Re: Firewall

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2010-12-06 at 21:50 +0000, Richard W.M. Jones wrote:
> Still not seeing how /etc/iptables.d wouldn't work ...

Here is how:

When I ask CUPS for a list of network printers, it runs the backends
in /usr/lib/cups/backend.  One of those is /usr/lib/cups/backend/snmp,
which:

a) binds to a local unprivileged UDP port
b) sends a broadcast SNMP request
c) listens for (unicast) responses to that request

We don't hear any of those responses because they are not recognised as
"related" by the kernel.  The iptables rules drop them.

If the CUPS snmp backend could say to "the firewall", "hey, please allow
responses on this port I've got for the next few seconds" -- which can
be controlled using PolicyKit -- then this network discovery would
finally work.

There's no way to know the local UDP port in advance
so /etc/iptables.d-like systems all fail here.

Tim.
*/

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux