Re: iptables is like alchemy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Jan 2, 2013 at 6:13 PM, Jorge Fábregas wrote:

Please elaborate more.

I'll try.
 
Why does 192.168.0.35 perform DNS queries
against the "external interface" of the firewall? Why not use the
internal ip?

It doesn't.

I'll try to be more specific:

There are at least four machines in this picture.

"Portal" is our company's gateway between the wide internet and the local LAN. It handles a number of services and also runs bind.

"Machine35" is a server on the local LAN.

"Server2" is another server (not yet mentioned) which sits parallel to portal and is connected only to the internet. Server2 has portal as it's only nameserver, so accessing server2 by name is only possible if portal is online and running bind.

Now the task I've been unhappily given is to allow ssh access to 35 directly from some other machine accessing from the internet. Call this machine "Developer".

The closest I've come to doing this is the rule that I posted originally. After executing that rule and no other, Developer is able to initiate a ssh connection to portal:20022 and directly log in to machine35. Beautiful. Except now, nobody can access server2 because the DNS query times out. That and the boss complains about IMAP access to portal from the outside stops working, which I figure is the same problem.

Anyway, the rule I posted is the only rule in use here. I have tried other iterations that did involve a MASQUERADE rule, but they didn't work either. Like I said, I've been scouring google to solve this for a long time.

So my question is sort of multi-faceted:

If the rule I posted can't work without an attendant MASQUERADE rule then why did it work? I'm certain it was the only rule in effect (aside from the normal rules always effective) when I tested connectivity.

Why did my rule cause other services to be blocked? I don't see anything about it that should have had that effect.

Finally, what *should* I do to make this work?

If you manually perform dig @192.168.0.1 google.com  (I
assume that's your firewall ip) from 192.168.0.35, does it work?   Did
you create the corresponding MASQUERADE rule (under POSTROUTING) for the
egress traffic coming from 192.168.0.35?  I believe so , otherwise you
wouldn't have been able to connect from the outside to 20022.

Please post your rules if you want more detailed help.  I really don't
see any relationship with what you describe & DNS problems.

Neither do I, and that's a big part of my problem.

Thanks for being patient with my ignorance.

-Alan
-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux