Hi all,

I'm seeing these messages in my logs:

<..snip..>
Apr 25 14:07:30 firewall Shorewall:all2all:REJECT: IN=tun0 OUT= MAC=
SRC=10.8.0.14 DST=192.168.1.254 LEN=89 TOS=18 PREC=0x00 TTL=255 ID=41848 CE
PROTO=UDP SPT=5353 DPT=53 LEN=69 
Apr 25 14:07:44 firewall Shorewall:all2all:REJECT: IN=tun0 OUT= MAC=
SRC=10.8.0.14 DST=192.168.1.254 LEN=89 TOS=18 PREC=0x00 TTL=255 ID=41851 CE
PROTO=UDP SPT=5353 DPT=53 LEN=69 
Apr 25 14:07:44 firewall Shorewall:all2all:REJECT: IN=tun0 OUT= MAC=
SRC=10.8.0.14 DST=192.168.1.254 LEN=89 TOS=18 PREC=0x00 TTL=255 ID=41853 CE
PROTO=UDP SPT=5353 DPT=53 LEN=69 
Apr 25 14:07:44 firewall Shorewall:all2all:REJECT: IN=tun0 OUT= MAC=
SRC=10.8.0.14 DST=192.168.1.254 LEN=89 TOS=18 PREC=0x00 TTL=255 ID=41855 CE
PROTO=UDP SPT=5353 DPT=53 LEN=69 
Apr 25 14:07:44 firewall Shorewall:all2all:REJECT: IN=tun0 OUT= MAC=
SRC=10.8.0.14 DST=192.168.1.254 LEN=89 TOS=18 PREC=0x00 TTL=255 ID=41857 CE
PROTO=UDP SPT=5353 DPT=53 LEN=69 
Apr 25 14:07:44 firewall Shorewall:all2all:REJECT: IN=tun0 OUT= MAC=
SRC=10.8.0.14 DST=192.168.1.254 LEN=89 TOS=18 PREC=0x00 TTL=255 ID=41859 CE
PROTO=UDP SPT=5353 DPT=53 LEN=69 
Apr 25 14:07:44 firewall Shorewall:all2all:REJECT: IN=tun0 OUT= MAC=
SRC=10.8.0.14 DST=192.168.1.254 LEN=89 TOS=18 PREC=0x00 TTL=255 ID=41861 CE
PROTO=UDP SPT=5353 DPT=53 LEN=69 
<..snip..>

This occurs each time an OpenVPN client attempts to access the internal M$
Exchange server with his Mac Classic 8.2.1 Outlook running in Classic
Environment on his Mac OS X laptop. I've modified the /etc/hosts file so
that the internal mail server is referenced by its internal IP address- dhcp
options are not pushed to non-Windows clients (not without getting into the
nitty-gritty). I can ping the mail server via vpn with either the domain
name or the IP address.

I'm running Bering uClibc 2.4 RC2. What I've done to Shorewall:

I've added to /etc/shorewall/zones:

  vpn   VPN     Remote Subnet

Added to /etc/shorewall/interfaces:

  vpn tun0

Added to /etc/shorewall/policy

  loc   vpn ACCEPT
  vpn loc ACCEPT

Added to /etc/shorewall/tunnels:

  openvpn       net 0.0.0.0/0
  openvpn:udp:1195      net     0.0.0.0/0

I've also added the following to /etc/shorewall/rules:

  #       VPN DNS Access to/from local/firewall DNS server

  ACCEPT          loc             vpn                     tcp     53

  ACCEPT          loc             vpn                     udp     53

  ACCEPT          vpn             loc                     tcp     53

  ACCEPT          vpn             loc                     udp     53

  ACCEPT          fw              vpn                     tcp     53

  ACCEPT          fw              vpn                     udp     53

  ACCEPT          vpn             fw                      tcp     53

  ACCEPT          vpn             fw                      udp     53

  #                                                                      


Output of restarting Shorewall as follows:

