On 25/10/07 22:05, Wayne Betts wrote:
In the distant past, I used to add several ACCEPT rules for afs in ipchains or iptables when using openafs clients. But somewhere in time I stopped doing this (not conciously -- it just slipped my mind when making my checklist at some point), yet I've never noticed a problem while using the default iptables rules that end with a default REJECT in my SL installations. I've gotten a couple bits of different advice from individuals and the web (for instance: http://help.unc.edu/?id=5513 ) indicating that I need firewall rules in place, but they don't all seem to quite match up and I'm not familiar enough with afs and/or kerberos communications to know what's really necessary.

So, first the short question: should I be adding firewall rules when using SL 3/4/5 with the SL openafs-client packages?

If yes, then a medium (?) question:  what rules should I add?
If you are just collecting answers:

We open up port 7001/udp into the client, supposedly the AFS cache manager sits there and will occasionally receive callbacks from the AFS servers. Other communications should be handled by the default "ESTABLISHED,RELATED" logic.

Long (?) question: How can I demonstrate a failure if I don't have the firewall rules in place? A related question -- why haven't I noticed a problem before?

Just guessing (ask the Openafs gurus for details), but failure to contact a client (cache) should trigger some timeout-based protocol to establish who has the "correct" version, i.e. more overhead, and the occasional lost update.

Reply via email to