Bon, j'ai continué mon pârcours du débutant  .... et j'ai modifié les
fichiers de conf. ci-joints, ce qui a donné ceci : 


shorewall restart 
Processing /etc/shorewall/shorewall.conf ... 
Processing /etc/shorewall/params ... 
Restarting Shorewall... 
Loading Modules... 
Initializing... 
Determining Zones... 
   Zones: net loc dmz 
Validating interfaces file... 
Validating hosts file... 
Determining Hosts in Zones... 
   Net Zone: ppp0:0.0.0.0/0 
   Local Zone: ppp0:0.0.0.0/0 
   DMZ Zone: ppp0:0.0.0.0/0 
Deleting user chains... 
Configuring Proxy ARP and NAT 
Adding Common Rules 
IP Forwarding Enabled 
Processing /etc/shorewall/tunnels... 
Processing /etc/shorewall/rules... 
   Rule "ACCEPT loc fw tcp ssh" added. 
   Rule "ACCEPT net fw tcp ssh,auth" added. 
   Rule "ACCEPT fw net udp ntp" added. 
Adding rules for DHCP 
Setting up ICMP Echo handling... 
Processing /etc/shorewall/policy... 
   Policy REJECT for fw to net. 
   Policy ACCEPT for net to fw. 
   Policy REJECT for loc to fw. 
   Policy ACCEPT for loc to net. 
   Policy REJECT for dmz to fw. 
Masqueraded Subnets and Hosts: 
Processing /etc/shorewall/tos... 
   Rule "all all tcp - ssh 16" added. 
   Rule "all all tcp ssh - 16" added. 
   Rule "all all tcp - ftp 16" added. 
   Rule "all all tcp ftp - 16" added. 
   Rule "all all tcp ftp-data - 8" added. 
   Rule "all all tcp - ftp-data 8" added. 
Activating Rules... 
Shorewall Restarted 
touch: creating `/var/lock/subsys/shorewall': No such file or directory 

ça veut dire quoi ce touch ???


Je peux me connecter, j'ai été faire un quick test sur www.pcflank.com ,
pas de problème avec les troyens, mais il me signale que le port 135 est
ouvert , pas bon donc, comment fermer les portes de manière efficace ??
Et aussi un probléme de browser privacy ...
Je suppose que la config laisse encore à désirer, je joins mes fichiers
de config actuels. Merci pour vos conseils.


