IPTables question

2003-08-14 Thread RedHat Mailing List
/etc/sysconfig/iptables has this rule
 
-A RH-Lokkit-0-50-INPUT -s 12.224.128.149/255.255.254.0 -j REJECT
 
Yet, 12.224.128.149 can still connect.  Any idea why?  Could it relate to the machine 
having more than one network card?  I'm using eth1.  Port eth0 is disabled.  Is 
iptables assuming eth0?
 
Thanks
 
-Ed
 
 


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list


Fwd: Iptables question.

2002-09-23 Thread Peter Robb

If you are applying new rules via a script, you need to 
first flush all existing chains, then delete the additional 
chains,
otherwise you will try to create a chain that already 
exists...
>From the turorial at 
http://www.netfilter.org/documentation/tutorials/blueflux/
 #
 # flush all the rules in the filter and nat tables.
 #
 $IPTABLES -F
 $IPTABLES -t nat -F
 $IPTABLES -t mangle -F
 #
 # erase all chains that's not default in filter and nat 
table.
 #
 $IPTABLES -X
 $IPTABLES -t nat -X
 $IPTABLES -t mangle -X

Regards,
Peter

--  Forwarded Message  --

Subject: Iptables question.
Date: Tue, 17 Sep 2002 15:01:42 +0200 (CEST)
From: linux power <[EMAIL PROTECTED]>
To: redhat mail list <[EMAIL PROTECTED]>

When I apply new rules to my iptables I get this.

Chain already excist.

And I cant apply any new rules although I can flush the
 rules, but linux doesent use them.

The chain message was not in the beginning when I installed
 iptables, but occured a couple of days ago.

Is there any hacker the had comes in through port 631 (the
 cups port) which is open, and have made it that way that

I cant change the chain rules?

Pr?v betaversjonen av den nye Yahoo! Mail
Nytt design, enklere ? bruke, alltid tilgang til
 Adressebok, Kalender og Notisbok

---



When I apply new rules to my iptables I get this.
Chain already excist.
And I cant apply any new rules although I can flush the rules, but linux doesent use them.
The chain message was not in the beginning when I installed iptables, but occured a couple of days ago.
Is there any hacker the had comes in through port 631 (the cups port) which is open, and have made it that way that
I cant change the chain rules?Prøv betaversjonen av den nye Yahoo! Mail 
Nytt design, enklere å bruke, alltid tilgang til Adressebok, Kalender og Notisbok

Iptables question.

2002-09-17 Thread linux power
When I apply new rules to my iptables I get this.
Chain already excist.
And I cant apply any new rules although I can flush the rules, but linux doesent use them.
The chain message was not in the beginning when I installed iptables, but occured a couple of days ago.
Is there any hacker the had comes in through port 631 (the cups port) which is open, and have made it that way that
I cant change the chain rules?Prøv betaversjonen av den nye Yahoo! Mail 
Nytt design, enklere å bruke, alltid tilgang til Adressebok, Kalender og Notisbok

IPTables question

2002-07-10 Thread Apolinaras Sinkevicius

What do I have to enter in via command line to ban all
the traffic on ethernet adapter eth0 coming or leaving
255.255.255.255 and 0.0.0.0. I am tired of bootp
traffic my server gets hit cause provider does not
force other users to check their configurations, so I
would like to ban all bootp traffic to my external
adapter and all 255.255.255.255 and 0.0.0.0 traffic.
Thank you in advance!

__
Do You Yahoo!?
Sign up for SBC Yahoo! Dial - First Month Free
http://sbc.yahoo.com



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: Iptables question

2002-07-03 Thread Mike Burger

You could try this:

iptables -A INPUT -s x.x.x.x -j DROP

On Wed, 3 Jul 2002, Apolinaras Sinkevicius wrote:

> How do I ban address X.X.X.X from connecting to
> 0.0.0.0 and 255.255.255.255
> What would be the command line I need to enter?
> 
> I am still adjusting to non-NT world, so I need a bit
> help.
> I keep on getting 2 systems constantly wasting my time
> with their attempts to connect ot 255.255.255.255 and
> 0.0.0.0 on my server, I tired closing those with
> Firestarter (good GUI for firewall, for non-pro), but
> it does not seem to work.
> 
> __
> Do You Yahoo!?
> Sign up for SBC Yahoo! Dial - First Month Free
> http://sbc.yahoo.com
> 
> 
> 
> ___
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
> 



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Iptables question

2002-07-03 Thread Apolinaras Sinkevicius

How do I ban address X.X.X.X from connecting to
0.0.0.0 and 255.255.255.255
What would be the command line I need to enter?

