On Sunday 21 December 2003 08:36 am, Tony wrote:
> OK, so what you're saying is the packet was logged up in the pre-routing
>   NAT section before it got dropped by the blacklisting filter at the
> Forward section?
>

Yes.

If you want to log these connections out of the FORWARD chain, replace your 
DNAT rule with:

DNAT-                   net     dmz:<internal ip>       ftp     21
ACCEPT:<log level>      net     dmz:<internal ip>       ftp     21

With Shorewall 1.4.5, the above two rules are identical to your current single 
DNAT rule with the exception that logging occurs out of the filter table.

With Shorewall 1.4.6 and later, if your kernel has the connection tracking 
match extension, the single DNAT rule is a little tighter than the two rules 
above in that the ACCEPT rule checks to ensure that the original destination 
of the connection was your external IP address. This extra check requires 
that you have DETECT_DNAT_IPADDRS=Yes in shorewall.conf. This additional 
check usually doesn't significantly enhance security though since you have 
RFC1918 filtering enabled on your external interface and the <internal ip> is 
most likely an RFC 1918 address. That guarantees that any connection from the 
net to the server had to have traversed the DNAT rule.

-Tom 
-- 
Tom Eastep    \ Nothing is foolproof to a sufficiently talented fool
Shoreline,     \ http://shorewall.net
Washington USA  \ [EMAIL PROTECTED]




-------------------------------------------------------
This SF.net email is sponsored by: IBM Linux Tutorials.
Become an expert in LINUX or just sharpen your skills.  Sign up for IBM's
Free Linux Tutorials.  Learn everything from the bash shell to sys admin.
Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to