Hi Edward,
That looks OK to me because the "interface" is not the same as the source
and
destination.
This might be a bit wrong in the detail, but I think of it as follows.
Interface is the physical or logical, er... interface, on your machine
through which the message arrived or is being sent/routed etc.
Source and destination are IP addresses taken from the header.

As an example of the distinction. I allow ssh from the outside world into my
machine. However, I know I only have a certain set of places that I might
connect from.
So I allow new connections input to interface ppp0, on destination port 22,
but only from specific known source addresses.
On the other hand, a public web or mail server would basically
have to receive from all addresses.

If you are allowing masquerading of web browsing, for example, then you will
need
to allow all source addresses back in, unless you want to be severely
limited
as to where your machines can browse. But those restrictions would be better
done before allowing the masqueraded packets out, thus anything you've
allowed out
is already permitted.
As an example of this, you might allow forward packets on interface eth0 but
only from source address 192.168.x.2, which is your machine, but not from
192.168.x.3

Cameron.

> -----Original Message-----
> From: Edward Dekkers [mailto:[EMAIL PROTECTED]] 
> Sent: Wednesday, 20 November 2002 11:49
> To: [EMAIL PROTECTED]
> Subject: iptables -nL question
> 
> 
> I've always had the following rules (default flushing, policy 
> and stuff
> omitted):
> 
> iptables -A FORWARD -i ppp0 -o eth0 -m state --state 
> ESTABLISHED, RELATED -j
> ACCEPT
> iptables -A FORWARD -i eth0 -o ppp0 -j ACCEPT
> 
> Basically, I got this from a bit of reading, some examples 
> found on the
> internet, and understood it as let everything out, but only 
> related and
> established connections back in. This has always worked but I 
> never checked
> the list output. I did today:
> 
> iptables --list and got (again other stuff omitted)
> 
> Chain FORWARD (Policy DROP)
> target        prot opt source       destination
> ACCEPT  all    --   anywhere  anywhere   state RELATED,ESTABLISHED
> ACCEPT  all    --   anywhere  anywhere
> 
> uhm, is that OK? It doesn't look it to me. Shouldn't the source and
> destination be filled in as ppp0 and eth0? Or doesn't --list list that
> properly? I'm worried that the anywhere anywhere means that 
> the related and
> established rule never gets triggered.
> 
> P.S. I also tried iptables -nL and got (unrelevant stuff omitted)
> 
> Chain FORWARD (Policy DROP)
> target        prot opt source       destination
> ACCEPT  all    --   0.0.0.0/0   0.0.0.0/0   state RELATED,ESTABLISHED
> ACCEPT  all    --   0.0.0.0/0   0.0.0.0/0
> 
> Regards,
> 
> ---
> Edward Dekkers (Director)
> Triple D Computer Services P/L
> 
> 
> 
> 
> -- 
> redhat-list mailing list
> unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
> https://listman.redhat.com/mailman/listinfo/redhat-list
> 



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to