I use IPSETs in SW for mass access blocking.  The block's in /conntrack

        /conntrack
                ?FORMAT 3
                NOTRACK     +IPBLACKLIST_IP    -
                NOTRACK     +IPBLACKLIST_NET   -
                DROP:P      +IPPESTS_IP              -
                DROP:P      +IPPESTS_NET             -
                ...

Those blacklists are populated by exernal feeds.  I do not edit/modify 
individual elements; simply retrieve the data and load the IPSETs.

It works as expected.

I want to punch a specific hole for accessing webcontent, from my LAN, @ a 
specific IP range that's been blanket-included in the above blacklist.

I create a hash:ip & hash:ip IPSETs containing the ip range to be whitelisted, 
and allow the traffic in /rules

        /rules
                ...
                ACCEPT    $FW    net:+IPWHITELIST_IP,+IPWHITELIST_NET    tcp
                ACCEPT    lan    net:+IPWHITELIST_IP,+IPWHITELIST_NET    tcp
                ...


This does NOT open the access; it remains blocked.

I suspect it's because the DROP:P is in pre-routing chain, and I'm not 
ACCEPTing early enough.

Given the global block in /conntrack should stay as is, what's the right way to 
punch specific, whitelisted holes in the blacklists?

------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to