Package: firehol
Version: 1.231-2sarge1
Severity: important

I have tried 2 firehol.conf files:
  one that I use on i386 systems
  one generated by firehol-wizard
Both cause firehol to generate (report) many error messages from
iptables.

So this seems to be a sparc problem?

I will try to attach, or include, the conf files, and the output of
"firehol try"

============= (start) firehol.conf ======================
#!
# ------------------------------------------------------------------------------
# This feature is under construction -- use it with care.
#             *** NEVER USE THIS CONFIG AS-IS ***
# 
# : firehol.sh,v 1.231 2004/11/01 00:13:00 ktsaou Exp $
# (C) Copyright 2003, Costa Tsaousis <[EMAIL PROTECTED]>
# FireHOL is distributed under GPL.
# Home Page: http://firehol.sourceforge.net
# 
# ------------------------------------------------------------------------------
# FireHOL controls your firewall. You should want to get updates quickly.
# Subscribe (at the home page) to get notified of new releases.
# ------------------------------------------------------------------------------
#
# This config will have the same effect as NO PROTECTION!
# Everything that found to be running, is allowed.
# 
# Date: Fri Mar 23 16:14:36 ADT 2007 on host Coral.OCEAN.Dal.Ca
# 
# The TODOs bellow, are YOUR to-dos!

### DEBUG: Processing interface 'eth0'
### DEBUG: Processing IP 129.173.105.57/32 of interface 'eth0'
### DEBUG: Is 129.173.105.57/32 part of network 129.173.104.0/22? yes

# Interface No 1.
# The purpose of this interface is to control the traffic
# on the eth0 interface with IP 129.173.105.57/32 (net: "129.173.104.0/22").
# TODO: Change "interface1" to something with meaning to you.
# TODO: Check the optional rule parameters (src/dst).
# TODO: Remove 'dst 129.173.105.57/32' if this is dynamically assigned.
# interface eth0 interface1 src "129.173.104.0/22" dst 129.173.105.57/32
interface eth0 interface1 src "129.173.104.0/22"

        # The default policy is DROP. You can be more polite with REJECT.
        # Prefer to be polite on your own clients to prevent timeouts.
        policy drop

        # If you don't trust the clients behind eth0 (net "129.173.104.0/22"),
        # add something like this.
        # > protection strong

        # Here are the services listening on eth0.
        # TODO: Normally, you will have to remove those not needed.
        client dhcp accept
        server ICMP accept
        server cups accept
        server http accept
        server ident accept
        server ntp accept
        server postgres accept
        server sunrpc accept

        # The following eth0 server ports are not known by FireHOL:
        #  tcp/633 udp/626 udp/629 
        # TODO: If you need any of them, you should define new services.
        #       (see Adding Services at the web site - http://firehol.sf.net).

        # The following means that this machine can REQUEST anything via eth0.
        # TODO: On production servers, avoid this and allow only the
        #       client services you really need.
        client all accept

### DEBUG: Is 129.173.104.1/32  part of network 129.173.104.0/22? yes
### DEBUG: Default gateway 129.173.104.1/32  is part of network 129.173.104.0/22

# Interface No 2.
# The purpose of this interface is to control the traffic
# from/to unknown networks behind the default gateway 129.173.104.1/32 .
# TODO: Change "interface2" to something with meaning to you.
# TODO: Check the optional rule parameters (src/dst).
# TODO: Remove 'dst 129.173.105.57/32' if this is dynamically assigned.
# interface eth0 interface2 src not "${UNROUTABLE_IPS} 129.173.104.0/22" dst 
129.173.105.57/32
interface eth0 interface2 src not "${UNROUTABLE_IPS} 129.173.104.0/22"

        # The default policy is DROP. You can be more polite with REJECT.
        # Prefer to be polite on your own clients to prevent timeouts.
        policy drop

        # If you don't trust the clients behind eth0 (net not 
"${UNROUTABLE_IPS} 129.173.104.0/22"),
        # add something like this.
        # > protection strong

        # Here are the services listening on eth0.
        # TODO: Normally, you will have to remove those not needed.
        client dhcp accept
        server ICMP accept
        server cups accept
        server http accept
        server ident accept
        server ntp accept
        server postgres accept
        server sunrpc accept

        # The following eth0 server ports are not known by FireHOL:
        #  tcp/633 udp/626 udp/629 
        # TODO: If you need any of them, you should define new services.
        #       (see Adding Services at the web site - http://firehol.sf.net).

        # The following means that this machine can REQUEST anything via eth0.
        # TODO: On production servers, avoid this and allow only the
        #       client services you really need.
        client all accept


# The above 2 interfaces were found active at this moment.
# Add more interfaces that can potentially be activated in the future.
# FireHOL will not complain if you setup a firewall on an interface that is
# not active when you activate the firewall.
# If you don't setup an interface, FireHOL will drop all traffic from or to
# this interface, if and when it becomes available.
# Also, if an interface name dynamically changes (i.e. ppp0 may become ppp1)
# you can use the plus (+) character to match all of them (i.e. ppp+).



# No router statements have been produced, because your server
# is not configured for forwarding traffic.
============= (end) firehol.conf ======================


============= (start) output of "firehol firehol.conf try " =======


--------------------------------------------------------------------------------
ERROR   : # 1.
WHAT    : A runtime command failed to execute (returned error 1).
SOURCE  : line 76 of /etc/firehol/firehol-wizard.conf
COMMAND : /sbin/iptables -t filter -A in_interface1 -m limit --limit 1/second 
--limit-burst 5 -j LOG --log-level warning --log-prefix=IN-interface1: 
OUTPUT  : 

iptables: Invalid argument



--------------------------------------------------------------------------------
ERROR   : # 2.
WHAT    : A runtime command failed to execute (returned error 1).
SOURCE  : line 76 of /etc/firehol/firehol-wizard.conf
COMMAND : /sbin/iptables -t filter -A out_interface1 -m limit --limit 1/second 
--limit-burst 5 -j LOG --log-level warning --log-prefix=OUT-interface1: 
OUTPUT  : 

iptables: Invalid argument



--------------------------------------------------------------------------------
ERROR   : # 3.
WHAT    : A runtime command failed to execute (returned error 1).
SOURCE  : line FIN of /etc/firehol/firehol-wizard.conf
COMMAND : /sbin/iptables -t filter -A in_interface2 -m limit --limit 1/second 
--limit-burst 5 -j LOG --log-level warning --log-prefix=IN-interface2: 
OUTPUT  : 

iptables: Invalid argument



--------------------------------------------------------------------------------
ERROR   : # 4.
WHAT    : A runtime command failed to execute (returned error 1).
SOURCE  : line FIN of /etc/firehol/firehol-wizard.conf
COMMAND : /sbin/iptables -t filter -A out_interface2 -m limit --limit 1/second 
--limit-burst 5 -j LOG --log-level warning --log-prefix=OUT-interface2: 
OUTPUT  : 

iptables: Invalid argument



--------------------------------------------------------------------------------
ERROR   : # 5.
WHAT    : A runtime command failed to execute (returned error 1).
SOURCE  : line FIN of /etc/firehol/firehol-wizard.conf
COMMAND : /sbin/iptables -t filter -A INPUT -m limit --limit 1/second 
--limit-burst 5 -j LOG --log-level warning --log-prefix=IN-unknown: 
OUTPUT  : 

iptables: Invalid argument



--------------------------------------------------------------------------------
ERROR   : # 6.
WHAT    : A runtime command failed to execute (returned error 1).
SOURCE  : line FIN of /etc/firehol/firehol-wizard.conf
COMMAND : /sbin/iptables -t filter -A OUTPUT -m limit --limit 1/second 
--limit-burst 5 -j LOG --log-level warning --log-prefix=OUT-unknown: 
OUTPUT  : 

iptables: Invalid argument



--------------------------------------------------------------------------------
ERROR   : # 7.
WHAT    : A runtime command failed to execute (returned error 1).
SOURCE  : line FIN of /etc/firehol/firehol-wizard.conf
COMMAND : /sbin/iptables -t filter -A FORWARD -m limit --limit 1/second 
--limit-burst 5 -j LOG --log-level warning --log-prefix=PASS-unknown: 
OUTPUT  : 

iptables: Invalid argument

Stopped: Couldn't activate new firewall.

FireHOL: Restoring old firewall: OK
============= (end) output of "firehol firehol.conf try " =======


Regards,
Douglas.

-- System Information:
Debian Release: 3.1
Architecture: sparc (sparc64)
Kernel: Linux 2.4.27-3-sparc64
Locale: LANG=en_CA, LC_CTYPE=en_CA (charmap=ISO-8859-1)

Versions of packages firehol depends on:
ii  bash                          2.05b-26   The GNU Bourne Again SHell
ii  bc                            1.06-15    The GNU bc arbitrary precision cal
ii  iproute                       20041019-3 Professional tools to control the 
ii  iptables                      1.2.11-10  Linux kernel 2.4+ iptables adminis
ii  net-tools                     1.60-10    The NET-3 networking toolkit

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to