Hi, Ray:
Thanks.
Yup, I think the problem is the firewall rule set.
I copied the ntp.conf file to the two masqueraded
hosts and they appear to be working. 
 
 Yes, there were many many DENY's from w.x.y.z:123 !

dmesg|grep ":123"

 So, I'll make an internal LAN host the
default ntpd host and let the firewall and the
'other' linux box run ntp off of it.

 So, now I'm off to figure out how to make
an alias:
fileserver.home -> ntp.home

ipchains -nvL:

Chain input (policy ACCEPT: 95385 packets, 49586886 bytes):
 pkts bytes target prot opt    tosa tosx  ifname mark outsize source    
destination  ports
 1314 99946 DENY   udp  ----l- 0xFF 0x00  ppp+                0.0.0.0/0 
0.0.0.0/0    * ->   0:1023
   47  2364 DENY   tcp  ----l- 0xFF 0x00  ppp+                0.0.0.0/0 
0.0.0.0/0    * ->   0:1023
  414 21108 DENY   tcp  -y--l- 0xFF 0x00  ppp+                0.0.0.0/0 
0.0.0.0/0    * ->   *
    0     0 DENY   icmp ----l- 0xFF 0x00  ppp+                0.0.0.0/0 
0.0.0.0/0    8 ->   *
Chain forward (policy DENY: 0 packets, 0 bytes):
 pkts bytes target prot opt    tosa tosx  ifname mark outsize source    
destination  ports
36585 2940K MASQ   all  ------ 0xFF 0x00  *                   0.0.0.0/0 
0.0.0.0/0    n/a
Chain output (policy ACCEPT: 96415 packets, 48504643 bytes):

;-)

Many thanks.

Chuck

Ray Olszewski wrote:
> 
> At 04:28 PM 8/2/02 -0400, Chuck Gelm wrote:
> >Hi, Ray:
> >Thanks.
> >
> >Ooopps, I reported earlier that the kernel was 2.4.18.
> >
> >It is kernel 2.2.19 from Slackware8.0 on a very old Compaq
> >80486dx33, 32 Megabytes of RAM, 40 Gigabyte hd,
> >internet access is via aDSL modem, eth1 & eth2 are 3c509s.
> >pppoe is Roaring Penguin v3.5 with firewall option #2,
> >Masquerade.
> 
> I'm not sure when "earlier" was, but it seems like a good excuse to mention
> that I, and I think many of the others here who try to answer questions,
> see an awful lot of questions (in my case, on this and about a half dozen
> other lists). I don't do well at recalling from prior threads what a
> particular user's setup is. So, at least for me, it's useful to include
> this sort of summary of the basics whenever you ask a new question. (And on
> that score, this was a great summary -- concise and decently complete as
> regards the problem at hand.)
> 
> As to your actual problem ...
> [...]
> > >          3. your system is behind a firewall that interferes with access
> > > to the ntp port
> >
> >  The system is the 'firewall'.  Doh! Do I need to allow a port
> >  less than 1024?  I am running the default rule set of ipchains
> >  that RoaringPenguin sets, 'ipchains -L':
<snip>
> 
> It is better to list your rulesets with "ipchains -nvL", since that format
> includes information that the simple -L version omits (like interface
> designations). Due to the omissions, I can't say for sure if this ruleset
> is interfering with NTP connections or not.

ipchains -nvL:

Chain input (policy ACCEPT: 95385 packets, 49586886 bytes):
 pkts bytes target prot opt    tosa tosx  ifname mark outsize source    
destination  ports
 1314 99946 DENY   udp  ----l- 0xFF 0x00  ppp+                0.0.0.0/0 
0.0.0.0/0    * ->   0:1023
   47  2364 DENY   tcp  ----l- 0xFF 0x00  ppp+                0.0.0.0/0 
0.0.0.0/0    * ->   0:1023
  414 21108 DENY   tcp  -y--l- 0xFF 0x00  ppp+                0.0.0.0/0 
0.0.0.0/0    * ->   *
    0     0 DENY   icmp ----l- 0xFF 0x00  ppp+                0.0.0.0/0 
0.0.0.0/0    8 ->   *
Chain forward (policy DENY: 0 packets, 0 bytes):
 pkts bytes target prot opt    tosa tosx  ifname mark outsize source    
destination  ports
36585 2940K MASQ   all  ------ 0xFF 0x00  *                   0.0.0.0/0 
0.0.0.0/0    n/a
Chain output (policy ACCEPT: 96415 packets, 48504643 bytes):
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

Reply via email to