I am still adjusting to non-NT world, so I need a bit
help.
I keep on getting 2 systems constantly wasting my time
with their attempts to connect ot 255.255.255.255 and
0.0.0.0 on my server, I tired closing those with
Firestarter (good GUI for firewall, for non-pro), but
it does not seem to work.

__
Do You Yahoo!?
Sign up for SBC Yahoo! Dial - First Month Free
http://sbc.yahoo.com



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: Ipchains vs Iptables question

2002-03-21 Thread Bill Crawford

On Thu, 21 Mar 2002, Ashwin Khandare wrote:

> Do you know of any script that software ipchains commands to iptables ?

 I don't, but I've never looked for one.  Seriously though, it
shouldn't be too hard to do it by hand unless you have a truly
internecine set of rules.  Doing the first few steps "by hand"
and then editing the config file (with a backup!) lets you get
it right one step at a time, and it's easy to tweak.

 It also lets you set up boxes without needing a working install
of X windows libraries; and on a real firewall you probably want
an absolute minimum of installed software (makes Tripwrire run a
bit faster if there's not too much stuff to inspect :o)




___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: Ipchains vs Iptables question

2002-03-20 Thread Kerry Miller

Thanks for the help, guys. I'll check it out.  A friend recommended
Firestarter but I didn't know they had it for iptables.  I'll use that to
get me started, I'd rather edit the files by hand but it might be a good way
to get the initial file set up.  I'm building a second box on RH7.2 to
replace an old RH 6.0 box we're using so I won't have to take everybody down
to do it.

Tnx,
Kerry

- Original Message -
From: "Brian" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Tuesday, March 19, 2002 10:38 PM
Subject: RE: Ipchains vs Iptables question


> There are many GUI programs under freahmeat.net that can help you
configure
> iptables, check it out.
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Bill Crawford
> Sent: Tuesday, March 19, 2002 5:43 PM
> To: [EMAIL PROTECTED]
> Subject: Re: Ipchains vs Iptables question
>
>
> On Tue, 19 Mar 2002, Kerry Miller wrote:
>
> > We have 2 firewalls running on ipchains now.  I'm not too great with
> > ipchains yet and haven't even tried iptables, but since I already have
> > working firewalls w/ ipchains, is there a way to use my current scripts
> with
> > iptables?  How much different is the syntax, or is there a way to import
> the
> > ipchains scripts into iptables then save them?  Or, is there a util that
> > will convert them for me?
>
>  I'm not aware of any tools either, but I simply wrote an iptables
> version of what I wanted; the mechanics are not that dissimilar and
> the syntax isn't all that much different either.
>
>  A good way to start is probably to just create a couple of simple
> rules from scratch, then save the results (using "iptables-save") to
> a file and edit that.  Then "iptables-restore < file" will load the
> new rules and tell you if you have any errors (they're not terribly
> helpful error messages, but will tell you which line failed).
>
>  To get you started, your first two rules should be something like:
>
> # Generated by iptables-save v1.2.3 on Tue Feb 19 19:12:54 2002
> *filter
> :INPUT DROP [0:0]
> :FORWARD DROP [0:0]
> :OUTPUT ACCEPT [0:0]
> -A INPUT -i lo -j ACCEPT
> -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
> ...
> COMMIT
> # Completed on Tue Feb 19 19:12:54 2002
>
> because they will a) make sure any local connections on the machine,
> such as local mail delivery, won't break; and b) ensure your current
> SSH session doesn't disappear when you load the new ruleset.  I can't
> stress the latter enough; if you don't do this, with the best will in
> the world, you may eventually lock yourself out of the box.  I have
> done it, my colleagues have done it ...
>
>  You need to make sure you don't have any ipchains rules in place
> when you start, which means:
>
> On RH, do "service ipchains stop" followed by unloading the
> ipchains module(s), otherwise iptables won't load.
>
> On anything else, whatever it takes to remove all the current
> rules, followed by unloading ipchains from the kernel.
>
>  This will leave you unprotected, so at this point it's probably best
> to unplug the external network for a few minutes.  Don't do this while
> you need that interface up ... so any documentation you happen to find
> you will have to save locally before you start :o)
>
>  Load the kernel module (modprobe ip_tables).  This is actually taken
> care of by the iptables init script when you start the service up, but
> it won't hurt to load it explicitly now, and then you can experiment
> before you enable the service "properly" ...
>
>  Load the "iptable_filter" module too, since that's usually the first
> one you'll need.
>
>  Now
>
> # iptables -t filter -A INPUT -i lo -j ACCEPT
> # iptables -t filter -A INPUT -m state --state RELATED,ESTABLISHED -j
> ACCEPT
>
>  Before you make any other changes, it's a good idea to do something
> along the lines of
>
> # at 'now + 3 minutes'
> > /sbin/service iptables stop
> > ^D (literal control-D)
>
> so that if anything does go wrong, you'll be able to reconnect within
> a few minutes.  Just in case.
>
>  Each time you have a configuration that's tested and working, save
> the current settings with
>
> # iptables-save > /etc/sysconfig/iptables
>
> or more succinctly
>
> # service iptables save
>
> > Tnx,
> > Kerry
> >
> > Network Administrator
> > Info-Power International, Inc.
> > 3315 Silverstone
> > Plano, TX  75023
>
>
>
>
> ___
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



