port 80 (webserver) > > > > there are also rules to drop certain source addr

Re: iptables rules

2003-05-30 Thread David Hardne
Hanasaki JiJi wrote on May 29, 2003 at 11:19:24 PM: > I have a nat postrouting rule that passes traffice from the outside > world to an internal host to handle port 80 (webserver) > > there are also rules to drop certain source addresses yet these > addresses are still coming through > > how c

Re: iptables rule to drop from sources that are -nat postrouting from the outside to inside

2003-05-30 Thread Kristof Goossens
On Thu, May 29, 2003 at 11:19:24PM -0500, Hanasaki JiJi wrote: > I have a nat postrouting rule that passes traffice from the outside > world to an internal host to handle port 80 (webserver) > > there are also rules to drop certain source addresses yet these > addresses are still coming through

Re: iptables question

2003-05-28 Thread Jayson Vantuyl
On Tue, May 27, 2003 at 06:23:10PM -0500, Andr?s Rold?n wrote: > Hi. > > I was reading about certain kind of attacks about TCP sequence and I was > wondering whether iptables is vulnerable to theses attacks. Especifically, > whether iptables is capable to know if a RELATED or ESTABLISHED package i

Re: iptables question

2003-05-27 Thread Jayson Vantuyl
On Tue, May 27, 2003 at 06:23:10PM -0500, Andr?s Rold?n wrote: > Hi. > > I was reading about certain kind of attacks about TCP sequence and I was > wondering whether iptables is vulnerable to theses attacks. Especifically, > whether iptables is capable to know if a RELATED or ESTABLISHED package i

Re: iptables with no module support?

2003-04-23 Thread Keegan Quinn
Sorry for the duplicate. I seem to be about 3 hours behind on email delivery. - Keegan

Re: iptables with no module support?

2003-04-23 Thread Alain Tesio
On Wed, 23 Apr 2003 15:17:03 +0100 David Ramsden <[EMAIL PROTECTED]> wrote: > > > I'm building a 'secure' server. > I downloaded the 2.4.20 kernel source from kernel.org and patched with > grsecurity (latest patch). > I also disabled loadable modules or any module support in the kernel for > add

Re: iptables with no module support?

2003-04-23 Thread Keegan Quinn
On Wednesday 23 April 2003 07:17 am, David Ramsden wrote: > I'm building a 'secure' server. > I downloaded the 2.4.20 kernel source from kernel.org and patched with > grsecurity (latest patch). > I also disabled loadable modules or any module support in the kernel for > added security - So everythi

Re: iptables with no module support?

2003-04-23 Thread David Ramsden
On Wed, Apr 23, 2003 at 12:22:40PM -0400, Stephen Walker wrote: > David, > > You do not need modules to run netfilter, just compile the required > modules into the kernel. I have a 2.4.20 server that is iptables > enabled without loadable modules so I know it works. > Thanks for that Steve. Wo

Re: iptables with no module support?

2003-04-23 Thread Dale Amon
On Wed, Apr 23, 2003 at 03:17:03PM +0100, David Ramsden wrote: > However, iptables won't work, saying it can't initialise iptables table > 'filter' and saying "do you need to insmod?". > So does iptables require module support? I don't want to use modules > though! :-) > Surely the Netfilter people

Re: iptables with no module support?

2003-04-23 Thread David Kyle Sayre
The trick is in the kernel build. When you do a make menuconfig (or your favorite config), you neet to go under network options, and enable network packet filtering, socket filtering, and and any options you want under Netfilter Configuration (iptables support for example). Then save and rebuil

Re: iptables rule to block when DNAT is used

2003-04-08 Thread Phillip Hofmeister
On Tue, 08 Apr 2003 at 03:17:18PM -0700, Kevin Buhr wrote: > > Also note that the mangle PREROUTING chain is run on all incoming > packets before any other chain, so: > > iptables -t mangle -I PREROUTING -s badbox.evil -j DROP > > should drop all packets from "badbox.evil" before any oth

Re: iptables rule to block when DNAT is used

2003-04-08 Thread Kevin Buhr
Hanasaki JiJi <[EMAIL PROTECTED]> writes: > > Firewall has rules to DNAT incoming traffic to a port on a DMZ box. > > how can an iptable rule be written to block some ip addresses before > they get to the rules > iptables -t mangle -A FORWARD > AND > iptables -t nat -A PR

