On Fri, Jul 27, 2001 at 10:39:38AM +1000, Jonathan Benson wrote:
> Jack Bowling wrote:
> 
> > Try the following lines instead of the above:
> >
> > #FTP Data fix
> > $IPT  -A INPUT -p tcp --sport 20 --dport 1023:65535 ! --syn -m state --state
> > RELATED -j ACCEPT
> > $IPT  -A INPUT -p tcp -m state --state ESTABLISHED -j ACCEPT
> > $IPT  -A INPUT -p udp -s 0/0 -d $NET --dport 1023:65535 -j ACCEPT
> 
> This would be a BAD idea.  It's letting ANY udp packet destined for a high port
> through by the looks of it.
> 
> I'd prefer to have things working the way they should then open up holes in my
> firewall.

Have you tried both:

ip_conntrack_ftp
ip_nat_ftp

This works fine for me. Connection tracking handles it fine without
any special firewall rules. Sorry if this has come up, but I missed
first part of thread. I butted my head over this for a while.

-- 
Hal B
 [EMAIL PROTECTED]
 [EMAIL PROTECTED]
 [EMAIL PROTECTED]
 Spamtrap: [EMAIL PROTECTED] and [EMAIL PROTECTED]
--



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to