Hi Zoki,

> concerning the script actually being so watertight it blocks ALL traffic
> to and from the server. So badly that even after deleting all the rules
> the access to the server stays blocked and the only solution is to reboot
> it!!

 Just flushing the rules is not enough to regain the original state. I think 
you forgot to set the default policies back to accept, eg:
 ipchains -P input ACCEPT
 ipchains -P forward ACCEPT
 ipchains -P output ACCEPT

> # loopback interface is valid.
> ipchains -A input -i lo -s 0.0.0.0/0 -d 0.0.0.0/0 -j ACCEPT

 I don't know if this makes a difference, but shouldn't one set the source 
(and destionation) address to 127.0.0.1/32?
 In the IPCHAINS-HOWTO v1.0.7, 12 March 1999 is says something about 
protecting the loopback device with a 2.0 kernel. In this case -s 127.0.0.0/8 
is used, but I don't know why this sourcemask is used. I have never heard of 
the use of other addresses than 127.0.0.1 in the 127.0.0.0/8 network. Or does 
it give broadcast on the loopback device? Maybe you could tell me?

> What I would like to have is your first impression when you see it.

 Well, I only had a quick look, but it seems allright to me. You start DENYing 
(or REJECTing as in the example) all traffic, and then you add rules to allow 
traffic you actually need. Personally I only see need for output rules to set 
packet priority (TOS), so I leave the output policy to ACCEPT. It seems 
redundant to set accept/deny policies/rules on the output chain. Maybe someone 
has ideas on this?

                                CU O,

                                Leonard.



-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to