Now this makes sense...  Now how will the ! -y option affect this for
TCP?  What about UDP? It's hanging out there in the breeze right? 

-----Original Message-----
From: Wil Cooley [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, June 20, 2001 5:10 PM
To: Scott H
Cc: [EMAIL PROTECTED]
Subject: Re: Chains question


Thus spake Scott H:
> In many IPchains scripts I see ports above 1024 set to accept in-bound
> traffic on TCP and UDP.  There is usually a comment to the effect of
> ports above 1024 are fair game.  Could some one explain why this is
> considered to be ok?  In my case I am using a linux firewall 
for my home
> network.

You need to allow ports above 1024 to be connected to if you're going
to be running any clients on the firewall, like SSH.  What happens is
that a client requests a randomly-assigned high port that forms the
local end of the connection.

Wil
-- 
W. Reilly Cooley                           [EMAIL PROTECTED]
Naked Ape Consulting                        http://nakedape.cc
LNXS: Get 0.2.0-devel at http://sourceforge.net/projects/lnxs/
irc.openprojects.net                                     #lnxs

"The only way for a reporter to look at a politician is down."
-- H.L. Mencken
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to