Hello, I have a question, on IPTables behavior in the following scenario. I have not subscribed to the netfilter list, so please CC me when answering.
First, I am using Linux kernel version 2.4.9, and IPTables v1.2. The scenario is the following: I have a private network, with 192.168.x.x addresses, and an ADSL connection to the outside. I have configured NAT like this: Chain POSTROUTING (policy ACCEPT) target prot opt source destination ACCEPT all -- 192.168.0.0/24 192.168.0.0/24 SNAT all -- 192.168.0.0/24 0.0.0.0/0 to:10.131.80.34 Now, I am running a program which uses a TCP connection to a server. The TCP connection is from the private network to the Internet. Now, when I try to block this connection by denying all traffic from this machine's IP address to outside world, the TCP connection is still there. I have put a DENY rule both to the INPUT chain and PREROUTING chain. Is this the way it should work? I think this could be a problem with normal firewall setups in some scenarios. If there is a malicious program connected from inside network to outside world, and the connection needs to be stopped at the firewall. This looks impossible with the current software. Greetings, - Tero Kilkanen