> > We have a DHCP server running on a central server behind our Shorewall
> > firewall (shorewall-perl-4.0.6). We have some 200 hosts all on the
> > same subnet and all behind that firewall. 
> > We use 
> > 1. (mostly) fixed IP addresses assigned to Mac addresses so that every
> >    registrered machine always gets the same IP address if he sets his PC
> >    to 'automatically obtain an IP address' (DHCP)
> > 2. a number of PCs where the TCP/IP addresses are set manually in the PC
> >    (not using DHCP) and recorded as known of/allowed.
> > 3. a small pool of dynamically leased addresses specified in our DHCP server
> >    (for visitors).
> > 
> > But sometimes some user does not set his PC to 'automatically obtain
> > an IP address' (DHCP) but puts in an IP address manually in his TCP/IP
> > configuration ... and if that IP address was already registrered
> > for someone else's MACaddress, the DHCP server will not hand out that 
> > IP when it finds that IP address is in use, leaving the rightfull 
> > 'owner' of that IP address without network connection ...
> > 
> > How can we make this impossible?
> > 
> > I took a look at www.shorewall.net/MAC_Validation.html 
> > but have questions:
> > 
> > - The MAC-addresses/IP-addresses combinations registrered in our
> >    DHCP server (1.) and the ones manually set (2.) must all be in
> >   /etc/shorewall/maclist ?
> 
> Depends on how you set it up. If you set MACLIST_DISPOSITION=ACCEPT then
> you might only add entries in /etc/shorewall/maclist for those that are
> manually set -- specify both MAC and IP ADDRESS.

But if I would use MACLIST_DISPOSITION=ACCEPT and only record entries for
those that are manually set (2.), wouldn't this leave the possibility open
that a user manually sets in his PC an IPaddress which is already 
reserved in our DHCP server (case 1.) for someone elses PC, causing the
trouble that the DHCP server will not hand out that IP to the rightfull
'owner' when that IP is in use ... (as I mentionned in my initial mail)

So I believe that my only option is to specify all the DHCP-fixed 
assigned MAC/IP addresses in maclist.

Or do I misunderstand ? (then what am i missing here?)

> 
> > - What about the dynamically leases addresses: here the MAC address
> >    can vary, only the pool of IP adresses is fixed.
> >    If I understand well, putting in the MAC column a dash (-) and a
> >    commad-delimited set of IP-addresses in the IPADRESSES column, this
> >    would be sufficient?
> 
> Or only the MAC addresses.

But I want to avoid that a visitor for only a few days, would need to ask
me to record his Mac address. So I believe that my only option then is
to use a dash in Mac column and a comma-delimited set of IPaddresses in the
IPADDRESSES column.

Is that right?
> 
> > - what's that remark about "Your kernel must include MAC match support
> >    (CONFIG_IP_NF_MATCH_MAC - module name ipt_mac.o)." How can I find out
> >    if this is included on a SUSE 10.2 or SUSE 10.3 ?
> > - How to find out if "If your kernel and iptables have iprange match
> >     support then IP address ranges are also allowed" for SUSE 10.2 and
> >    SUSE 10.3 ?
> See Shorewall FAQ 42.

# shorewall show capabilities
reports the following (see below):

So I have iprange match support, no ipset support,
but what about 'MAC match support'? Do I have it or not?
- I don't see something in the 'Available' or 'Not Available' lines, 
or does it correspond to 'Physdev match' or what ?

Shorewall has detected the following iptables/netfilter capabilities:
    NAT: Available
    Packet Mangling: Available
    Multi-port Match: Available
    Extended Multi-port Match: Available
    Connection Tracking Match: Available
    Packet Type Match: Available
    Policy Match: Available
    Physdev Match: Available
    Physdev-is-bridged Support: Available
    Packet length Match: Available
    IP range Match: Available
    Recent Match: Available
    Owner Match: Available
    Ipset Match: Not available
    CONNMARK Target: Available
    Extended CONNMARK Target: Available
    Connmark Match: Available
    Extended Connmark Match: Available
    Raw Table: Available
    IPP2P Match: Not available
    CLASSIFY Target: Available
    Extended REJECT: Available
    Repeat match: Available
    MARK Target: Available
    Extended MARK Target: Available
    Mangle FORWARD Chain: Available
    Comments: Available
    Address Type Match: Available
    TCPMSS Match: Available
    Hashlimit Match: Available
    NFQUEUE Target: Available


------------------------------------------------------------------------------
OpenSolaris 2009.06 is a cutting edge operating system for enterprises 
looking to deploy the next generation of Solaris that includes the latest 
innovations from Sun and the OpenSource community. Download a copy and 
enjoy capabilities such as Networking, Storage and Virtualization. 
Go to: http://p.sf.net/sfu/opensolaris-get
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to