Shorewall is, in general, working fine. Much better then ufw imho.

I have one single problem with one single web site on a 2 interface fw.

If I plug into my cable modem directly, this site works fine.

I cannot access: https://www5.v1host.com/ from behind shorewall. In fact, I
can't get to it even from the fw itself.

With the cable modem on eth0 of my fw, neither machines behind it on eth1,
or the fw itself can get this one specific web site.
I have not noticed problems with any other sites.

Both dns & traceroute report the same end results whether plugged into
cable modem direct, or behind the fw so I'm at a loss as to where to look
next.

policy:
#SOURCE         DEST            POLICY          LOG LEVEL       LIMIT:BURST
loc             net             ACCEPT
loc             $FW             ACCEPT

# Let FW go wherever
$FW             net             ACCEPT
$FW             loc             ACCEPT
$FW             all             REJECT          info

#
# Policies for traffic originating from the Internet zone (net)
#
net             $FW             DROP            info
net             loc             DROP            info
net             all             DROP            info

# THE FOLLOWING POLICY MUST BE LAST

rules:

DNS(ACCEPT) $FW net
#
# Accept SSH connections from the local network for administration
#
SSH(ACCEPT) net $FW
SSH(ACCEPT) loc $FW
#
# Allow Ping from the local network
#
Ping(ACCEPT) loc $FW
#
# Drop Ping from the "bad" net zone.. and prevent your log from being
flooded..
#
Ping(DROP) net $FW
ACCEPT $FW loc icmp
ACCEPT $FW net icmp

interfaces:

#ZONE   INTERFACE       BROADCAST       OPTIONS
net     eth0            detect
 dhcp,tcpflags,nosmurfs,routefilter,logmartians
loc     eth1            detect
 tcpflags,nosmurfs,routefilter,logmartians

masq:

#INTERFACE              SOURCE          ADDRESS         PROTO   PORT(S)
IPSEC   MARK
eth0                    10.1.1.0/8

zones:
#ZONE   TYPE    OPTIONS                 IN                      OUT
#                                       OPTIONS                 OPTIONS
fw      firewall
net     ipv4
loc     ipv4

Both curl & wget also fail. Here's the curl output:

130 #> curl -v  "https://www5.v1host.com";
* About to connect() to www5.v1host.com port 443 (#0)
*   Trying 209.34.82.239... connected
* Connected to www5.v1host.com (209.34.82.239) port 443 (#0)
* successfully set certificate verify locations:
*   CAfile: none
  CApath: /etc/ssl/certs
* SSLv3, TLS handshake, Client hello (1):
* SSLv3, TLS handshake, Server hello (2):
* SSLv3, TLS handshake, CERT (11):
* SSLv3, TLS handshake, Server finished (14):
* SSLv3, TLS handshake, Client key exchange (16):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSL connection using RC4-MD5
* Server certificate:
*        subject: serialNumber=2duG-ipSr4CUsFthi6dD0sRSicGl103e; C=US;
ST=Georgia; L=Alpharetta; O=VersionOne, Inc.; OU=Corporate; CN=*.v1host.com
*        start date: 2012-02-09 02:59:13 GMT
*        expire date: 2013-05-12 20:47:54 GMT
*        subjectAltName: www5.v1host.com matched
*        issuer: C=US; O=GeoTrust, Inc.; CN=GeoTrust SSL CA
*        SSL certificate verify ok.
> GET / HTTP/1.1
> User-Agent: curl/7.21.6 (x86_64-pc-linux-gnu) libcurl/7.21.6
OpenSSL/1.0.0e zlib/1.2.3.4 libidn/1.22 librtmp/2.3
> Host: www5.v1host.com
> Accept: */*
>
then nothing...
------------------------------------------------------------------------------
For Developers, A Lot Can Happen In A Second.
Boundary is the first to Know...and Tell You.
Monitor Your Applications in Ultra-Fine Resolution. Try it FREE!
http://p.sf.net/sfu/Boundary-d2dvs2
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to