I didn't get anything, but I'm not sure that I did it correctly. I opened a 
Terminal window and ran tail -f /var/log/messages.

I then ran a Conqueror and tried to hit a web site. Couldn't connect in the 
browser and the log didn't show anything.

I also tried "ipchains -A output -j ACCEPT" and it still didn't work.
After doing that here's what ipchains -L looks like:

Chain input (policy DENY):
target     prot opt     source                destination           ports
ACCEPT     all  ------  anywhere             anywhere              n/a
ACCEPT     tcp  ------  anywhere             192.168.1.8 
1024:65535 ->   ssh
ACCEPT     tcp  ------  anywhere             192.168.1.8 
1024:65535 ->   http
ACCEPT     tcp  ------  anywhere             192.168.1.8 
1024:65535 ->   https
Chain forward (policy DENY):
Chain output (policy DENY):
target     prot opt     source                destination           ports
ACCEPT     all  ------  anywhere             anywhere              n/a
ACCEPT     all  ------  anywhere             anywhere              n/a
Chain icmp (0 references):

Thanks,
James

At 06:38 PM 1/2/2002 +0200, you wrote:
>Hello James,
>
>1) Ok you got me on the EXTLAN (sorry) You can take it out
>
>2) Yes, that means that someone will be able to connect to port 10000-10500
>from the outside
>
>What does tail -f /var/log/messages give you when you try to connect ?
>
>Try ipchains -A output -j ACCEPT <-- Very bad I know but lets try
>
>Cheers,
>
>Pieter
>
>----- Original Message -----
>From: "James Pifer" <[EMAIL PROTECTED]>
>To: <[EMAIL PROTECTED]>
>Sent: Wednesday, January 02, 2002 6:33 PM
>Subject: RE: firewall-config tool
>
>
> > Pieter,
> >
> > Based on your message here's what I have. Problem is I still can't do
> > anything from the local machine. Can't www, ftp,  ping, etc. Can you take
>a
> > quick look?
> >
> > Couple other questions:
> > -What is EXTLAN? Doesn't appear to be used anywhere.
> >
> > -If I wanted to open up some specific ports, like 10000-10500, would this
> > be correct?
> > -ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP
> > 10000:10500 -j ACCEPT
> >
> > -What about Virtual IPs? Let's say I have a virtual IP of 192.168.1.9.
>Just
> > add another set of rules for each?
> >
> > Thanks,
> > James
> >
> >
> > echo Loading IPChains
> > insmod ipchains
> > echo Settings Vars
> >
> > #NICs
> > ANY="any/0"
> > EXT="eth0"
> > LPB="lo"
> >
> > #IP Address
> > EXTIP="192.168.1.8"
> >
> > #IP Ranges
> > EXTLAN="192.168.1.0/24"
> >
> > PRIVPORTS="0:1023"
> > UNPRIVPORTS="1024:65535"
> > ALLPORTS="0:65535"
> >
> > echo Clearing Firewall Rules
> > ipchains -F
> >
> > echo Setting Default Rules - Deny All
> > ipchains -P input DENY
> > ipchains -P output DENY
> > ipchains -P forward DENY
> >
> > #echo Setting IP Kernel Options and Loading Modules - If you want to
> > #depmod -a
> > #modprobe ip_masq_ftp
> > #modprobe ip_masq_raudio
> > #modprobe ip_masq_quake 26000,27000,27910,27960
> > #echo "1" > /proc/sys/net/ipv4/ip_always_defrag
> > #echo "1" > /proc/sys/net/ipv4/tcp_syncookies
> > #echo "1" > /proc/sys/net/ipv4/ip_forward
> >
> > echo Setting Loopback Rules - Allow All
> > ipchains -A input -i $LPB -j ACCEPT
> > ipchains -A output -i $LPB -j ACCEPT
> >
> > #Allow your machine to send data to *ANYWHERE* on *ANY* port
> > ipchains -A output -i $EXT -s $EXTIP -d $ANY -j ACCEPT
> >
> > #Allow incoming traffic
> > ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 22 -j
>ACCEPT
> > ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 80 -j
>ACCEPT
> > ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 443 -j
>ACCEPT
> >
> > #If you want to see the traffic that makes it pass
> > #the Firewall (denied traffic) then uncomment these
> > #lines.
> >
> > #ipchains -A input -i $ANY -j DENY -l
> > #ipchains -A output -i $ANY -j DENY -l
> >
> > #use tail -f /var/log/messages to check the messages
> > #I would disable it because your logs might fill up quickly !
> >
> >
> > At 05:42 PM 1/2/2002 +0200, you wrote:
> > >Hello James,
> > >
> > >Ok here goes and this is from the top of my head so please use
> > >"plug-and-prey"
> > >
> > >create a file called /etc/rc.d/rc.firewall
> > >
> > >Edit rc.local and below fi add
> > >/etc/rc.d/rc.firewall
> > >
> > >Edit rc.firewall and add the following lines
> > >--snip--
> > >echo Loading IPChains
> > >insmod ipchains
> > >echo Settings Vars
> > >
> > >#NICs
> > >ANY="any/0"
> > >EXT="eth0"
> > >LPB="lo"
> > >
> > >#IP Address
> > >EXTIP="192.168.0.1"
> > >
> > >#IP Ranges
> > >EXTLAN="192.168.0.0/24"
> > >
> > >PRIVPORTS="0:1023"
> > >UNPRIVPORTS="1024:65535"
> > >ALLPORTS="0:65535"
> > >
> > >#Darn Rulz !!! - For some people grin
> > >
> > >echo Clearing Firewall Rulz
> > >ipchains -F
> > >
> > >echo Setting Default Rulz - Deny All
> > >ipchains -P input DENY
> > >ipchains -P output DENY
> > >ipchains -P forward DENY
> > >
> > >echo Setting IP Kernel Options and Loading Modules - If you want to
> > >depmod -a
> > >modprobe ip_masq_ftp
> > >modprobe ip_masq_raudio
> > >modprobe ip_masq_quake 26000,27000,27910,27960
> > >echo "1" > /proc/sys/net/ipv4/ip_always_defrag
