If an address is in a zone, the rules for other zones aren't applied to it.
But since in this case "sshok" is a subzone of the "net" zone, you can
use a CONTINUE in policy to ensure the rule of the parent zone (in this
case "net") are also applied to it.
So try adding the following to the policy file (before any DROPs or
REJECTs):
sshok all CONTINUE
all ssok CONTINUE
(I know I said earlier it wouldn't be needed, but since you have other
rules like the one you described, then you do need it - sorry for any
confusion)
The "all ssh CONTINUE" can help if you have rules from anything to the
"net" zone and also want it to be applied to the "sshok" zone.
As an alternative, you can explicitly allow in the rules file:
Web(ACCEPT) net,sshok fw
BTW, I would advise to have the following in the policy file as the
first entry, in any case, to ensure the firewall can freely access anything:
$FW all ACCEPT
Hope this helps.
In this case, since the ssh
On 09/10/2023 17:56, Christophe PEREZ wrote:
Hi all,
I always have problems with this and I really need your help.
I don't understand the use of dynamic zones, and I ultimately wonder if it
meets my needs or not.
It seems like the operation is exclusive and that's not what I want.
I would just like the dynamic zone to grant me additional access, without
contradicting what is configured elsewhere in rules.
If I use dynamic zone as I do it, an IP in sshok zone is ACCEPTed for port
22, BUT REJECTed for the rest, even for what is ACCEPTed for all.
Example:
-------------------------------
with:
SSH(ACCEPT) sshok fw
Web(ACCEPT) net fw
and:
# shorewall show dynamic sshok
sshok:
my_dynamic_ip
Connection from my_dynamic_ip port 22 is ACCEPTed, but ALL others ports are
closed, and connections are REJECTed
And if:
# shorewall delete sshok my_dynamic_ip
Host my_dynamic_ip deleted from to zone sshok
Web connection is ACCEPTed and of course connection from my_dynamic_ip port
22 is REJECTed.
-------------------------------
Is what I wish possible or not? And if yes, how please?
Le Sun, 08 Oct 2023 10:31:29 -0400, Christophe PEREZ a écrit :
Ok nice !
But then why isn't this what we find in the docs?
They often speeks about net:+sshok.
Here for examplehttps://shorewall.org/ipsets.html
Le dimanche 08 octobre 2023 à 04:27 +0100, Rodrigo Araujo a écrit :
Or better yet, just replace the ssh accept rule with:
SSH(ACCEPT) sshok fw
Like this you won't need that like in the policy file.
On Sun, 8 Oct 2023, 04:23 Christophe PEREZ,<ch...@novazur.fr> wrote:
Seems I just needed a line added in policy sshok all
CONTINUE
Le samedi 07 octobre 2023 à 19:24 -0400, Christophe PEREZ a écrit :
Now that I have finally managed to activate the dynamic zones, I
would like to be able to use them to allow ssh access to my FW on
the fly.
I only have one interface: eth0
zones:
fw firewall net ipv4 sshok:net
ipv4 dynamic_shared
hosts:
sshok eth0:dynamic
policy:
net all DROP info all
all REJECT info
rules:
SSH(ACCEPT) net:+sshok fw
But my access is REJECTed:
Oct 8 01:17:20 myfw kernel: [2589.152380] sshok-fw REJECT IN=eth0
OUT=
MAC=fa:16:3e:77:ac:2a:2a:9c:dc:33:c6:4b:08: 00 SRC=ssh_client_IP
DST=fw_ip LEN=60 TOS=0x00 PREC=0x00 TTL=42 ID=5951 DF PROTO=TCP
SPT=29346 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0
What is my mistake please?
_______________________________________________
Shorewall-users mailing listshorewall-us...@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users