ipchains rule question: Destination ip
Matthew Carpenter
matt
Mon May 17 11:34:39 PDT 2004
On Tue, 9 Jul 2002 10:52:41 -0500
"David A. Bandel" <david at pananix.com> wrote:
> On Tue, 9 Jul 2002 11:08:23 -0400
> begin Matthew Carpenter <matt at eisgr.com> spewed forth:
>
> [snip]
> > >
> > > The above is "your system to Internet on ntp port (123)", the next
> > > rule is"Internet to your system on ntp port".
> >
> > Not quite. The first one your system to Anywhere for NTP. The second
> > rule is another machine to the outside of the firewall on NTP and has
> > no business being there unless your firewall is going to provide NTP
> > to this other machine.
>
> Umm. You said the same thing I did, so how can it be "not quite"? I
> just didn't judge the sagacity of allowing the world to use him as an
> NTP server (maybe he _wants_ to). I have a system that I and my
> customers(perhaps 150 or so systems) use as an NTP server (and it's
> slaved off time.nist.gov). He didn't say if that was also his case.
I did not say what you did. If you meant to say it differently, that's
not my fault, but you did not say anything clearly. If I were to write
rules based on what you said, they would be something like:
target tosa tosx ifname source destination ports
ACCEPT udp 0xFF 0x00 eth1 198.82.161.227 0.0.0.0 * -> 123
ACCEPT udp 0xFF 0x00 eth1 0.0.0.0 198.82.161.227 * -> 123
but what he gave is:
target tosa tosx ifname source destination ports
ACCEPT udp 0xFF 0x00 eth1 198.82.161.227 0.0.0.0 * -> 123
ACCEPT udp 0xFF 0x00 eth1 198.82.162.213 68.36.44.105 * -> 123
(68.36.44.105 being the external IP of the firewall)
198.82.161.227: proxy.cc.vt.edu
198.82.162.213: lennier.cc.vt.edu
68.36.44.105: bgp387816bgs.jersyc01.nj.comcast.net
Where are you looking? How does
the next rule is"Internet to your system on ntp port".
fit into this description at all?
What I said was WRONG, as I had not done the lookups to figure out that
198.82.x.x were the hosts being synched with....
I revise my statement to say that (assuming NTP outbound is accepted):
rule 1: Internet NTP Server's replies to anywhere controlled by your
firewall are accepted.
rule 2: Another Internet NTP Servers replies to your Firewall.
Rule 1 would work for responses from that server to your network, as long
as udp123 outbound is accepted traffic.
Rule 2 would work for responses either directly to the firewall or for
hosts being MASQ'ed
More information about the Linux-users
mailing list