RE: Ipchains vs Iptables question

2002-03-19 Thread Brian

There are many GUI programs under freahmeat.net that can help you configure
iptables, check it out.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Bill Crawford
Sent: Tuesday, March 19, 2002 5:43 PM
To: [EMAIL PROTECTED]
Subject: Re: Ipchains vs Iptables question


On Tue, 19 Mar 2002, Kerry Miller wrote:

> We have 2 firewalls running on ipchains now.  I'm not too great with
> ipchains yet and haven't even tried iptables, but since I already have
> working firewalls w/ ipchains, is there a way to use my current scripts
with
> iptables?  How much different is the syntax, or is there a way to import
the
> ipchains scripts into iptables then save them?  Or, is there a util that
> will convert them for me?

 I'm not aware of any tools either, but I simply wrote an iptables
version of what I wanted; the mechanics are not that dissimilar and
the syntax isn't all that much different either.

 A good way to start is probably to just create a couple of simple
rules from scratch, then save the results (using "iptables-save") to
a file and edit that.  Then "iptables-restore < file" will load the
new rules and tell you if you have any errors (they're not terribly
helpful error messages, but will tell you which line failed).

 To get you started, your first two rules should be something like:

# Generated by iptables-save v1.2.3 on Tue Feb 19 19:12:54 2002
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
...
COMMIT
# Completed on Tue Feb 19 19:12:54 2002

because they will a) make sure any local connections on the machine,
such as local mail delivery, won't break; and b) ensure your current
SSH session doesn't disappear when you load the new ruleset.  I can't
stress the latter enough; if you don't do this, with the best will in
the world, you may eventually lock yourself out of the box.  I have
done it, my colleagues have done it ...

 You need to make sure you don't have any ipchains rules in place
when you start, which means:

On RH, do "service ipchains stop" followed by unloading the
ipchains module(s), otherwise iptables won't load.

On anything else, whatever it takes to remove all the current
rules, followed by unloading ipchains from the kernel.

 This will leave you unprotected, so at this point it's probably best
to unplug the external network for a few minutes.  Don't do this while
you need that interface up ... so any documentation you happen to find
you will have to save locally before you start :o)

 Load the kernel module (modprobe ip_tables).  This is actually taken
care of by the iptables init script when you start the service up, but
it won't hurt to load it explicitly now, and then you can experiment
before you enable the service "properly" ...

 Load the "iptable_filter" module too, since that's usually the first
one you'll need.

 Now

# iptables -t filter -A INPUT -i lo -j ACCEPT
# iptables -t filter -A INPUT -m state --state RELATED,ESTABLISHED -j
ACCEPT

 Before you make any other changes, it's a good idea to do something
along the lines of

# at 'now + 3 minutes'
> /sbin/service iptables stop
> ^D (literal control-D)

so that if anything does go wrong, you'll be able to reconnect within
a few minutes.  Just in case.

 Each time you have a configuration that's tested and working, save
the current settings with

# iptables-save > /etc/sysconfig/iptables

or more succinctly

# service iptables save

> Tnx,
> Kerry
>
> Network Administrator
> Info-Power International, Inc.
> 3315 Silverstone
> Plano, TX  75023




___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: Ipchains vs Iptables question

2002-03-19 Thread Bill Crawford

On Tue, 19 Mar 2002, Kerry Miller wrote:

> We have 2 firewalls running on ipchains now.  I'm not too great with
> ipchains yet and haven't even tried iptables, but since I already have
> working firewalls w/ ipchains, is there a way to use my current scripts with
> iptables?  How much different is the syntax, or is there a way to import the
> ipchains scripts into iptables then save them?  Or, is there a util that
> will convert them for me?

 I'm not aware of any tools either, but I simply wrote an iptables
version of what I wanted; the mechanics are not that dissimilar and
the syntax isn't all that much different either.

 A good way to start is probably to just create a couple of simple
rules from scratch, then save the results (using "iptables-save") to
a file and edit that.  Then "iptables-restore < file" will load the
new rules and tell you if you have any errors (they're not terribly
helpful error messages, but will tell you which line failed).

 To get you started, your first two rules should be something like:

# Generated by iptables-save v1.2.3 on Tue Feb 19 19:12:54 2002
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -i lo -j ACCEPT 
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
...
COMMIT
# Completed on Tue Feb 19 19:12:54 2002

because they will a) make sure any local connections on the machine,
such as local mail delivery, won't break; and b) ensure your current
SSH session doesn't disappear when you load the new ruleset.  I can't
stress the latter enough; if you don't do this, with the best will in
the world, you may eventually lock yourself out of the box.  I have
done it, my colleagues have done it ...

 You need to make sure you don't have any ipchains rules in place
when you start, which means:

On RH, do "service ipchains stop" followed by unloading the
ipchains module(s), otherwise iptables won't load.

On anything else, whatever it takes to remove all the current
rules, followed by unloading ipchains from the kernel.

 This will leave you unprotected, so at this point it's probably best
to unplug the external network for a few minutes.  Don't do this while
you need that interface up ... so any documentation you happen to find
you will have to save locally before you start :o)

 Load the kernel module (modprobe ip_tables).  This is actually taken
care of by the iptables init script when you start the service up, but
it won't hurt to load it explicitly now, and then you can experiment
before you enable the service "properly" ...

 Load the "iptable_filter" module too, since that's usually the first
one you'll need.

 Now

# iptables -t filter -A INPUT -i lo -j ACCEPT
# iptables -t filter -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

 Before you make any other changes, it's a good idea to do something
along the lines of

# at 'now + 3 minutes'
> /sbin/service iptables stop
> ^D (literal control-D)

so that if anything does go wrong, you'll be able to reconnect within
a few minutes.  Just in case.

 Each time you have a configuration that's tested and working, save
the current settings with

# iptables-save > /etc/sysconfig/iptables

or more succinctly

# service iptables save

> Tnx,
> Kerry
> 
> Network Administrator
> Info-Power International, Inc.
> 3315 Silverstone
> Plano, TX  75023




___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: Ipchains vs Iptables question

2002-03-19 Thread Keith Morse

On Tue, 19 Mar 2002, Kerry Miller wrote:

> We have 2 firewalls running on ipchains now.  I'm not too great with
> ipchains yet and haven't even tried iptables, but since I already have
> working firewalls w/ ipchains, is there a way to use my current scripts with
> iptables?  How much different is the syntax, or is there a way to import the
> ipchains scripts into iptables then save them?  Or, is there a util that
> will convert them for me?
> 
 AFAIK, there is no conversion tool other than your brain.  At best, your 
ipchains would server as a template for the things you are trying to 
manage.  Please consider investing in a book such as "Linux Firewalls" by 
Robert Zeigler.  He has an ipchains and an iptables edition.


There are numerous tools that help you generate a iptables firewall 
script.  www.freshmeat.net and use "firewall" as your search string.  The 
resulting number of hits astonishes me still.  My favourite is fwbuilder.  
I've heard of "firestarter" being bandied about by many people.






