Re: iptables settings for X11 forwarding in CentOS 6.2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Fri, Mar 29, 2013 at 11:34 AM, Pat Haley <phaley@xxxxxxx> wrote:

>
> Hi,
>
> We recently installed CentOS 6.2 on our cluster.  During
> the installation/debugging of various secondary software, we had
> disabled iptables.  When we re-enabled them, we found that the
> front-end would no longer X11 forward (although it does so
> when the iptables are off).  What do we need to set in the
> iptables to permit X11 forwarding?  Currently we're using
>

[Based on the port numbers below] You're talking about XDMCP and not SSH
X11 forwarding -- correct?

I bumped into this [0] but don't have any XDMCP setups to test with.  You
have most of the recommended ports allowed given your rules.

Might help:
"If you are using Gnome open up TCP ports 16001 and TCP 35091 in both
directions." [0]


[0] http://www.starnet.com/xwin32kb/What_ports_need_to_be_opened_for_XDMCP
[1] http://www.tldp.org/HOWTO/html_single/XDMCP-HOWTO/#PREP


Consider running tcpdump on the proper interface with the firewall disabled
for a moment to get an idea of what happens when things work.


>
>
> iptables -P INPUT DROP
> iptables -P FORWARD DROP
> iptables -P OUTPUT ACCEPT
>
> iptables -A INPUT -m limit --limit 15/minute -j LOG --log-level 7
> --log-prefix "Dropped by firewall: "
>
> iptables -A INPUT -i eth1 -p tcp --dport 22 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p tcp --dport 80 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p tcp --dport 8080 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p tcp --dport 6000 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p tcp --dport 6001 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p tcp --dport 6002 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p tcp --dport 6003 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p tcp --dport 6004 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p tcp --dport 6005 -m state --state
> NEW,ESTABLISHED -j ACCEPT
>

You can simplify your rule by specifying a port range instead of individual
rules:
iptables -A INPUT -i eth1 -p tcp --dport 6000:6005 -m state --state
NEW,ESTABLISHED -j ACCEPT


> iptables -A INPUT -i eth1 -p udp --dport 177 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p udp --dport 6000 -m state --state
> NEW,ESTABLISHED -j ACCEPT
> iptables -A INPUT -i eth1 -p udp -m state --state ESTABLISHED,RELATED -j
> ACCEPT
> iptables -A INPUT -i eth1 -p tcp -m state --state ESTABLISHED,RELATED -j
> ACCEPT
>
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> Pat Haley                          Email:  phaley@xxxxxxx
> Center for Ocean Engineering       Phone:  (617) 253-6824
> Dept. of Mechanical Engineering    Fax:    (617) 253-8125
> MIT, Room 5-213                    http://web.mit.edu/phaley/www/
> 77 Massachusetts Avenue
> Cambridge, MA  02139-4301
> _______________________________________________
> CentOS mailing list
> CentOS@xxxxxxxxxx
> http://lists.centos.org/mailman/listinfo/centos
>



-- 
---~~.~~---
Mike
//  SilverTip257  //
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux