Re: Kazaa Ports

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--- Jeffrey Laramie <JALaramie@xxxxxxxxxxxxxxxxxxx> wrote:
> 
> 
> SBlaze wrote:
> 
> >--- Jeffrey Laramie <JALaramie@xxxxxxxxxxxxxxxxxxx> wrote:
> >  
> >
> >>Hi All,
> >>
> >>I am trying to provide a modest amount of security for a home LAN using 
> >>NAT and filtering. My family insists on using Kazaa Lite on their 
> >>Windows boxes (aaahhh!!).
> >>
> >>My (other) problem is that Kazaa insists on using sequential source 
> >>ports and seemingly random destination ports to make connections. I 
> >>already have a rule to allow ESTABLISHED,RELATED through, but these 
> >>packets must be new connections (connecting to supernodes maybe?). No 
> >>matter how many ports I open I can't seem to open enough ports to make 
> >>it run.
> >>
> >>I'm rapidly becoming unpopular in my house. Any ideas how I can make 
> >>Kazaa Lite work and still maintain some security? Are these mutually 
> >>exclusive goals?
> >>
> >>Jeff
> >>
> >>
> >>    
> >>
> >
> >Are you using NAT? This is probably your best soloution.
> >  
> >
> I use SNAT. Here is the rule:
> 
> iptables -t nat -A POSTROUTING -o $Net_Interface -j SNAT --to $Net_IP
> 
> My default policy on the filter FORWARD chain is drop, so any required ports
> have to have an ACCEPT rule for in order for services to work. In this case,
> Kazaa expects to have an unknown (large) number of ports open LAN->Net and it
> fails when it finds a blocked port.
> 
> I can make it work if I stop filtering outbound traffic, but I found a worm
> last month by checking unauthorized outbound traffic and I'm reluctant to
> give up that extra security.
> 
> Jeff
> 
> 
> 
Assuming that you are running the Kazza on a Internal windows machine the
POSTROUTING should handle all of the out going of the Kazza Client...

what is probably not making it through is the returning connection attempts of
the Kazza servers? In which case... you shouldn't be using FORWARD lines at all
sinnce these are supposedly destined for the local machine(as in the Linux box
itself and not anything in your lan). What I think is needed here is the
PREROUTING of a range or specific ports. I think this will solve your problem
for Kazza but it offers very little as in the way of security for those ports.

An example of this is when I used to run my Half-Life Deadicated Server on my
internal Windows Machine I used a PREROUTING line such as...

iptables -t nat -A PREROUTING -p udp --dport 27015 -i eth0 -j DNAT
--to-destination 192.168.1.25:27015

While my scenerio was alot simpler than yours it's similar I think. Your
problem will be of course finding the range of ports. I would also say take
note of the use of limiting it to one protocol(if you can). Better to have a
straw open to the world than a big ol sewer pipe!

Hope this helps
SBlaze

=====
"Winky is not knowing how sir, winky is not knowing how?" -=Winky / Harry Potter and the Goblet of Fire=-"

__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux