/* HINT: Search archives @ http://www.indyramp.com/masq/ before posting! 
/* ALSO: Don't quote this header. It makes you look lame :-) */


[EMAIL PROTECTED] wrote:

> I have a need to get rlogin and rsh through an internal linux masquerade box to an 
>internal subnet.
> 
> The following is from the rshd and rlogind man page:
>      1.   The server checks the client's source port.  If the port is not in
>           the range 512-1023, the server aborts the connection.
> 
> So I need to keep masquereaded ports dealing with rlogin and rsh in this range and 
>not masquereaded as indicated by ipchains -L -M:
> TCP  01:38.11 192.0.2.2            efx99.turner.com     1023 (61035) -> shell.
> 
> For testing I'm using the simplest masquerade script:
> ipchains -P forward DENY
> ipchains -A forward -i eth1 -j MASQ
> echo 1 > /proc/sys/net/ipv4/ip_forward
> 
> It looks as though I need an incantation of
> ipmasqadm portfw -a .... to redirect back to the range of 512-1023 but, I'm having 
>issues.

that won't help if the rsh connections are initiated from
within the masqueraded network. it sounds like a job for
an rsh masquerading kernel module :) or an rsh proxy.

you might be able to configure/recompile the server to skip
that check. it's so insecure anyway that it won't hurt :)
(in a local net, anyway).

> Has anyone managed to get rlogin and rsh through?
> Help here is appreciated.
> 
> Sam

i'd recommend using ssh instead and installing symlinks
for all of the old commands.

raf

_______________________________________________
Masq maillist  -  [EMAIL PROTECTED]
Admin requests can be handled at http://www.indyramp.com/masq-list/ -- 
THIS INCLUDES UNSUBSCRIBING!
or email to [EMAIL PROTECTED]

PLEASE read the HOWTO and search the archives before posting.
You can start your search at http://www.indyramp.com/masq/
Please keep general linux/unix/pc/internet questions off the list.

Reply via email to