Hi Chris:

May I respectfully suggest a completely different approach?

My reasoning for doing so follows this path: Maintaining a software firewall can be extremely challenging. They can be tricked, hacked and of course there are unintentional errors, even if one installs one or another piece of software -- say tripwire -- to watch it and any changes to your system for you.

The alternative is to go to a hardwired firewall, plug it in and go about your business dedicating your time to something else which absolutely requires your attention. This little device has done it's job over and time again (for me) and others and maybe if you consider it, you'll discover more time for other issues. The really hot thing about this device is that it does way more than what iptables can do for you anyway and the device works independently of any operating system. It is designed to work on networks faster dial-up; so it can sit between the incoming signal and the router feeding the rest of the network which means that anything coming past the device to the router is clean. So anything connected to that router -- wireless or otherwise -- are also clean as far as the signals they are receiving. Of course, making sure the internal nets are clean is the job of the sys.admin.

Here's the link for you to review and consider:

http://www.thinkgeek.com/computing/accessories/75f3/

Of course, you could refer to IPCop.org, netfilter.org, or tldp.org ... but after the Stingray, all of that will become mere reference material.

Best wishes.... Derick.

On May 15, 2006, at 9:28 AM, Chris St. Pierre wrote:

Last week, I brought up iptables on my YDL 4 box with a very basic
configuration, and all was working well.  This morning, at about 8 am,
it randomly started rejecting ping traffic.  Restarting iptables did
not solve the problem.  My iptables configuration has not changed
since Thursday afternoon.  Here's my /etc/sysconfig/iptables:

*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3306 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 5308 -j ACCEPT -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 5666 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT

As you can see, this is a very basic configuration that works on many
other hosts -- and, in fact, worked on this host for a while, too.
Any ideas?  Thanks!

Chris St. Pierre
Unix Systems Administrator
Nebraska Wesleyan University
_______________________________________________
yellowdog-general mailing list
[email protected]
http://lists.terrasoftsolutions.com/mailman/listinfo/yellowdog-general
HINT: to Google archives, try  '<keywords> site:terrasoftsolutions.com'


_______________________________________________
yellowdog-general mailing list
[email protected]
http://lists.terrasoftsolutions.com/mailman/listinfo/yellowdog-general
HINT: to Google archives, try  '<keywords> site:terrasoftsolutions.com'

Reply via email to