> > >echo "1" > /proc/sys/net/ipv4/tcp_syncookies
> > >echo "1" > /proc/sys/net/ipv4/ip_forward
> > >
> > >echo Setting Loopback Rulz - Allow All
> > >ipchains -A input -i $LPB -j ACCEPT
> > >ipchains -A output -i $LPB -j ACCEPT
> > >
> > >#Allow your machine to send data to *ANYWHERE* on *ANY* port
> > >ipchains -A output -i $EXT -s $EXTIP -d $ANY -j ACCEPT
> > >
> > >#Allow incoming traffic
> > >ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 22 -j
>ACCEPT
> > >ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 80 -j
>ACCEPT
> > >ipchains -A input -i $EXT -p tcp -S $ANY $UNPRIVPORTS -d $EXTIP 443 -j
> > >ACCEPT
> > >
> > >#If you want to see the traffic that makes it pass
> > >#the Firewall (denied traffic) then uncomment these
> > >#lines.
> > >
> > >#ipchains -A input -i $ANY -j DENY -l
> > >#ipchains -A output -i $ANY -j DENY -l
> > >
> > >#use tail -f /var/log/messages to check the messages
> > >#I would disable it because your logs might fill up quickly !
> > >--snip--
> > >
> > >to start the firewall once you on the box and havn't reboot type /etc/rc
> > >This should do what you want. Sorry I don't know the firewall-config-tool
>!
> > >
> > >Cheers,
> > >
> > >Pieter De Wit
> > >
> > >-----Original Message-----
> > >From: James Pifer [mailto:[EMAIL PROTECTED]]
> > >Sent: Wednesday, January 02, 2002 2:51 PM
> > >To: [EMAIL PROTECTED]
> > >Subject: firewall-config tool
> > >
> > >
> > >Is anyone familar with the firewall-config tool that comes installed with
> > >7.2? I have a system that I need to put on the internet so obviously I
>need
> > >to lock it down. I only want the following incoming ports open: 22, 80,
>and
> > >443. When on the machine, either on the console or through an x-session,
>I
> > >want it to have no restrictions going out. I've shut all the services
>down
> > >that I could, but I'd still like to lock it down as an extra safety
>measure.
> > >
> > >It's not a firewall and has only one NIC. I'm trying to use the
> > >firewall-config tool to configure it, but it doesn't look right to me
>when
> > >I do ipchains -L. I'd be happy to send screen shots of the
>firewall-config
> > >settings directly to anyone if that will help.
> > >
> > >I'm also not sure what options I should use on the Options tab.
> > >
> > >Here's the ipchains -L output:
> > >[root]# ipchains -L
> > >Chain input (policy ACCEPT):
> > >target     prot opt     source                destination           ports
> > >icmp       icmp ------  anywhere             anywhere              any ->
> > >any
> > >ACCEPT     tcp  ------  anywhere             anywhere              any ->
> > >any
> > >ACCEPT     udp  ------  anywhere             anywhere              any ->
> > >any
> > >ACCEPT     tcp  ------  anywhere             anywhere              ssh ->
> > >ssh
> > >ACCEPT     udp  ------  anywhere             anywhere              ssh ->
> > >ssh
> > >ACCEPT     tcp  ------  anywhere             anywhere              http
> > >->   http
> > >ACCEPT     udp  ------  anywhere             anywhere              http
> > >->   http
> > >ACCEPT     tcp  ------  anywhere             anywhere              https
> > >->   https
> > >ACCEPT     udp  ------  anywhere             anywhere              https
> > >->   https
> > >REJECT     tcp  ------  anywhere             anywhere              any ->
> > >any
> > >REJECT     udp  ------  anywhere             anywhere              any ->
> > >any
> > >Chain forward (policy DENY):
> > >Chain output (policy ACCEPT):
> > >Chain icmp (1 references):
> > >target     prot opt     source                destination           ports
> > >ACCEPT     icmp
> > >------  anywhere             anywhere
>destination-unreachable
> > >ACCEPT     icmp
> > >------  anywhere             anywhere              source-quench
> > >ACCEPT     icmp
> > >------  anywhere             anywhere              time-exceeded
> > >ACCEPT     icmp
> > >------  anywhere             anywhere              parameter-problem
> > >ACCEPT     icmp ------  anywhere             anywhere
> > >echo-request
> > >ACCEPT     icmp ------  anywhere             anywhere
> > >echo-reply
> > >DENY       all  ------  anywhere             anywhere              n/a
> > >[root]#
> > >
> > >My first rule is that I allow 192.168.1.8(the current Ip address of the
> > >machine itself) to go anywhere. Eventually this will get changed to a
>real
> > >internet address. Instead of listing the ip address I entered,
>ipchains -L
> > >has "any" for the source. It looks wide open to me based on the second
>and
> > >third rule listed.
> > >
> > >Any help on this is greatly appreciated.
> > >
> > >James
> > >
> > >
> > >
> > >
> > >
> > >_______________________________________________
> > >Redhat-list mailing list
> > >[EMAIL PROTECTED]
> > >https://listman.redhat.com/mailman/listinfo/redhat-list
> >
> >
> >
> >
>
>
>
>_______________________________________________
>Redhat-list mailing list
>[EMAIL PROTECTED]
>https://listman.redhat.com/mailman/listinfo/redhat-list



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to