firewall# /etc/init.d/shorewall restart
Loading /usr/share/shorewall/functions...
Processing /etc/shorewall/params ...
Processing /etc/shorewall/shorewall.conf...
Restarting Shorewall...
Initializing...
Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Not available
   Connection Tracking Match: Not available
   Packet Type Match: Available
   Policy Match: Not available
   Physdev Match: Not available
   IP range Match: Not available
   Recent Match: Available
   Owner Match: Not available
   Ipset Match: Not available
   ROUTE Target: Not available
   Extended MARK Target: Not available
   CONNMARK Target: Not available
   Connmark Match: Not available
   Raw Table: Not available
Determining Zones...
   Zones: net loc dmz vpn
Validating interfaces file...
Validating hosts file...
Validating Policy file...
Determining Hosts in Zones...
   Net Zone: eth0:0.0.0.0/0
   Local Zone: eth1:0.0.0.0/0
   DMZ Zone: eth2:0.0.0.0/0
   VPN Zone: tun+:0.0.0.0/0
Processing /etc/shorewall/init ...
Pre-processing Actions...
   Pre-processing /usr/share/shorewall/action.DropSMB...
   Pre-processing /usr/share/shorewall/action.RejectSMB...
   Pre-processing /usr/share/shorewall/action.DropUPnP...
   Pre-processing /usr/share/shorewall/action.RejectAuth...
   Pre-processing /usr/share/shorewall/action.DropPing...
   Pre-processing /usr/share/shorewall/action.DropDNSrep...
   Pre-processing /usr/share/shorewall/action.AllowPing...
   Pre-processing /usr/share/shorewall/action.AllowFTP...
   Pre-processing /usr/share/shorewall/action.AllowDNS...
   Pre-processing /usr/share/shorewall/action.AllowSSH...
   Pre-processing /usr/share/shorewall/action.AllowWeb...
   Pre-processing /usr/share/shorewall/action.AllowSMB...
   Pre-processing /usr/share/shorewall/action.AllowAuth...
   Pre-processing /usr/share/shorewall/action.AllowSMTP...
   Pre-processing /usr/share/shorewall/action.AllowSubmission...
   Pre-processing /usr/share/shorewall/action.AllowPOP3...
   Pre-processing /usr/share/shorewall/action.AllowICMPs...
   Pre-processing /usr/share/shorewall/action.AllowIMAP...
   Pre-processing /usr/share/shorewall/action.AllowTelnet...
   Pre-processing /usr/share/shorewall/action.AllowVNC...
   Pre-processing /usr/share/shorewall/action.AllowVNCL...
   Pre-processing /usr/share/shorewall/action.AllowNTP...
   Pre-processing /usr/share/shorewall/action.AllowNTPbrd...
   Pre-processing /usr/share/shorewall/action.AllowRdate...
   Pre-processing /usr/share/shorewall/action.AllowNNTP...
   Pre-processing /usr/share/shorewall/action.AllowTrcrt...
   Pre-processing /usr/share/shorewall/action.AllowSNMP...
   Pre-processing /usr/share/shorewall/action.AllowPCA...
   Pre-processing /usr/share/shorewall/action.Drop...
   Pre-processing /usr/share/shorewall/action.Reject...
Deleting user chains...
Processing /etc/shorewall/continue ...
Processing /etc/shorewall/routestopped ...
Setting up Accounting...
Creating Interface Chains...
Configuring Proxy ARP
   Host XXX.XXX.XXX.XXX connected to eth2 added to ARP on eth0
Setting up NAT...
Setting up NETMAP...
Adding Common Rules
Processing /etc/shorewall/initdone ...
Adding Anti-smurf Rules
Enabling RFC1918 Filtering
Setting up TCP Flags checking...
Setting up Kernel Route Filtering...
Setting up Martian Logging...
IP Forwarding Enabled
Processing /etc/shorewall/tunnels...
   OPENVPN tunnel to 0.0.0.0/0:udp:1194 defined.
   OPENVPN tunnel to 0.0.0.0/0:udp:1195 defined.
