Re: [gentoo-user] Re: OT: iptables mac filtering

2006-08-11 Thread Richard Fish

On 8/10/06, James [EMAIL PROTECTED] wrote:

I need a rule on the 3 (nic) interface firewall so that only
ssh from the LAN is allowed to the firewall or sytems (web
server, mail dns) in the DMZ. Only one static ip is routable
to this site. SSH from the outside should be completely blocked.

Any ideas, examples or thoughts?


Just I guess as I haven't tried this:

---
IF_INTERNET=eth0
IF_DMZ=eth1
IF_LAN=eth2

# allow ssh connections from LAN to us
iptables -A INPUT -i $IF_LAN -p tcp --dport 22 -j ACCEPT
# allow routing of ssh connections from LAN to DMZ hosts
iptables -A FORWARD -i $IF_LAN -o $IF_DMZ -p tcp --dport 22 -j ACCEPT
# deny all other ssh connections
iptables -A INPUT -p tcp --dport 22 -j DROP
iptables -A FORWARD -p tcp --dport 22 -j DROP
---

HTH,
-Richard
--
gentoo-user@gentoo.org mailing list



[gentoo-user] Re: OT: iptables mac filtering

2006-08-11 Thread James
Richard Fish bigfish at asmallpond.org writes:

  I need a rule on the 3 (nic) interface firewall so that only
  ssh from the LAN is allowed to the firewall or sytems (web
  server, mail dns) in the DMZ. Only one static ip is routable
  to this site. SSH from the outside should be completely blocked.

 # allow ssh connections from LAN to us
 iptables -A INPUT -i $IF_LAN -p tcp --dport 22 -j ACCEPT
 # allow routing of ssh connections from LAN to DMZ hosts
 iptables -A FORWARD -i $IF_LAN -o $IF_DMZ -p tcp --dport 22 -j ACCEPT
 # deny all other ssh connections
 iptables -A INPUT -p tcp --dport 22 -j DROP
 iptables -A FORWARD -p tcp --dport 22 -j DROP


Richard,

These rules worked like a charm. I had something similar, but had
the syntax messed up.
thx.

Now I have ONE big problem.
Spammers. (I think).

Running a sniffer between my firewall and the cable box's
ethernet (single static IP),
I see:

hackIP   myIP  TCP   smtp  55634 (RST,ACK) Seq=0 ACK=1 WIN=0 LEN=0 MSS=1460
myIP hackIPTCP   55634  smtp  (SYN) Seq=0 ACK=1 WIN=0 LEN=0
hackIP   myIP  TCP   smtp  55634 (RST,ACK) Seq=0 ACK=1 WIN=0 LEN=0 MSS=1460
myIP hackIPTCP   55634  smtp  (SYN) Seq=0 ACK=1 WIN=0 LEN=0
hackIP   myIP  TCP   smtp  55634 (RST,ACK) Seq=0 ACK=1 WIN=0 LEN=0 MSS=1460
myIP hackIPTCP   55634  smtp  (SYN) Seq=0 ACK=1 WIN=0 LEN=0

Last night I saw this for a while and then a storm of smtp traffic.
This site does not even run a mail server and all systems where 
shutdown except for the firewall and the sniffer.

This explains why this site is listed as a spammer site...
Somebody has been reflecting email off of this site for some time,
I suspect.

Got any idea for a (iptables) syntax to stop this?   Do I need to
reinstall the sysetm (gentoo-hardened firewall)???

thoughts and ideas are welcome.

-- 
gentoo-user@gentoo.org mailing list



[gentoo-user] Re: OT: iptables mac filtering

2006-08-11 Thread James
Richard Fish bigfish at asmallpond.org writes:


 On 8/11/06, James wireless at tampabay.rr.com wrote:
  myIP hackIPTCP   55634  smtp  (SYN) Seq=0 ACK=1 WIN=0 LEN=0
  hackIP   myIP  TCP   smtp  55634 (RST,ACK) Seq=0 ACK=1 WIN=0 LEN=0 MSS=1460

 Assuming you haven't mixed up the myIP and hackIP parts, this means
 something on *your* system/network is trying to contact an smtp server
 on what you are calling hackIP.  TCP/IP connections are initiated with
 a SYN packet.  If they are accepted, you get a SYN,ACK packet back.
 If they are rejected, you get a RST,ACK back.

Sorry, I transposed the entries. From Wireshark I took my time to copy 
more accurately
:
Source   dest.proto  info
24.199.244.157   myIP  TCP   55634  smtp  (SYN) Seq=0 Len=0 MSS=1460
myIP   24.199.244.157  TCP   smtp  55634  (RST,ACK) Seq=0 Ack=1 Win=0 Len=0

 Running 'host hackIP' might prove enlightening.

# host 24.199.244.157
157.244.199.24.in-addr.arpa domain name pointer
rrcs-24-199-244-157.midsouth.biz.rr.com.


Remember, the entire network, except the firewall was physically
disconnected.  I did not save the Wireshark session at that time,

The lines above seen today, look very similar to the 
packet storm the session last night.

However, I'll try to save it, the next time it explodes. The 
lines above are merely suspicious to me.
It does look like part of RoadRunner, but last night the 
spam was in high gear, until I shut down the link

thoughts?


James



-- 
gentoo-user@gentoo.org mailing list