Paring your response down to the one thing that needs an answer ...

At 04:15 PM 12/26/01 -0500, Kory Krofft wrote:
[...]
>> My earlier suggestion was for you to look at the actual ipchains rules that
>> *result* from the default configuration, not to look at the portions of the
>> config scripts that the user commonly edits. If you run on your LEAF router
>> the command "ipchains -L -n", you'll get a readable bt incomplete list of
>> your firewall rules as actually implemented. The command "ipchains -L -n -v"
>> will give a complete listing, but a harder to read one. Read through the
>> rules in sequence (concentrate on the input chain) to find any rules that
>> handle ICMP type 8 (ping) traffic coming from the DMZ's network range, and
>> see what they say.
>
>Like these?
># ipchains -L -n
>Chain input (policy DENY):
>target     prot opt     source                destination          
>ports
>DENY       icmp ----l-  0.0.0.0/0            0.0.0.0/0             5
>->   *
>DENY       icmp ----l-  0.0.0.0/0            0.0.0.0/0             13
>->   *
>DENY       icmp ----l-  0.0.0.0/0            0.0.0.0/0             14
>->   *

Almost. These DENY icmp packet types 5, 13, and 14 (the numbers all the way
at the right, the icmp analogs to TCP/UDP port numbers). ping traffic is type 8.

The later list of rules you posted (not quoted here) are *probably* what
governs the relevant traffic. This ACCEPT rule should forward ping traffic
*to* host on the DMZ -- 

>ACCEPT     icmp ------  0.0.0.0/0            192.168.10.0/24       *
>->   *

        -- but there is no equivalent rule to forward icmp/8 traffic *from*
DMZ hosts, so the final DENY rule stops it. This is just guesswork, though
... ipchains rules function as a set, so you need to read them in order and
find the *first* rule that matches a packet, -NOT- the most specific rule
(and you need to see the complete form of the rule, as I mention below).

That said, this block of rules puzzles me --

>ACCEPT     tcp  ------  1.1.1.0/27           0.0.0.0/0             *
>->   *
>ACCEPT     icmp ------  1.1.1.0/27           0.0.0.0/0             *
>->   *
>ACCEPT     udp  ------  1.1.1.0/27           0.0.0.0/0             53
>->   *
>MASQ       udp  ------  1.1.1.0/27           0.0.0.0/0             *
>->   *

1.1.1.0/27 looks suspiciously like a dummy entry to me, possibly one for a
DMZ somewhere later in /etc/network.conf . If these forward-chain rules
applied to a DMZ, they would be a bit inconsistent (some assume a public
address, but the last one assumes a private address) but they would probably
open up network 1.1.1.0/27 to the Internet (you need to examine the
"ipchains -L -n -v" complete listing of the rules to be sure).

>Looks to me like it does indeed block the ping traffic. Any suggestions
>as 
>to how to test the DMZ from inside once I start to work on it?

Not without knowing a lot more than I do about your setup. One cannot test
whether a DMZ works properly without knowing what services it is supposed to
provide.




--
------------------------------------"Never tell me the odds!"---
Ray Olszewski                                        -- Han Solo
Palo Alto, CA                                    [EMAIL PROTECTED]        
----------------------------------------------------------------


_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to