___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Ipchains vs Iptables question

2002-03-19 Thread Kerry Miller

We have 2 firewalls running on ipchains now.  I'm not too great with
ipchains yet and haven't even tried iptables, but since I already have
working firewalls w/ ipchains, is there a way to use my current scripts with
iptables?  How much different is the syntax, or is there a way to import the
ipchains scripts into iptables then save them?  Or, is there a util that
will convert them for me?

Tnx,
Kerry

Network Administrator
Info-Power International, Inc.
3315 Silverstone
Plano, TX  75023




___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Easy IPTABLES question

2002-01-29 Thread Brett Charbeneau

Yowza,

I'm trying to set up a conservative INNER firewall for our public
workstations. Rules that, via NAT, will allow them to get out to the
Internet to their heart's content, but won't allow them to do much but
telnet to our catalog and pull port 80 requests from our web server WITHIN
our network
I've initially set up the firewall with dhcpd and think I've got a
problem with the OUTPUT statement. When I issue the rules below I get:

dhcpd: send_packet: Operation not permitted

Any hints?

Brett Charbeneau, Network Administrator Tel: 757-259-7750
Williamsburg Regional Library   FAX: 757-259-7798
7770 Croaker Road   [EMAIL PROTECTED]
Williamsburg, VA 23188-7064 http://www.wrl.org


## Change source addresses to 209.96.157.155.
iptables -t nat -A POSTROUTING -o eth0 -j SNAT --to 209.96.157.155
## Allow DHCP traffic to pass through to the eth1 network
iptables -A INPUT  -s 192.168.5.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -i eth1 
-p udp --sport 67 --dport 68 -j ACCEPT
iptables -A OUTPUT -s 192.168.5.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -o eth1 
-p udp --sport 68 --dport 67 -j ACCEPT
iptables -A INPUT -s 192.168.5.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -i eth1 -j 
ACCEPT
iptables -A OUTPUT -s 192.168.5.0/255.255.255.0 -d 192.168.5.0/255.255.255.0 -o eth0 
-j ACCEPT
## Makes passive FTP possible, but creates security hole as of 5/23/01
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
## Allow new traffic to be accepted from eth1
iptables -A INPUT -m state --state NEW -i ! eth0 -j ACCEPT
# establish policies
iptables -P INPUT DROP
iptables -P FORWARD ACCEPT
iptables -P OUTPUT DROP
# log all dropped packets on eth1
iptables -A INPUT -p all -j LOG --log-level warning --log-prefix "IPT DROP: " -i eth1





___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



iptables question

2002-01-29 Thread Hernan Brun

Hi folks!!
I Have runing Redhat 7.1 server with iptables.
I want to only forward all packets, no filtering. What is the simple rule to
do this?
I want to try this, because some conference programs cant send files, cant
comunicate, etc.
There are another solution?

Thanks in advance..
Hernan Brun
- Original Message -
From: "Ziad Samaha" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, January 08, 2002 3:51 AM
Subject: Re: DNS, Architecture, General Question


>
> I think you should use LDAP if you have a large number of user and most of
> your operations are search and read operations. You can store your users
> info in this LDAP and use it for authentication (that can be specified in
> your protal).
>
> According to the free email accounts you want to offer try to integrate
> webmail as part of your protal users desktop, you can use the same
> authentication info to authenticate automatically to the mail server after
> logging to the portal desktop (Single Sign On): which means that you will
> have a part of your desktop containing your mailbox.
>
> Good Luck
>
> On Thu, 3 Jan 2002, Ben Ocean wrote:
>
> >Hi;
> >I'm going to be building a robust, complex Web portal that, among other
> >things, may offer free email accounts. These POP3 accounts would run
> >through qmail and authenticate through OpenLDAP (and Kerberos V behind
all
> >that). I currently don't host my own DNS, although if I offer the free
> >email accounts, I'm sure I will have to do that. I've installed all the
> >requisite tools on my server to develop this portal. I'm currently
> >schematizing the architecture and am vitally concerned about how POP3
email
> >accounts would be integrated. Would someone please offer a few sentences
of
> >advice on this topic and a resource or two to consult? Again, the
> >architecture will integrate qmail, OpenLDAP and DNS.
> >TIA,
> >BenO
>
>
>
>
> _
> Get your FREE download of MSN Explorer at
http://explorer.msn.com/intl.asp.
>
>
>
> ___
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: IPTables question

2001-11-17 Thread Andreas Hansson

> I'd recommend upgrading the rpm for iptables as this is one of the
> fixes. Current version is iptables-1.2.4-0 I believe.

