> OK, are several things that could be going wrong, besides 
> mis-configuration (it looks like you've got everything setup 
> properly, 
> but I can't tell for sure without the full output of "net 
> ipfilter list").
> 
> 1) Your ISP is blocking port 25.  This is fairly common, and is 
> typically encountered along with blocking of port 80.  To test this, 
> keep the EXTERN_TCP_PORTS setting above, but comment out the 
> INTERN_SERVERS port-forwarding setting.  This will let 
> packets through 
> your firewall, but they will have nowhere to go (no listening 
> service or 
> port-forward), so the firewall will send out a TCP reset packet.  GRC 
> should show this as a "closed" port, rahter than "open" or "stealth". 
> You can also try a normal traceroute to your box, then a traceroute 
> using TCP port 25 packets, to see if your ISP is filtering 
> traffic (Note 
> you have to do this from *OUTSIDE* your ISP's network).

Definitely not blocked by my ISP- we have a Proxy Server 2.0 router running
on another machine at address 216.70.236.235 subnet mask 255.255.255.248 and
it's receiving packets destined for the Exchange box. We've had this setup
for at least 4 years now. So I'm ruling out SMTP blocking.

> 
> 2) Your firewall is actually mis-configured, and your 
> firewall rules or 
> port-forwarding setup is preventing packets from getting to your mail 
> server, even though your network.conf settings look OK.  Send 
> the output 
> of "net ipfilter list" so we can verify your setup and/or 
> trace packets 
> as they make their way through your network (with ipchains packet 
> counts/logging, tcpdump, or some other means).

Here's the net ipfilter list:

Chain input (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             5 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             13 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             14 ->   *
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0              0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
255.255.255.255      0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
127.0.0.0/8          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
224.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
10.0.0.0/8           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
172.16.0.0/12        0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/8            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
128.0.0.0/16         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
191.255.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.0.0.0/24         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
223.255.255.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
240.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.1.0/24       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
216.70.236.236       0.0.0.0/0             n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            127.0.0.0/8           n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            192.168.1.0/24        n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
   20   800 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
   53  4134 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
   20   800 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0
xxx.xxx.0.0/16         <--edited out
0.0.0.0/0             * ->   22
   40  1600 ACCEPT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   80
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   8080
   20   800 ACCEPT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   25
   20   800 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   113
25020   23M ACCEPT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
    0     0 REJECT     udp  ----l- 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   161:162
    0     0 DENY       udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   67
  637  193K ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
  738 42566 ACCEPT     icmp ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   *
    0     0 ACCEPT     ospf ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             n/a
  140  5600 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 REJECT     udp  ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             * ->   161:162
    0     0 REJECT     udp  ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             161:162 ->   *
28567 2237K ACCEPT     all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             5 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *
192.168.1.4          0.0.0.0/0             25 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *
192.168.1.15         0.0.0.0/0             80 ->   *
    0     0 MASQ       all  ------ 0xFF 0x00  eth2
192.168.1.0/24       192.168.2.0/24        n/a
    0     0 MASQ       all  ------ 0xFF 0x00  eth0
192.168.2.0/24       0.0.0.0/0             n/a
18084 1338K MASQ       all  ------ 0xFF 0x00  eth0
192.168.1.0/24       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth2
0.0.0.0/0            192.168.2.0/24        n/a
    0     0 DENY       all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain output (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
52302   30M fairq      all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0              0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
255.255.255.255      0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
127.0.0.0/8          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
224.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
10.0.0.0/8           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
172.16.0.0/12        0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/8            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
128.0.0.0/16         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
191.255.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.0.0.0/24         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
223.255.255.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
240.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00  eth0
192.168.1.0/24       0.0.0.0/0             n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
   79 21725 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
52223   30M ACCEPT     all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain fairq (1 references):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 RETURN     ospf ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     ospf ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   520
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             520 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   179
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             179 ->   *
  306 12544 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   53
  229  9468 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             53 ->   *
  681 43899 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   53
  162 15264 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             53 ->   *
  216  8853 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             * ->   23
  195 64751 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             23 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             * ->   22
 3661 3587K RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             22 ->   *

:: Port FW ::

prot localaddr            rediraddr               lport    rport  pcnt  pref
TCP  216.70.236.236       192.168.1.15             8080       80    10    10
TCP  216.70.236.236       192.168.1.4                25       25     8    10

:: MarkFW ::

fwmark   rediraddr               rport  pcnt  pref

:: AutoFW ::

Type Prot Low  High Vis  Hid  Where    Last     CPto CPrt Timer Flags


> 
> 3) Your mail server is off-line, or you are port-forwarding 
> to the wrong 
> internal IP.  Try telneting to the internal IP of your mail 
> server from 
> a box on the internal network, and see if you can connect and 
> manually 
> walk through an SMTP session (type "HELO" then "QUIT" for a 
> minimal test).

Telnetting into Exchange works normally. Am sending email using this
particular email server.

> 
> Reading between the lines, I strongly suspect your ISP is blocking 
> trafifc to port 25.  This is typically done along with 
> blocking inbound 
> web traffic to port 80, and I notice you are using port 8080 
> to forward 
> to your internal web server, but have still opened port 80 to 
> the world 
> (perhaps from a previous unsuccessful attempt to port-forward 
> normal web 
> traffic?).

I need to look at two internal web sites for administrative purposes.
There's one at port 80- that's the weblet page of the Dachstein firewall and
the other at port 8080 is a web server that displays the output of our
internal network monitoring software.

>  Regardless, post the requested "net ipfilter list" output 
> for debugging, along with the results of the above tests if you can't 
> get things working.  Some details about your ISP (including 
> where your 
> are, as folks like RoadRunner and Cox do things differently 
> in different 
> cities) would also help.

For almost 2 years, we've used TelePacific, a telecommunications provider
with full ISP functions. We currently use a fractional T-1 link. We've never
had a problem with them when it comes to providing full ISP functionality.

I'm thinking there *has* to be a misconfiguration of the firewall. The
question is where do I go from here? All I have on the firewall is dnscache,
tinydns, weblet, and sshd besides the usual Dachstein files.

Thanks for the reply, Charles.

~Doug


-------------------------------------------------------
This SF.NET email is sponsored by:
SourceForge Enterprise Edition + IBM + LinuxWorld = Something 2 See!
http://www.vasoftware.com
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to