> -----Original Message----- > From: netfilter-admin@xxxxxxxxxxxxxxxxxxx > [mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx] On Behalf Of Budai Laszlo > Sent: Friday, March 28, 2003 8:41 AM > To: netfilter@xxxxxxxxxxxxxxxxxxx > Subject: ip_conntrack_ftp problem > > > > > we use Redhat Linux 8 to connect our lan to the internet. > Internally we > are using private addresses which are SNAT-ed (MASQUERADE) by > the linux box. > > We set up a firewall which in the forward chain looks like: > > Chain FORWARD (policy ACCEPT) > target prot opt source destination > ACCEPT all -- anywhere anywhere > state RELATED > ACCEPT tcp -- 192.168.101.25 anywhere > tcp dpt:telnet > ACCEPT tcp -- 192.168.101.24 anywhere > tcp dpt:telnet > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:ldap > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:imap > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:rtsp > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:cvspserver > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:cvspserver > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:5190 > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:squid > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:https > ACCEPT udp -- 192.168.101.0/24 anywhere > udp dpt:domain > ACCEPT udp -- 192.168.101.0/24 anywhere > udp dpt:7070 > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:7070 > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:https > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:5050 > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:pop3 > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:http > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:domain > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:smtp > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:ssh > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:ftp > ACCEPT tcp -- 192.168.101.0/24 anywhere > tcp dpt:ftp-data > DROP tcp -- 192.168.101.0/24 anywhere > > > so we try to limit the access just to a few accepted services. We are > loading the ip_conntrack_ftp and ip_nat_ftp modules: > > # lsmod > Module Size Used by Not tainted > ipt_state 1080 1 (autoclean) > cls_u32 6332 2 (autoclean) > sch_cbq 14912 2 (autoclean) > ip_nat_ftp 4240 0 (unused) > ip_conntrack_ftp 5088 0 (unused) > eepro100 22264 1 > 8139too 17736 1 > mii 2156 0 [8139too] > iptable_mangle 2776 1 (autoclean) > ipt_MASQUERADE 2200 0 (autoclean) > ipt_REDIRECT 1368 3 (autoclean) > iptable_nat 19960 2 (autoclean) [ip_nat_ftp > ipt_MASQUERADE ipt_REDIRECT] > ip_conntrack 21244 3 (autoclean) [ipt_state > ip_nat_ftp ip_conntrack_ftp ipt_MASQUERADE ipt_REDIRECT iptable_nat] > iptable_filter 2412 1 (autoclean) > ip_tables 15224 8 [ipt_state iptable_mangle > ipt_MASQUERADE ipt_REDIRECT iptable_nat iptable_filter] > mousedev 5524 0 (unused) > keybdev 2976 0 (unused) > hid 22244 0 (unused) > input 5920 0 [mousedev keybdev hid] > usb-uhci 26188 0 (unused) > usbcore 77024 1 [hid usb-uhci] > ext3 70336 3 > jbd 52212 3 [ext3] > sym53c8xx 68240 4 > sd_mod 13552 8 > scsi_mod 107176 2 [sym53c8xx sd_mod] > > > but ftp trough the firewall still does not work. :( > what is wrong? > > Thanks, > Laszlo > I'm sure that active ftp works. Active FTP uses port TCP/20 for data channel. Passive ftp uses > TCP/1023 So Active FTP uses TCP port 21 and 20 Passive FTP uses TCP port 21 and > 1023 /Klintan