Ah, up2date didn't update that automatically because of my manual fix. Now
I've forced it to apply the update. However, immediately after updating, i
tried "service iptables save" and "service iptables restart" and that
resulted in

Nov 17 18:52:04 linux iptables: Applying iptables firewall rules failed

It seems there's still a bug in it. After copying my fix back from
iptables.rpmsave it works again.

# diff iptables iptables.old
67c67
<   grep -v "^[[:space:]]*#" $IPTABLES_CONFIG | grep -v
'^[[:space:]
]*$' | sed "s/MASQUERADE \([0-9]\)/MASQUERADE --to-ports \1/" |
/sbin/iptables-r
estore -c && \
---
>   grep -v "^[[:space:]]*#" $IPTABLES_CONFIG | grep -v
'^[[:space:]
]*$' | /sbin/iptables-restore -c && \


Andreas



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: IPTables question

2001-11-17 Thread Jack Bowling

** Reply to message from Andreas Hansson <[EMAIL PROTECTED]> on Sat, 17 Nov 2001 
14:51:32 +0100


> It might be safer to just edit /etc/sysconfig/iptables yourself.  It's
> mostly just a list of iptables commands plus saved statistics for the
> chains. If you save it once you'll see what it's supposed to look like.

Highly recommended to update to iptables-1.2.4. All bugs you mentioned have been fixed 
in that version.

jb



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: IPTables question

2001-11-17 Thread Keith Morse

On Sat, 17 Nov 2001, Andreas Hansson wrote:

> Yes. The easiest way to do that is "service iptables save" which will
> execute iptables-save for you. There seems to be a few bugs, at least in the
> version I use (iptables-1.2.1a-1) so you might want to do "service iptables


I'd recommend upgrading the rpm for iptables as this is one of the
fixes. Current version is iptables-1.2.4-0 I believe.



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: IPTables question

2001-11-17 Thread Andreas Hansson

> > i use in seawolf
> > # iptables-save > /etc/sysconfig/iptables
> > # chmod go-r /etc/sysconfig/iptables
> >
> > but this only save iptables command
>
> Ok, I take it this means that if I were to issue a series of iptables
commands at the prompt, then I could flush those rules that were loaded to
the /etc/sysconfig/iptables file, correct?

Yes. The easiest way to do that is "service iptables save" which will
execute iptables-save for you. There seems to be a few bugs, at least in the
version I use (iptables-1.2.1a-1) so you might want to do "service iptables
restart" to verify that it succeeded saving changes. What I've found is that
when using MASQUERADE with a port it will save

[0:0] -A extpostroute -s 192.168.0.4 -p udp -m udp --sport 6112 -j
MASQUERADE 6118
instead of
[0:0] -A extpostroute -s 192.168.0.4 -p udp -m udp --sport 6112 -j
MASQUERADE --to-ports 6118

It also adds extra quotes to --log-prefix every time I load and save the
file.

It might be safer to just edit /etc/sysconfig/iptables yourself.  It's
mostly just a list of iptables commands plus saved statistics for the
chains. If you save it once you'll see what it's supposed to look like.

Andreas




___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: IPTables question

2001-11-16 Thread Lewi

On Fri, Nov 16, 2001 at 10:35:54PM -0800, Monte Milanuk wrote:
> On Sat, 17 Nov 2001 10:56:20 -0500
> Lewi <[EMAIL PROTECTED]> wrote:
> 
> 
> > read your /etc/init.d/iptables
> >
> 
> I did.  But some of us don't read shell scripting too well yet ;)  Hence I'm asking 
>for a minor translation.
> 
> > i use in seawolf
> > # iptables-save > /etc/sysconfig/iptables
> > # chmod go-r /etc/sysconfig/iptables
> > 
> > but this only save iptables command
> 
> Ok, I take it this means that if I were to issue a series of iptables commands at 
>the prompt, then I could flush those rules that were loaded to the 
>/etc/sysconfig/iptables file, correct?
yes
 
