DJA wrote:
Ralph Shumaker wrote:
James G. Sack (jim) wrote:
Ralph Shumaker wrote:
nfs was not enabled.  Stopped nfslock (which stopped rpc.statd).  And
stopped rpcbind.  Disabled them and saved.

I don't know if they are related, but rpcgssd is enabled and running, as
well as rpcidmapd.

I guess those are all related (because of the rpc prefix), and all
unnecessary in your setup.

rpcgssd failed to stop, but didn't claim to be running. It was checkmarked for loading tho.

That is a normal response if you try to stop a service that is not currently running.

OK, but the error dialog is not straight forward:
"rpcgssd failed.  The error was:  [blank]"

Where [blank] was simply nothing, no text, no nothing.



rpcidmapd shut down successfully.

Both said something about NFSv4, which I don't think I'm using. I have disabled them from starting up again (in runlevel 5 anyway).

If you were using NFSv4 you'd know. It is a very different configuration than earlier versions.

I don't think I've ever used NFS, of _any_ version.


So your DSL modem is not doing any NAT.

Which is port forwarding?

No. Network Address Translation (NAT) is basically where any computer on your local network (LAN) gets the same Internet (routeable, or WAN) address, and thus looks to be the same box to anyone outside your LAN.

Port Forwarding is when you need to have a particular box on your LAN exclusively handle traffic requiring a specific port. E.g. you may want to SSH into your LAN from a remote location.

Assuming you have only one WAN IP address assigned you by your ISP, you would only be able to address any given box on your LAN by the one WAN IP address. Port Forwarding allows you to route the SSH packets to whichever box you've designated as being basically your SSH server.

It's a means of getting certain service packets to the right box even though there is only one IP address for you available to the rest of the world.

This sounds like a good reason to get IPv6 into the mainstream. This reminds me, whatever happened with the guys that were going to set up (mentioned here on a kplug list) a completely free porn site on IPv6 (which initially was supposed to be operational in September 2006 IIRC)?


Someone else can give you the painful details or correct me on all that, but that's my simple-minded way of describing it.


The DSL management interface may or may not be accessible, though.
Here's what I would try:

  # ifconfig eth0:1 192.168.1.99
  # ping 192.168.1.1
if ping works, point your browser at http://192.168.1.1, and poke around.

What the above is, is an ethernet "alias" which behaves like another
interface working through the same hardware and ethernet wiring.

Yep, that did the trick. I'm in. Now I need to regress in this thread since what you suggested has either been snipped or I'm just not seeing it.

If I found it, you suggested looking for unexpected port forwarding. I don't know where to look for that. There seems to be a _lot_ in there. But I did find a list of services:
☐ FTP
☑ HTTP
☑ ICMP
☑ SNMP
☑ TELNET
☑ TFTP

If you are not running servers for any of the above, then none of those, except ICMP should be checked. Especially Telnet (use SSH instead if needed) and TFTP. This assumes that those settings actually refer to Port Forwarding, which I doubt. I think they just allow those packets through, suggesting your modem does do some very basic firewalling?

It must have been snipped out at some point:
dslextreme, yes. I don't remember if it has firewall built-in. It says DSL-2320B on the front of it. dlink.com says its firewalling is:
•     MAC Filtering
•     Packet Filtering
•     Stateful Packet Inspection (SPI)
•     User Authentication PAP
•     User Authentication CHAP

Here's the link (IIRC) where I found it:
http://www.dlink.com/products/resource.asp?pid=554&rid=2122&sec=0

So, does this mean that the firewall in my DSL modem is insufficient?

It's amazing to me to think that my Linux machine had no barrier but its own built in defenses when I surfed over a regular modem. I realize that most people may have the initial reaction "Well over such a thin pipe, of course there wasn't much risk!" except that my windows machine (over the same pipe) had to have zoneAlarm running to keep it safe.

Where should I go if I  want a basic coverage of how to do IPtables?


If there *is* anything anywhere in there about port forwarding, it eluded me.

It will go away on next boot, or if desired you can get rid of it by
 # ifconfig eth0:1 0.0.0.0

I see no harm in leaving it. In fact, how can I make it survive a reboot?

Should one?

Only so that I don't have to rely on vague memories of how to do it again when I need it. I guess I'll just have to add a few lines to my notes. My only trouble there is that I keep it as a file and have to remember the name and where it is (used very infrequently).



--
We don't get our rights because we're gays, or women, or minorities. We get our rights from our creator as individuals. So every individual should be treated the same way.
--Congressman Ron Paul


--
KPLUG-List@kernel-panic.org
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to