Re: iptables rule to block when DNAT is used

2003-04-08 Thread Victor Calzado Mayo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi On Tuesday 08 April 2003 03:04, Hanasaki JiJi wrote: > Firewall has rules to DNAT incoming traffic to a port on a DMZ box. > > how can an iptable rule be written to block some ip addresses before > they get to the rules > iptables -t mangle -A

Re: iptables forwarding to inside firewall

2003-03-31 Thread Thomas Zimmerman
On Mon, 31 Mar 2003 10:24:15 +1000 Paul Hampson <[EMAIL PROTECTED]> wrote: > On Sun, Mar 30, 2003 at 05:23:10PM -0500, Robert Brockway wrote: > > On Fri, 28 Mar 2003, Hanasaki JiJi wrote: [snip] > > If you have more than 1 static address, an MTA running in a DMZ is > > definately better. This way

Re: iptables forwarding to inside firewall

2003-03-31 Thread Dale Amon
On Sun, Mar 30, 2003 at 05:23:10PM -0500, Robert Brockway wrote: > [1] If you use the "3 legged firewall" setup, it is possible to > distinguish DMZ traffic from other traffic based on which interface it is > entering the firewall. Just have two different NIC's to two different non-routable LAN's;

Re: iptables forwarding to inside firewall

2003-03-31 Thread Thomas Zimmerman
On Mon, 31 Mar 2003 10:24:15 +1000 Paul Hampson <[EMAIL PROTECTED]> wrote: > On Sun, Mar 30, 2003 at 05:23:10PM -0500, Robert Brockway wrote: > > On Fri, 28 Mar 2003, Hanasaki JiJi wrote: [snip] > > If you have more than 1 static address, an MTA running in a DMZ is > > definately better. This way

Re: iptables forwarding to inside firewall

2003-03-31 Thread Dale Amon
On Sun, Mar 30, 2003 at 05:23:10PM -0500, Robert Brockway wrote: > [1] If you use the "3 legged firewall" setup, it is possible to > distinguish DMZ traffic from other traffic based on which interface it is > entering the firewall. Just have two different NIC's to two different non-routable LAN's;

Re: iptables forwarding to inside firewall

2003-03-31 Thread Victor Calzado Mayo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi On Monday 31 March 2003 02:24, Paul Hampson wrote: > On Sun, Mar 30, 2003 at 05:23:10PM -0500, Robert Brockway wrote: > > On Fri, 28 Mar 2003, Hanasaki JiJi wrote: > > > Working on running a SMTP server inside the firewall that takes > > > incoming

Re: iptables forwarding to inside firewall

2003-03-31 Thread Victor Calzado Mayo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi On Monday 31 March 2003 02:24, Paul Hampson wrote: > On Sun, Mar 30, 2003 at 05:23:10PM -0500, Robert Brockway wrote: > > On Fri, 28 Mar 2003, Hanasaki JiJi wrote: > > > Working on running a SMTP server inside the firewall that takes > > > incoming

Re: iptables forwarding to inside firewall

2003-03-30 Thread Paul Hampson
On Sun, Mar 30, 2003 at 05:23:10PM -0500, Robert Brockway wrote: > On Fri, 28 Mar 2003, Hanasaki JiJi wrote: > > > Working on running a SMTP server inside the firewall that takes incoming > > SMTP traffic from outside the firewall. The below rules are not > > working. The firewall refuses connec

Re: iptables forwarding to inside firewall

2003-03-30 Thread Paul Hampson
On Sun, Mar 30, 2003 at 05:23:10PM -0500, Robert Brockway wrote: > On Fri, 28 Mar 2003, Hanasaki JiJi wrote: > > > Working on running a SMTP server inside the firewall that takes incoming > > SMTP traffic from outside the firewall. The below rules are not > > working. The firewall refuses connec

Re: iptables forwarding to inside firewall

2003-03-30 Thread Robert Brockway
On Fri, 28 Mar 2003, Hanasaki JiJi wrote: > Working on running a SMTP server inside the firewall that takes incoming > SMTP traffic from outside the firewall. The below rules are not > working. The firewall refuses connections. Any input on what wrong? There has been quite a bit of discussion