Processing /etc/shorewall/ipsec...
Processing /etc/shorewall/rules...
   Rule "ACCEPT fw net tcp 53" added.
   Rule "ACCEPT fw net udp 53" added.
   Rule "ACCEPT fw loc tcp 53" added.
   Rule "ACCEPT fw loc udp 53" added.
   Rule "ACCEPT fw dmz tcp 53" added.
   Rule "ACCEPT fw dmz udp 53" added.
   Rule "ACCEPT loc fw tcp 53" added.
   Rule "ACCEPT loc fw udp 53" added.
   Rule "ACCEPT dmz fw tcp 53" added.
   Rule "ACCEPT dmz fw udp 53" added.
   Rule "ACCEPT dmz loc:192.168.1.XXX tcp 53" added.
   Rule "ACCEPT dmz loc:192.168.1.XXX udp 53" added.
   Rule "ACCEPT loc fw tcp 22" added.
   Rule "ACCEPT loc dmz tcp 22" added.
   Rule "ACCEPT fw loc tcp 5900:5910" added.
   Rule "ACCEPT fw loc tcp 22" added.
   Rule "ACCEPT dmz net tcp 53" added.
   Rule "ACCEPT dmz net udp 53" added.
   Rule "ACCEPT loc vpn tcp 53" added.
   Rule "ACCEPT loc vpn udp 53" added.
   Rule "ACCEPT vpn loc tcp 53" added.
   Rule "ACCEPT vpn loc udp 53" added.
   Rule "ACCEPT fw  vpn tcp 53" added.
   Rule "ACCEPT fw  vpn udp 53" added.
   Rule "ACCEPT vpn fw  tcp 53" added.
   Rule "ACCEPT vpn fw udp 53" added.
   Rule "ACCEPT net fw icmp 8" added.
   Rule "ACCEPT loc fw icmp 8" added.
   Rule "ACCEPT dmz fw icmp 8" added.
   Rule "ACCEPT loc dmz icmp 8" added.
   Rule "ACCEPT dmz loc icmp 8" added.
   Rule "ACCEPT dmz net icmp 8" added.
   Rule "ACCEPT fw net icmp" added.
   Rule "ACCEPT fw loc icmp" added.
   Rule "ACCEPT fw dmz icmp" added.
   Rule "ACCEPT net dmz icmp 8" added.
   Rule "ACCEPT net loc icmp 8" added.
   Rule "DNAT:ULOG net loc:192.168.1.XXX:80 tcp 8080 - 216.70.XXX.XXX"
added.
   Rule "DNAT net loc:192.168.1.XXX tcp 52525" added.
   Rule "DNAT net loc:192.168.1.XXX udp 52525" added.
   Rule "DNAT net loc:192.168.1.XXX tcp smtp - 216.70.XXX.XXX" added.
   Rule "ACCEPT dmz:216.70.XXX.XXX net tcp 5999" added.
   Rule "DNAT:ULOG net loc:192.168.1.XXX tcp www - 216.70.XXX.XXX" added.
   Rule "DNAT:ULOG net loc:192.168.1.XXX tcp 443 - 216.70.XXX.XXX" added.
   Rule "REDIRECT net 80 tcp 8000 - 216.70.XXX.XXX" added.
   Rule "ACCEPT net fw tcp www" added.
   Rule "ACCEPT loc fw udp 67,68" added.
   Rule "ACCEPT:ULOG loc fw tcp 80,8080" added.
   Rule "ACCEPT dmz net tcp 80" added.
   Rule "ACCEPT dmz net tcp smtp" added.
   Rule "ACCEPT dmz loc tcp smtp" added.
   Rule "ACCEPT fw net tcp smtp" added.
   Rule "ACCEPT fw loc:192.168.1.XXX tcp smtp" added.
   Rule "ACCEPT fw net tcp time" added.
   Rule "ACCEPT fw net udp ntp" added.
   Rule "ACCEPT loc fw udp ntp" added.
   Rule "REJECT:ULOG loc net udp 1025:1031" added.
   Rule "REJECT:ULOG dmz net udp 1025:1031" added.
   Rule "ACCEPT:ULOG dmz net tcp 1024: 20" added.
   Rule "REJECT:ULOG fw net udp 1025:1031" added.
Processing Actions...
   Generating Transitive Closure of Used-action List...
Processing /usr/share/shorewall/action.Drop for Chain Drop...
   Rule "RejectAuth" added.
   Rule "dropBcast" added.
   Rule "AllowICMPs - - icmp" added.
   Rule "dropInvalid" added.
   Rule "DropSMB" added.
   Rule "DropUPnP" added.
   Rule "dropNotSyn - - tcp" added.
   Rule "DropDNSrep" added.
Processing /usr/share/shorewall/action.Reject for Chain Reject...
   Rule "RejectAuth" added.
   Rule "dropBcast" added.
   Rule "AllowICMPs - - icmp" added.
   Rule "dropInvalid" added.
   Rule "RejectSMB" added.
   Rule "DropUPnP" added.
   Rule "dropNotSyn - - tcp" added.
   Rule "DropDNSrep" added.
Processing /usr/share/shorewall/action.RejectAuth for Chain RejectAuth...
