I just picked a few points to highlight in your script.
#Point this to your copy of ip_tables
IPC="/sbin/ipchains"
[snip]
> #Accept ourselves
> $IPC -A input -s 127.0.0.1/32 -d 127.0.0.1/32 -j ACCEPT
NOTE: The loopback interface accepts 127.0.0.0/8. Use the following
rules instead:
$IPC -A input -i lo -j ACCEPT
# since you just accepted anything that should be coming into the
loopback device
# anything that triggers the following rule must be bogus
$IPC -A input -s 127.0.0.0/8 -b -j firewall
[snip]
And this is why your pings time out. For future reference: use ipchains
reporting options to see which rules are being hit --> If you ping and
then type ipchains -nvL input, you will see that this rule is getting
hits. You need to be less restrictive, so try it this way:
$IPC -A input -i ppp0 -p icmp --source-port 0 --destination-port 0 -j
ACCEPT
$IPC -A input -i ppp0 -p icmp -j firewall
[snip]
I would add these two rules. They ought to help keep portscans of your
box from being as fruitful.
$IPC -A input -i ppp0 -p tcp -d ! 1024:65535 -j firewall
$IPC -A input -i ppp0 -p udp -d ! 1024:65535 -j firewall
$IPC -A input -i eth0 -s 192.168.1.0/24 -d 0.0.0.0/0 -j ACCEPT
$IPC -A input -p tcp --syn -j firewall
$IPC -A input -p udp -j ACCEPT
And finally add this at the end
$IPC -A input -i eth0 -p icmp -j ACCEPT
Good luck and may the source be with you!
- Bob Glover
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list