Re: iptables forwarding to inside firewall

2003-03-30 Thread Robert Brockway
On Fri, 28 Mar 2003, Hanasaki JiJi wrote: > Working on running a SMTP server inside the firewall that takes incoming > SMTP traffic from outside the firewall. The below rules are not > working. The firewall refuses connections. Any input on what wrong? There has been quite a bit of discussion

Re: iptables forwarding to inside firewall

2003-03-29 Thread Andrés Roldán
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I think you must chech your default policies. Besides, you should check the traffic from within your mail server with a tool such as snort or tcpdump and try logging your rules with the -j LOG match. Hanasaki JiJi <[EMAIL PROTECTED]> writes: > Worki

Re: iptables forwarding to inside firewall

2003-03-29 Thread Andrés Roldán
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I think you must chech your default policies. Besides, you should check the traffic from within your mail server with a tool such as snort or tcpdump and try logging your rules with the -j LOG match. Hanasaki JiJi <[EMAIL PROTECTED]> writes: > Worki

Re: iptables forwarding to inside firewall

2003-03-29 Thread Horst Pflugstaedt
> Working on running a SMTP server inside the firewall that takes incoming > SMTP traffic from outside the firewall. The below rules are not > working. The firewall refuses connections. Any input on what wrong? > > Thanks, > > internal mailserver = 192.168.1.2 > > > > #$PROG -t nat -A PRE

Re: iptables forwarding to inside firewall

2003-03-29 Thread Horst Pflugstaedt
> Working on running a SMTP server inside the firewall that takes incoming > SMTP traffic from outside the firewall. The below rules are not > working. The firewall refuses connections. Any input on what wrong? > > Thanks, > > internal mailserver = 192.168.1.2 > > > > #$PROG -t nat -A PRE

Re: iptables forwarding to inside firewall

2003-03-29 Thread Barak Korren
Hanasaki JiJi wrote: Working on running a SMTP server inside the firewall that takes incoming SMTP traffic from outside the firewall. The below rules are not working. The firewall refuses connections. Any input on what wrong? Thanks, internal mailserver = 192.168.1.2 #$PROG -t nat -A P

Re: iptables forwarding to inside firewall

2003-03-28 Thread Barak Korren
Hanasaki JiJi wrote: Working on running a SMTP server inside the firewall that takes incoming SMTP traffic from outside the firewall. The below rules are not working. The firewall refuses connections. Any input on what wrong? Thanks, internal mailserver = 192.168.1.2 #$PROG -t nat -A PRE

Re: iptables forwarding to inside firewall

2003-03-28 Thread Joost Beintema
Hi, iptables -t nat -A PREROUTING -p udp -d 130.161.65.18 --dport 2074 -j DNAT --to 192.168.6.2:2074 iptables -t nat -A PREROUTING -p udp -d 130.161.65.18 --dport 2075 -j DNAT --to 192.168.6.2:2075 works nicely to forward external speek freely traffic (uses 2 ports) to my computer inside my firew

Re: iptables forwarding to inside firewall

2003-03-28 Thread Joost Beintema
Hi, iptables -t nat -A PREROUTING -p udp -d 130.161.65.18 --dport 2074 -j DNAT --to 192.168.6.2:2074 iptables -t nat -A PREROUTING -p udp -d 130.161.65.18 --dport 2075 -j DNAT --to 192.168.6.2:2075 works nicely to forward external speek freely traffic (uses 2 ports) to my computer inside my firew

Re: iptables route

2003-03-23 Thread Mauricio Alejandro Araya Lopez
On Sat, 22 Mar 2003, Eduardo Rocha Costa wrote: > Thanks for the advice, shorewall is very good... only 4 hours and I make > the configuration !! Hi, if you want to improve your firewall and security, just see http://www.netfilter.org -- Mauricio Alejandro Araya Lopez* User #24939

Re: iptables route

2003-03-23 Thread Mauricio Alejandro Araya Lopez
On Sat, 22 Mar 2003, Eduardo Rocha Costa wrote: > Thanks for the advice, shorewall is very good... only 4 hours and I make > the configuration !! Hi, if you want to improve your firewall and security, just see http://www.netfilter.org -- Mauricio Alejandro Araya Lopez* User #24939

