I just picked a few points to highlight in your script.

#Point this to your copy of ip_tables
IPC="/sbin/ipchains"

[snip]

> #Accept ourselves
> $IPC -A input -s 127.0.0.1/32 -d 127.0.0.1/32 -j ACCEPT
NOTE: The loopback interface accepts 127.0.0.0/8.  Use the following
rules instead:

$IPC -A input -i lo -j ACCEPT
# since you just accepted anything that should be coming into the
loopback device
# anything that triggers the following rule must be bogus
$IPC -A input -s 127.0.0.0/8 -b -j firewall

[snip]

And this is why your pings time out.  For future reference: use ipchains
reporting options to see which rules are being hit --> If you ping and
then type ipchains -nvL input, you  will see that this rule is getting
hits.  You need to be less restrictive, so try it this way:
$IPC -A input -i ppp0 -p icmp --source-port 0 --destination-port 0 -j
ACCEPT
$IPC -A input -i ppp0 -p icmp -j firewall

[snip]

I would add these two rules.  They ought to help keep portscans of your
box from being as fruitful.
$IPC -A input -i ppp0 -p tcp -d ! 1024:65535 -j firewall
$IPC -A input -i ppp0 -p udp -d ! 1024:65535 -j firewall

$IPC -A input -i eth0 -s 192.168.1.0/24 -d 0.0.0.0/0 -j ACCEPT
$IPC -A input -p tcp --syn -j firewall
$IPC -A input -p udp -j ACCEPT

And finally add this at the end
$IPC -A input -i eth0 -p icmp -j ACCEPT

Good luck and may the source be with you!
- Bob Glover



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to