Antony
Thanks again.
Here is my rule set... it is preceded by the usual stuff
like flushing chains, dropping certain classes of packets, etc.
These are the *only* rules with "-j ACCEPT" in my entire firewall script
and somehow DNS sneaks thru...
$PROTECTED_NETWORK = 192.168.0.0/29
$PROTECTED_NETWORK_SPACE = 192.168.0.0/16
...
# Allow all thru loopback.
$IPTABLES -t filter -A INPUT -i $LOOPBACK_INTERFACE -j ACCEPT
$IPTABLES -t filter -A OUTPUT -o $LOOPBACK_INTERFACE -j ACCEPT
# Only SSH from Internet but anything *to* Internet.
$IPTABLES -t filter -A FORWARD -i $INTERNET_INTERFACE \
-s ! $PROTECTED_NETWORK_SPACE -d $PROTECTED_PC_IP_ADDRESS \
-p tcp --dport $SSH_PORT \
-j ACCEPT
$IPTABLES -t filter -A FORWARD -o $INTERNET_INTERFACE \
-s $PROTECTED_NETWORK -d ! $PROTECTED_NETWORK_SPACE \
-j ACCEPT
# Allow all thru priviate LAN NIC.
$IPTABLES -t filter -A FORWARD -i $PROTECTED_NETWORK_INTERFACE \
-s $PROTECTED_NETWORK -d ! $PROTECTED_NETWORK_SPACE \
-j ACCEPT
$IPTABLES -t filter -A FORWARD -o $PROTECTED_NETWORK_INTERFACE \
-s ! $PROTECTED_NETWORK_SPACE -d $PROTECTED_NETWORK \
-j ACCEPT
# The usual NAT stuff here.
$IPTABLES -t nat -A PREROUTING -i $INTERNET_INTERFACE \
-s ! $PROTECTED_NETWORK_SPACE -d $INTERNET_IP_ADDRESS \
-p tcp --dport $SSH_PORT \
-j DNAT --to-destination $PROTECTED_PC_IP_ADDRESS
$IPTABLES -t nat -A POSTROUTING -o $INTERNET_INTERFACE \
-s $PROTECTED_NETWORK -d ! $PROTECTED_NETWORK_SPACE \
-j SNAT --to-source $INTERNET_IP_ADDRESS
I don't have *anything* with ESTABLISHED or RELATED that would allow
DNS to sneak in...... *but it does*!?!?!?!?
Chris
On Sat, Jun 22, 2002 at 06:38:40PM +0100, Antony Stone wrote:
> On Saturday 22 June 2002 6:30 pm, Christian Seberino wrote:
>
> > My firewall *only* forwards SSH stuff to private LAN.
> >
> > It forwards *everything* _from_ private LAN to Internet however.
> >
> > How can the private LAN use DNS which it does????
> >
> > How is DNS server returning the info thru firewall
> > if it *only* allows SSH??!?!?!?
>
> Do you have a rule allowing reply packets from, say, a website back to your
> internal clients ?
>
> Maybe:
>
> iptables -A FORWARD -i $EXTIF -m state --state RELATED,ESTABLISHED -j ACCEPT
>
> Same rule will allow replies to DNS requests.
>
> If you don't have anything like that, post your ruleset and we'll have a
> think about it.
>
>
>
> Antony.
--
_______________________________________
Dr. Christian Seberino
SPAWAR Systems Center San Diego
Code 2363
53560 Hull Street
San Diego, CA 92152-5001
U.S.A.
Phone: (619) 553-7940
Fax: (619) 553-2836
Email: [EMAIL PROTECTED]
_______________________________________