Re: iptables route

2003-03-22 Thread Eduardo Rocha Costa
---Haim Ashkenazi wrote: > On Sat, 22 Mar 2003 06:24:02 -0300 > Eduardo Rocha Costa <[EMAIL PROTECTED]> wrote: > > > Hi, first of all sorry my poor English I'll try my best. > > > > I have the following scheme in my lab: > > > > INTERNET --- firewall --- local network > > > > I have rea

Re: iptables route

2003-03-22 Thread Eduardo Rocha Costa
---Haim Ashkenazi wrote: > On Sat, 22 Mar 2003 06:24:02 -0300 > Eduardo Rocha Costa <[EMAIL PROTECTED]> wrote: > > > Hi, first of all sorry my poor English I'll try my best. > > > > I have the following scheme in my lab: > > > > INTERNET --- firewall --- local network > > > > I have rea

Re: iptables route

2003-03-22 Thread Haim Ashkenazi
On Sat, 22 Mar 2003 06:24:02 -0300 Eduardo Rocha Costa <[EMAIL PROTECTED]> wrote: > Hi, first of all sorry my poor English I'll try my best. > > I have the following scheme in my lab: > > INTERNET --- firewall --- local network > > I have real ip's for all computers in the lab, so I don't need

Re: iptables route

2003-03-22 Thread Haim Ashkenazi
On Sat, 22 Mar 2003 06:24:02 -0300 Eduardo Rocha Costa <[EMAIL PROTECTED]> wrote: > Hi, first of all sorry my poor English I'll try my best. > > I have the following scheme in my lab: > > INTERNET --- firewall --- local network > > I have real ip's for all computers in the lab, so I don't need

Re: iptables help to forward ports please

2003-03-20 Thread Vineet Kumar
* Hanasaki JiJi <[EMAIL PROTECTED]> [20030320 09:55 PST]: > Lars Ellenberg wrote: > >but to me it seems more appropriate to use a simple store and forward > >smtp deamon on the firewall. > what package can i research for a store/foward server? > > I thought the secure way was not to run anything

Re: iptables help to forward ports please

2003-03-20 Thread Vineet Kumar
* Hanasaki JiJi <[EMAIL PROTECTED]> [20030320 09:55 PST]: > Lars Ellenberg wrote: > >but to me it seems more appropriate to use a simple store and forward > >smtp deamon on the firewall. > what package can i research for a store/foward server? > > I thought the secure way was not to run anything

Re: iptables help to forward ports please

2003-03-20 Thread Hanasaki JiJi
what package can i research for a store/foward server? I thought the secure way was not to run anything like that on a firewall? That is why I am moving this group's exim off the firewall. Lars Ellenberg wrote: On Wed, Mar 19, 2003 at 11:26:10PM -0600, Hanasaki JiJi wrote: been trying to get

Re: iptables help to forward ports please

2003-03-20 Thread Hanasaki JiJi
what package can i research for a store/foward server? I thought the secure way was not to run anything like that on a firewall? That is why I am moving this group's exim off the firewall. Lars Ellenberg wrote: On Wed, Mar 19, 2003 at 11:26:10PM -0600, Hanasaki JiJi wrote: been trying to get the

Re: iptables help to forward ports please

2003-03-20 Thread Peter Parkkali
On Wed, 19 Mar 2003, Victor Calzado Mayo wrote: > > internet <=25= firewall iptablerule =port#x=> internalSMTPhost > > > > how can the firewall be told to: > > take all incoming tcp port 25 traffic and send it to > > smtp host on port X > iptables -t nat -A PREROUTING -p tcp --dport 25 -

Re: iptables help to forward ports please

2003-03-20 Thread Lars Ellenberg
On Wed, Mar 19, 2003 at 11:26:10PM -0600, Hanasaki JiJi wrote: > been trying to get the following to work for sometime input is most > appreciated > > > internet <=25= firewall iptablerule =port#x=> internalSMTPhost > > how can the firewall be told to: > take all incoming tcp port 25