                          Merci


#
# Shorewall 1.2 -- Interfaces File
#
# /etc/shorewall/interfaces
#
#       You must add an entry in this file for each network interface on your
#       firewall system.
#
# Columns are:
#
#       ZONE            Zone for this interface. Must match the short name
#                       of a zone defined in /etc/shorewall/zones.
#
#                       If the interface serves multiple zones that will be
#                       defined in the /etc/shorewall/hosts file, you may
#                       place "-" in this column.
#       
#       INTERFACE       Name of interface
#
#       BROADCAST       The broadcast address for the subnetwork to which the
#                       interface belongs. For P-T-P interfaces, this
#                       column is left black.
#                                           
#                       If you use the special value "detect", the firewall
#                       will detect the broadcast address for you. If you
#                       select this option, the interface must be up before
#                       the firewall is started and you must have iproute
#                       installed.
#                       
#                       If you don't want to give a value for this column but
#                       you want to enter a value in the OPTIONS column, enter
#                       "-" in this column.
#
#       OPTIONS         A comma-separated list of options including the
#                       following:
#
#                       dhcp         - interface is managed by DHCP or used by
#                                      a DHCP server running on the firewall.
#                       noping       - icmp echo-request (ping) packets should
#                                      be ignored on this interface
#                       routestopped - When the firewall is stopped, allow
#                                      and route traffic to and from this
#                                      interface.
#                       norfc1918    - This interface should not receive
#                                      any packets whose source is in one
#                                      of the ranges reserved by RFC 1918
#                                      (i.e., private or "non-routable"
#                                      addresses. If packet mangling is
#                                      enabled in shorewall.conf, packets
#                                      whose destination addresses are
#                                      reserved by RFC 1918 are also rejected.
#                       multi        - This interface has multiple IP
#                                      addresses and you want to be able to
#                                      route between them.
#                       routefilter  - turn on kernel route filtering for this
#                                      interface.
#                       dropunclean  - Logs and drops mangled/invalid packets
#
#                       logunclean   - Logs mangled/invalid packets but does
#                                      not drop them.
#       .       .       blacklist    - Check packets arriving on this interface
#                                      against the /etc/shorewall/blacklist
#                                      file.
#
#       Example 1:      Suppose you have eth0 connected to a DSL modem and
#                       eth1 connected to your local network and that your
#                       local subnet is 192.168.1.0/24. The interface gets
#                       it's IP address via DHCP from subnet
#                       206.191.149.192/27 and you want pings from the internet
#                       to be ignored. You interface a DMZ with subnet
#                       192.168.2.0/24 using eth2. You want to be able to
#                       access the firewall from the local network when the
#                       firewall is stopped.
#
#                       Your entries for this setup would look like:
#
#                       net     eth0    206.191.149.223 noping,dhcp
#                       local   eth1    192.168.1.255   routestopped
#                       dmz     eth2    192.168.2.255
#
#       Example 2:      The same configuration without specifying broadcast
#                       addresses is:
#
#                       net     eth0    detect          noping,dhcp
#                       loc     eth1    detect          routestopped
#                       dmz     eth2    detect
#
#       Example 3:      You have a simple dial-in system with no ethernet
#                       connections and you want to ignore ping requests.
#
#                       net     ppp0    -               noping
##############################################################################
#ZONE    INTERFACE      BROADCAST       OPTIONS
net      ppp0            "-"            noping
loc      ppp0            "-"            noping
dmz      ppp0            "-"            noping
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
#
# Shorewall 1.2 -- Policy File
#
# /etc/shorewall/policy
#
#       This file determines what to do with a new connection request if we
#       don't get a match from the /etc/shorewall/rules file or from the
#       /etc/shorewall/common[.def] file. For each client/server pair, the
#       file is processed in order until a match is found ("all" will match
#       any client or server).
#
# Columns are:
#
#       CLIENT          Location of client. Must be the name of a zone defined
#                       in /etc/shorewall/zones, $FW or "all".
#
#       SERVER          Location of server. Must be the name of a zone defined
#                       in /etc/shorewall/zones, $FW or "all"
#
#       POLICY          Policy if no match from the rules file is found. Must
#                       be "ACCEPT", "DENY", "REJECT" or "CONTINUE"
#
#       LOG LEVEL       If supplied, each connection handled under the default
#                       POLICY is logged at that level. If not supplied, no
#                       log message is generated. See syslog.conf(5) for a
#                       description of log levels.
#
#                       If you don't want to log but need to specify the
#                       following column, place "_" here.
#
#       As shipped, the default policies are:
#
#       a) All connections from the local network to the internet are allowed
#       b) All connections from the network are ignored but logged at syslog
#          level KERNEL.INFO.
#       d) All other connection requests are rejected and logged at level
#          KERNEL.INFO.
###############################################################################
#CLIENT         SERVER          POLICY          LOG LEVEL
loc             net             ACCEPT
net             all             DROP            info
all             all             ACCEPT          info
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