   Rule "REJECT - - tcp 113" added.
Processing /usr/share/shorewall/action.AllowICMPs for Chain AllowICMPs...
   Rule "ACCEPT - - icmp fragmentation-needed" added.
   Rule "ACCEPT - - icmp time-exceeded" added.
Processing /usr/share/shorewall/action.DropSMB for Chain DropSMB...
   Rule "DROP - - udp 135" added.
   Rule "DROP - - udp 137:139" added.
   Rule "DROP - - udp 445" added.
   Rule "DROP - - tcp 135" added.
   Rule "DROP - - tcp 139" added.
   Rule "DROP - - tcp 445" added.
Processing /usr/share/shorewall/action.DropUPnP for Chain DropUPnP...
   Rule "DROP - - udp 1900" added.
Processing /usr/share/shorewall/action.DropDNSrep for Chain DropDNSrep...
   Rule "DROP - - udp - 53" added.
Processing /usr/share/shorewall/action.RejectSMB for Chain RejectSMB...
   Rule "REJECT - - udp 135" added.
   Rule "REJECT - - udp 137:139" added.
   Rule "REJECT - - udp 445" added.
   Rule "REJECT - - tcp 135" added.
   Rule "REJECT - - tcp 139" added.
   Rule "REJECT - - tcp 445" added.
Processing /etc/shorewall/policy...
   Policy REJECT for fw to net using chain all2all
   Policy REJECT for fw to loc using chain all2all
   Policy REJECT for fw to dmz using chain all2all
      Enabled SYN flood protection
   Policy DROP for net to fw using chain net2all
      Enabled SYN flood protection
   Policy DROP for net to loc using chain net2all
      Enabled SYN flood protection
   Policy DROP for net to dmz using chain net2all
   Policy REJECT for loc to fw using chain all2all
   Policy ACCEPT for loc to net using chain loc2net
   Policy REJECT for loc to dmz using chain all2all
   Policy ACCEPT for loc to vpn using chain loc2vpn
   Policy REJECT for dmz to fw using chain all2all
   Policy REJECT for dmz to net using chain all2all
   Policy REJECT for dmz to loc using chain all2all
   Policy ACCEPT for vpn to loc using chain vpn2loc
Masqueraded Networks and Hosts:
   To 0.0.0.0/0 (all) from 192.168.1.0/24 through eth0
   To 0.0.0.0/0 (all) from 192.168.2.0/24 through eth0
Processing /etc/shorewall/tos...
Processing /etc/shorewall/ecn...
Setting up Traffic Control Rules...
   TC Rule "1:P 0.0.0.0/0 0.0.0.0/0 tcp 1720   " added
   TC Rule "1:P 0.0.0.0/0 0.0.0.0/0 tcp 15328:15338   " added
   TC Rule "1:P 0.0.0.0/0 0.0.0.0/0 udp 15328:15338   " added
   TC Rule "1:P 0.0.0.0/0 0.0.0.0/0 tcp 5190,5222,5298   " added
   TC Rule "1:P 0.0.0.0/0 0.0.0.0/0 udp 5060,5190,5220,5297,5298,5353,5678
" added
   TC Rule "1:P 0.0.0.0/0 0.0.0.0/0 udp 16384:16403   " added
   TC Rule "2:P 0.0.0.0/0 0.0.0.0/0 tcp 25   " added
   TC Rule "2:P 0.0.0.0/0 0.0.0.0/0 tcp 22   " added
   TC Rule "2:P 0.0.0.0/0 0.0.0.0/0 tcp 21   " added
   TC Rule "2:P 0.0.0.0/0 0.0.0.0/0 icmp echo-request   " added
   TC Rule "2:P 0.0.0.0/0 0.0.0.0/0 icmp echo-reply   " added
   TC Rule "3:P 0.0.0.0/0 0.0.0.0/0 all    " added
   TC Rule "4:P 0.0.0.0/0 0.0.0.0/0 ipp2p    " added
   TC Rule "4:P 0.0.0.0/0 0.0.0.0/0 tcp 52525   " added
   TC Rule "4:P 0.0.0.0/0 0.0.0.0/0 udp 52525   " added
Activating Rules...
Processing /etc/shorewall/start ...
Processing /etc/shorewall/start.d/weblet_start ...
Shorewall Restarted
Processing /etc/shorewall/started ...


What am I doing wrong?

~Doug


-------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
------------------------------------------------------------------------
leaf-user mailing list: leaf-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/leaf-user
Support Request -- http://leaf-project.org/

Reply via email to