Hello,

OK, for people who are having trouble with UDP. Firstly, user defined UDP 
protocols _do_not_ require an explicit iptables rule for allowing reply 
packets. Reply packets are handled by iptable's connection tracking feature. 
This is what these lines do:

        iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
        iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
        iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT

UDP has worked fine in Guarddog for quite a few years now.

What I want is for people who are having trouble to try to contact their 
teamspeak/UDP server with their client software, wait 5 seconds and then 
execute this command in shell:

        cat /proc/net/ip_conntrack > ~/ip_conntrack.txt

(you probably want to queue this up first in your shell :-) ). Then email me 
([EMAIL PROTECTED], *not* this list) these files/info:

* ~/ip_conntrack.txt
* /etc/rc.firewall  (your firewall script)
* the firewall log messages in /var/log/messages (showing the UDP packet being 
stopped).
* your kernel version.
* the output of "lsmod" command  ( lsmod > ~/lsmod.txt )
* the distribution you are using

We are trying to figure out why UDP connection tracking isn't working.

cheers,

-- 
Simon Edwards             | Guarddog Firewall
[EMAIL PROTECTED]       | http://www.simonzone.com/software/
Nijmegen, The Netherlands | "ZooTV? You made the right choice."

Reply via email to