#
# Shorewall version 1.2 - Rules File
#
# /etc/shorewall/rules 
#
#       Rules in this file govern connection establishment. Requests and
#       responses are automatically allowed using connection tracking.
#
#       In most places where an IP address or subnet is allowed, you
#       can preceed the address/subnet with "!" (e.g., !192.168.1.0/24) to
#       indicate that the rule matches all addresses except the address/subnet
#       given. Notice that no white space is permitted between "!" and the
#       address/subnet.
#
#       If any of the following columns contain the word "none" then the rule
#       is ignored:
#
#               PORT(S), CLIENT PORT(S), CLIENT(S) and SERVER.
#
# Columns are:
#
#
#       RESULT          ACCEPT, DROP or REJECT
#
#                               ACCEPT -- allow the connection request
#                               DROP   -- ignore the request
#                               REJECT -- disallow the request and return an
#                                         icmp-unreachable packet.
#
#                       May optionally be followed by ":" and a syslog log
#                       level (e.g, REJECT:info). This causes the packet to be
#                       logged at the specified level.
#
#       CLIENT(S)       Hosts permitted to be clients. May be a zone defined
#                       in /etc/shorewall/zones or $FW to indicate the
#                       firewall itself.
#
#                       Clients may be further restricted to a list of subnets
#                       and/or hosts by appending ":" and a comma-separated
#                       list of subnets and/or hosts. Hosts may be specified 
#                       by IP or MAC address; mac addresses must begin with
#                       "~" and must use "-" as a separator.
#
#                       dmz:192.168.2.2         Host 192.168.2.2 in the DMZ
#
#                       net:155.186.235.0/24    Subnet 155.186.235.0/24 on the
#                                               Internet
#
#                       loc:192.168.1.1,192.168.1.2
#                                               Hosts 192.168.1.1 and
#                                               192.168.1.2 in the local zone.
#                       loc:~00-A0-C9-15-39-78  Host in the local zone with 
#                                               MAC address 00:A0:C9:15:39:78.
#
#                       Alternatively, clients may be specified by interface
#                       by appending ":" followed by the interface name. For
#                       example, loc:eth1 specifies a client that
#                       communicates with the firewall system through eth1.
#
#       SERVER          Location of Server. May be a zone defined in
#                       /etc/shorewall/zones or $FW to indicate the firewall
#                       itself.
#
#                       The server may be further restricted to a particular
#                       subnet, host or interface by appending ":" and the
#                       subnet, host or interface. See above.
#
#                       The port that the server is listening on may be
#                       included and separated from the server's IP address by
#                       ":". If omitted, the firewall will not modifiy the
#                       destination port.
#
#                       Example: loc:192.168.1.3:8080 specifies a local
#                       server at IP address 192.168.1.3 and listening on port
#                       8080. The port number MUST be specified as an integer
#                       and not as a name from /etc/services.
#
#       PROTO           Protocol - Must be "tcp", "udp", "icmp", a number,
#                       "all" or "related". If "related", the remainder of the
#                       entry must be omitted and connection requests that are
#                       related to existing requests will be accepted.
#
#       PORT(S)         Destination Ports. A comma-separated list of Port
#                       names (from /etc/services), port numbers or port
#                       ranges; if the protocol is "icmp", this column is
#                       interpreted as the destination icmp-type(s).
#
#                       This column is ignored if PROTOCOL = all but must be
#                       entered if any of the following ields are supplied.
#                       In that case, it is suggested that this field contain
#                        "-"
#
#       CLIENT PORT(S)  (Optional) Port(s) used by the client. If omitted,
#                       any source port is acceptable. Specified as a comma-
#                       separated list of port names, port numbers or port
#                       ranges.
#
#                       If you don't want to restrict client ports but need to
#                       specify an ADDRESS in the next column, then place "-"
#                       in this column.
#
#       ADDRESS         (0ptional) If included and different from the IP
#                       address given in the SERVER column, this is an address
#                       on some interface on the firewall and connections to
#                       that address will be forwarded to the IP and port
#                       specified in the SERVER column.
#
#                       If the special value "all" is used, then requests from
#                       the client zone given in the CLIENT(s) column with the
#                       destination port given in PORT(s) will be forwarded to
#                       the IP address given in SERVER. The value "all" is
#                       intended to be used when your internet IP address is
#                       dynamic and you want to do port forwarding or you want
#                       to do proxy redirection. IT SHOULD NOT BE USED IN ANY
#                       OTHER SITUATION.
#
#                       The address (or "all") may optionally be followed by
#                       a colon (":") an an IP address. This causes Shorewall
#                       to use the specified IP address as the source address
#                       in forwarded packets. See the Shorewall documentation
#                       for restrictions concerning this feature. If no source
#                       IP address is given, the original source address is not
#                       altered.
#
#       Example: Forward all ssh and http connection requests from the internet
#                to local system 192.168.1.3
#
#       #RESULT CLIENTS SERVER(S)         PROTO PORT(S)  CLIENT PORT(S) ADDRESS
#       ACCEPT  net     loc:192.168.1.3 tcp     ssh,http -              all
#
#       Example: Redirect all locally-originating www connection requests to
#                port 8080 on the firewall (Squid running on the firewall
#                system)except when the destination address is 192.168.2.2
#
#       #RESULT CLIENTS SERVER(S) PROTO PORTS(S) CLIENT PORT(S) ADDRESS
#       ACCEPT  loc     $FW::8080  tcp  www      -              !192.168.2.2
##############################################################################
#RESULT         CLIENT(S) SERVER(S)     PROTO   PORT(S) CLIENT PORT(S) ADDRESS
#
# Allow SSH from the local network
#
ACCEPT          loc       $FW           tcp     ssh
#
# Allow SSH and Auth from the internet
#
ACCEPT          net       $FW           tcp     ssh,auth
#
# Run an NTP daemon on the firewall that is synced with outside sources
#
ACCEPT          $FW       net           udp     ntp
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
#
# Shorewall 1.2 /etc/shorewall/zones
#
# This file determines your network zones. Columns are:
#
#       ZONE            Short name of the zone
#       DISPLAY         Display name of the zone
#       COMMENTS        Comments about the zone
#
#ZONE   DISPLAY         COMMENTS
net     Net             Internet 
loc     Loc.             Local Networks
dmz     DMZ             Demilitarized zone
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE

Reply via email to