At 12:48 am, Sunday, March 23 2003, t mumbled:
> iptables -A OUTPUT -p tcp -o eth0  --dport 5100 -j ACCEPT
> iptables -A OUTPUT -p udp -o eth0  --dport 5100 -j ACCEPT
> iptables -A OUTPUT -p tcp -o eth0  --sport 5100 -j ACCEPT
> iptables -A OUTPUT -p udp -o eth0  --sport 5100 -j ACCEPT
> iptables -A INPUT -p tcp   --dport 5100 -j ACCEPT
> iptables -A INPUT -p udp   --dport 5100 -j ACCEPT
> iptables -A INPUT -p tcp   --sport 5100 -j ACCEPT
> iptables -A INPUT -p udp  --sport 5100 -j ACCEPT
> 
Personally, I wouldn't do that. I have a Linux firewall with iptables, and
my 2 sisters connect to MSN Messanger just fine, and I haven't allowed any
special ports inbound. What I do is use connection tracking, like so:

iptables -A INPUT -i ppp0 -m state --state RELATED,ESTABLISHED -j ACCEPT 
iptables -A FORWARD -o ppp0 -m state --state NEW,RELATED,ESTABLISHED -j
ACCEPT 

Stateful firewall inspection, like that above, is much better than opening
up ports in the config, like you had to do with ipchains.

Cheers,
-- 
                                           Steve
> Whatever happened to all the Debian evangelists?
I ate them.
                                        -- Andrew Suffield
-- 
SLUG - Sydney Linux User's Group - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug

Reply via email to