Maik Fischer wrote:
> 
> hi steffen,
> 
> you are sure, that there are no cronjobs running? that is abnormal... see
> "crontab -e" or "ls -l /etc/cron.d/", "ls -l /etc/cron.daily/", "ls -l
> /etc/cron.weekly/" etc (if this at suse exist).
> 
> normally, at least logrotate is running per cron...
> 
> or do you mean, that no ipchains-cron is running?
> 
> cu,
> 
>    Maik
> 
> > -----Urspr�ngliche Nachricht-----
> > Von: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED]]Im Auftrag von Steffen
> > Schmalbach
> > Gesendet: Mittwoch, 4. Juli 2001 15:00
> > An: Bgs himself
> > Cc: [EMAIL PROTECTED]
> > Betreff: Re: Ipchains phenomenon
> >
> >
> >
> > Thank you for the hints but there are no cronjobs running on
> > the system
> > !
> > Any other ideas ... maybe a known bug in ipchains (Version
> > 1.3.9) or in
> > the Kernel (2.2.16) ??
> > By the way ... the system worked fine fror about a half year
> > and now the
> > error occurs without having changed anything !
> >
> >       Steffen Schmalbach
> >
> >
> > Bgs himself wrote:
> > >
> > >  Hi !
> > >
> > > I admit I don't know Suse well. Do you have anything in
> > crontab or alike
> > > that 'updates' you fw rules with ipchains-restore ? If you
> > don't flush the
> > > tables you'll have your configuration appended every time.
> > >
> > > Bye
> > > Bgs
> >

Hey Maik

I mean there are no cronjobs running except the ones runnning since
installation of the system.
I have not created any cronjobs ! 

Here i have got a short extract of my firewall script ... there are only
some additional services allowed

I think if the script would by started again and again it would not have
this result of many many rules because the rules are all flushed.


# Delete all rules
ipchains -F                             # Flushes ipchains settings
ipmasqadm portfw -f                     # Flushes ipmasqadm portfw settings

# Default policies
ipchains -P input DENY
ipchains -P output REJECT
ipchains -P forward REJECT


# Loopback Interface allow everything
ipchains -A input -i $LOOPBACK_ITF -j ACCEPT
ipchains -A output -i $LOOPBACK_ITF -j ACCEPT

# ALLOW everything from LOCAL_NETWORK to INTERNAL_IP
ipchains -A input -i $INTERNAL_ITF -s $LOCAL_NETWORK -j ACCEPT
ipchains -A output -i $INTERNAL_ITF -d $LOCAL_NETWORK -j ACCEPT

# MASQUERADE every TCP connection from LOCAL_NETWORK to INTERNET
ipchains -A forward -i $EXTERNAL_ITF -s $LOCAL_NETWORK -j MASQ
ipchains -A forward -i $EXTERNAL_ITF -d $LOCAL_NETWORK -j MASQ

# ALLOW SSH connection from outside
ipchains -A input -i $EXTERNAL_ITF -p tcp -s $ANYWHERE $UNPRIV_PORTS -d
$EXTERNAL_IP $SSH_PORT -j ACCEPT -l
ipchains -A output -i $EXTERNAL_ITF -p tcp -s $EXTERNAL_IP $SSH_PORT -d
$ANYWHERE $UNPRIV_PORTS -j ACCEPT -l
ipchains -A input -i $EXTERNAL_ITF -p udp -s $ANYWHERE $UNPRIV_PORTS -d
$EXTERNAL_IP $SSH_PORT -j ACCEPT -l
ipchains -A output -i $EXTERNAL_ITF -p udp -s $EXTERNAL_IP $SSH_PORT -d
$ANYWHERE $UNPRIV_PORTS -j ACCEPT -l

# ALLOW SSH connection to outside
ipchains -A output -i $EXTERNAL_ITF -p tcp -s $EXTERNAL_IP $UNPRIV_PORTS
-d $ANYWHERE $SSH_PORT -j ACCEPT
ipchains -A input -i $EXTERNAL_ITF -p tcp -s $ANYWHERE $SSH_PORT -d
$EXTERNAL_IP $UNPRIV_PORTS -j ACCEPT
ipchains -A output -i $EXTERNAL_ITF -p udp -s $EXTERNAL_IP $UNPRIV_PORTS
-d $ANYWHERE $SSH_PORT -j ACCEPT
ipchains -A input -i $EXTERNAL_ITF -p udp -s $ANYWHERE $SSH_PORT -d
$EXTERNAL_IP $UNPRIV_PORTS -j ACCEPT


this is an extraction of my firewallscript !
begin:vcard 
n:;
tel;work:0228-9114627
x-mozilla-html:FALSE
org:Much-Net DV GmbH
adr:;;Simrockstr. 21 - 23;Bonn;;53113;
version:2.1
email;internet:[EMAIL PROTECTED]
title:Administrator
x-mozilla-cpt:;25312
fn:Steffen Schmalbach
end:vcard

Reply via email to