I've got port forwarding for a hotline server I run working with the
EigerStein Pre/release with pppoe (thanks to Etienne Charlier). There are
notes about security holes using dynamic ip addresses. The only notes I can
find about this are from
http://www.linuxdoc.org/HOWTO/IP-Masquerade-HOWTO-6.html

Which says:

NOTE #2: If you get a dynamically assigned TCP/IP address from your ISP
(PPP, ADSL, Cablemodems, etc.), you CANNOT load this strong ruleset upon
boot. You will either need to reload this firewall ruleset EVERY TIME you
get a new IP address or make your /etc/rc.d/rc.firewall ruleset more
intelligent. To do this for PPP users, carefully read and un-comment out the
properly lines in the "Dynamic PPP IP fetch" section below. You can also
find more details in the TrinityOS - Section 10 doc for more details on
Strong rulesets and Dynamic IP addresses.

So I added a "net reload" line to the ip-up script. (which fixed all my
ipchains problems). Is there a reason this shouldn't be a standard part of
ppp(d).lrp or pppoe.lrp? Everything else in the strong rulesets from the
above how-to seem to already be included in the standard scripts.

So my question is: Am I missing something? The network config warning seems
pretty adamant.

Thanks for your help.

-Liam

(on to FAIRQ so hotline will stop hogging all my bandwidth :] )


_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to