Re: iptables help to forward ports please

2003-03-20 Thread Victor Calzado Mayo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 20 March 2003 06:26, Hanasaki JiJi wrote: > been trying to get the following to work for sometime input is most > appreciated > > > internet <=25= firewall iptablerule =port#x=> internalSMTPhost > > how can the firewall be told to: >

Re: iptables help to forward ports please

2003-03-20 Thread Peter Parkkali
On Wed, 19 Mar 2003, Victor Calzado Mayo wrote: > > internet <=25= firewall iptablerule =port#x=> internalSMTPhost > > > > how can the firewall be told to: > > take all incoming tcp port 25 traffic and send it to > > smtp host on port X > iptables -t nat -A PREROUTING -p tcp --dport 25 -

Re: iptables help to forward ports please

2003-03-20 Thread Lars Ellenberg
On Wed, Mar 19, 2003 at 11:26:10PM -0600, Hanasaki JiJi wrote: > been trying to get the following to work for sometime input is most > appreciated > > > internet <=25= firewall iptablerule =port#x=> internalSMTPhost > > how can the firewall be told to: > take all incoming tcp port 25

Re: iptables help to forward ports please

2003-03-20 Thread Victor Calzado Mayo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 20 March 2003 06:26, Hanasaki JiJi wrote: > been trying to get the following to work for sometime input is most > appreciated > > > internet <=25= firewall iptablerule =port#x=> internalSMTPhost > > how can the firewall be told to: >

Re: iptables and apt-get

2003-03-11 Thread Ian Goodall
No no. I have had been having the problem for quite a few days :( besides I also use the www.mirror.ac.uk service too! - Original Message - From: "Desai, Jason" <[EMAIL PROTECTED]> To: Sent: Tuesday, March 11, 2003 5:48 PM Subject: RE: iptables and apt-get > Hi

Re: iptables and apt-get

2003-03-11 Thread Ian Goodall
No no. I have had been having the problem for quite a few days :( besides I also use the www.mirror.ac.uk service too! - Original Message - From: "Desai, Jason" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, March 11, 2003 5:48 PM Subject: RE: iptables a

RE: iptables and apt-get

2003-03-11 Thread Desai, Jason
had any errors at all. Jason > -Original Message- > From: Victor Calzado Mayo [mailto:[EMAIL PROTECTED] > Sent: Tuesday, March 11, 2003 11:31 AM > To: debian-security@lists.debian.org > Subject: Re: iptables and apt-get > > > -BEGIN PGP SIGNED MESSAGE- &g

Re: iptables and apt-get

2003-03-11 Thread François TOURDE
Posted on announce on error... Here is my original post for security: [EMAIL PROTECTED] (François TOURDE) writes: > I.R.van Dongen <[EMAIL PROTECTED]> writes: > > > On Tue, 11 Mar 2003 14:48:20 - > > "Ian Goodall" <[EMAIL PROTECTED]> wrote: > > > > > All is fine now. Adding the line: > > >

RE: iptables and apt-get

2003-03-11 Thread Desai, Jason
had any errors at all. Jason > -Original Message- > From: Victor Calzado Mayo [mailto:[EMAIL PROTECTED] > Sent: Tuesday, March 11, 2003 11:31 AM > To: [EMAIL PROTECTED] > Subject: Re: iptables and apt-get > > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 &g

Re: iptables and apt-get

2003-03-11 Thread François TOURDE
Posted on announce on error... Here is my original post for security: [EMAIL PROTECTED] (François TOURDE) writes: > I.R.van Dongen <[EMAIL PROTECTED]> writes: > > > On Tue, 11 Mar 2003 14:48:20 - > > "Ian Goodall" <[EMAIL PROTECTED]> wrote: > > > > > All is fine now. Adding the line: > > >

Re: iptables and apt-get

2003-03-11 Thread Victor Calzado Mayo
CTED]> > To: "Ian Goodall" <[EMAIL PROTECTED]> > Cc: > Sent: Tuesday, March 11, 2003 12:59 PM > Subject: Re: iptables and apt-get > > > iptables -A OUTPUT -p tcp -d /32 --dport 80 -j ACCEPT > > > > On Tue, 11 Mar 2003 00:45:48 - > > > >

  1   2   3   4   >