[ale] Grumbling Firewall Question

John Mills john at mills-atl.com
Thu Jan 25 14:43:24 EST 2001



ALErs -

I used 'pmfirewall' set up 'ipchains' on my Linux-2.2.17 box, which sits
behind a router. This works finer (AFAIK), except I seem to deny one type
of packet I might be better off accepting.

Situation: I open an 'ssh' to a remote host with no problem; the remote
replies with a confirming packet which I deny, and log. Each time more is
sent to the remote, it's confirmation is denied, and logged. This is
amusing when I open another 'ssh' back from the remote, and command it:
'tail -f /var/log/messages' -- each transmission to the remote generates a
reply; each reply generates a log entry of its denial; each new line of
the log is sent to the remote; _ad_infinitum_. (Actually this was alarming
the first time I saw it, especially as it coincided with a short outage at
my ISP. I thought it was some kind of attack! &8-)

If I read the log correctly (just guessing, really), I think my rule #34
is denying a sequence of 'udp' packets (proto=17?) sent to sequential
ports at my firewall/router, which are being forwarded to my port 162.


Here is a snippet of '/var/log/messages':

***********************************************************************************
Jan 14 04:02:00 otter syslogd 1.3-3: restart.
Jan 14 04:03:51 otter inetd[417]: auth/tcp: bind: Address already in use
an 14 04:06:20 otter kernel: Packet log: input DENY eth0 PROTO=17 ROUTER_IP:4078 MY_HOST_IP:162 L=142 S=0x00 I=0 F=0x0000 T=64 (#34) 
Jan 14 04:06:20 otter kernel: Packet log: input DENY eth0 PROTO=17 ROUTER_IP:4079 MY_HOST_IP:162 L=142 S=0x00 I=0 F=0x0000 T=64 (#34) 
Jan 14 04:06:20 otter kernel: Packet log: input DENY eth0 PROTO=17 ROUTER_IP:4080 MY_HOST_IP:162 L=142 S=0x00 I=0 F=0x0000 T=64 (#34) 

[and so on and so on ...]

Jan 16 22:57:42 otter kernel: Packet log: input DENY eth0 PROTO=17 ROUTER_IP:34822 MY_HOST_IP:162 L=141 S=0x00 I=0 F=0x0000 T=64 (#34)
 
Jan 16 22:57:53 otter kernel: Packet log: input DENY eth0 PROTO=17 ROUTER_IP:34823 MY_HOST_IP:162 L=140 S=0x00 I=0 F=0x0000 T=64 (#34)
 
Jan 16 22:57:53 otter kernel: Packet log: input DENY eth0 PROTO=17 ROUTER_IP:34824 MY_HOST_IP:162 L=140 S=0x00 I=0 F=0x0000 T=64 (#34)
 
[and so on and so on ...]

***********************************************************************************

The ruleset reported by 'ipchains -L' includes:

***********************************************************************************
Chain input (policy ACCEPT):
target     prot opt     source                destination           ports
ACCEPT     all  ------  anywhere             anywhere              n/a
ACCEPT     tcp  !y----  anywhere             192.168.1.0/24        any ->   any
DENY       all  ------  10.0.0.0/8           192.168.1.0/24        n/a
DENY       all  ------  127.0.0.0/8          192.168.1.0/24        n/a
DENY       all  ------  172.16.0.0/12        192.168.1.0/24        n/a

 [...]
 [my rule which permits 'ssh' logins:]
ACCEPT     tcp  ------  anywhere             192.168.1.0/24        any ->   ssh

 [...]

 [catchall final rejection rule, no.34:]
DENY       all  ----l-  anywhere             anywhere              n/a
Chain forward (policy ACCEPT):
Chain output (policy ACCEPT):
 [...]
***********************************************************************************

Question: How should I write a rule (or _should_ I write a rule) to accept
these packets returned by my 'ssh' correspondent?

Thanks.
 - John Mills


--
To unsubscribe: mail majordomo at ale.org with "unsubscribe ale" in message body.





More information about the Ale mailing list