> Monte
> 
> _
> Do You Yahoo!?
> Get your free @yahoo.com address at http://mail.yahoo.com
> 
> 
> 
> ___
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list

-- 
ichtus
--
Lewi Supranata .K
ICQ: 50643061



msg64192/pgp0.pgp
Description: PGP signature


Re: IPTables question

2001-11-16 Thread Monte Milanuk

On Sat, 17 Nov 2001 10:56:20 -0500
Lewi <[EMAIL PROTECTED]> wrote:


> read your /etc/init.d/iptables
> 

I did.  But some of us don't read shell scripting too well yet ;)  Hence I'm asking 
for a minor translation.

> i use in seawolf
> # iptables-save > /etc/sysconfig/iptables
> # chmod go-r /etc/sysconfig/iptables
> 
> but this only save iptables command

Ok, I take it this means that if I were to issue a series of iptables commands at the 
prompt, then I could flush those rules that were loaded to the /etc/sysconfig/iptables 
file, correct?

Monte

_
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list



Re: IPTables question

2001-11-16 Thread Lewi

On Fri, Nov 16, 2001 at 07:39:12PM -0800, Monte Milanuk wrote:
> I inadvertently fragged my LAN server, so I am taking the opportunity to reinstall 
>KRUD 7.1 and set things up a bit tighter this time around.  Previously I used 
>ipchains via lokkit to config my firewall.  This time I'd like to use iptables.  I 
>have a book on Securing RH Linux 7.1, and have browsed multiple online guides to 
>IPtables, but I still am confused about a few things.
> 
> Almost every example appears to completely ignore the default installed RH 7.1 
>iptables script.  The book I have gives a completely different script in the same 
>place.  Several guides advocated an /etc/init.d/rc.firewall script instead.  The 
>existing iptables script sources /etc/sysconfig/iptables, which doesn't seem to exist 
>by default.
> 
> Since I haven't (yet) found any docs that deal w/ setting up an iptables firewall on 
>a RH 7.1 box *with the existing files layout*, I guess I'll have to ask the dum-dum 
>questions:  What is wrong w/ the RH scripts that no one seems to advocate, or at 
>least document using them?  Assuming nothing is really wrong w/ them, where do I add 
>my iptables lines, in /etc/init.d/iptables or /etc/sysconfig/iptables?

read your /etc/init.d/iptables

i use in seawolf
# iptables-save > /etc/sysconfig/iptables
# chmod go-r /etc/sysconfig/iptables

but this only save iptables command

> 
> Thoroughly confused,
> 
> Monte
> 
> _
> Do You Yahoo!?
> Get your free @yahoo.com address at http://mail.yahoo.com
> 
> 
> 
> ___
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list

-- 
ichtus
--
Lewi Supranata .K
ICQ: 50643061



msg64183/pgp0.pgp
Description: PGP signature


IPTables question

2001-11-16 Thread Monte Milanuk

I inadvertently fragged my LAN server, so I am taking the opportunity to reinstall 
KRUD 7.1 and set things up a bit tighter this time around.  Previously I used ipchains 
via lokkit to config my firewall.  This time I'd like to use iptables.  I have a book 
on Securing RH Linux 7.1, and have browsed multiple online guides to IPtables, but I 
still am confused about a few things.

Almost every example appears to completely ignore the default installed RH 7.1 
iptables script.  The book I have gives a completely different script in the same 
place.  Several guides advocated an /etc/init.d/rc.firewall script instead.  The 
existing iptables script sources /etc/sysconfig/iptables, which doesn't seem to exist 
by default.

Since I haven't (yet) found any docs that deal w/ setting up an iptables firewall on a 
RH 7.1 box *with the existing files layout*, I guess I'll have to ask the dum-dum 
questions:  What is wrong w/ the RH scripts that no one seems to advocate, or at least 
document using them?  Assuming nothing is really wrong w/ them, where do I add my 
iptables lines, in /etc/init.d/iptables or /etc/sysconfig/iptables?

Thoroughly confused,

Monte

_
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com



___
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list