Re: Kazaa Ports

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--- Jeffrey Laramie <JALaramie@xxxxxxxxxxxxxxxxxxx> wrote:
> Thanks for answering
> 
> >Assuming that you are running the Kazza on a Internal windows machine the
> >POSTROUTING should handle all of the out going of the Kazza Client...
> >  
> >
> 
> hmmm . . . I revised my rule set recently using the iptables tutorial  
> by Oskar Andreasson as a guide, and he recommends again doing any 
> filtering in the nat tables.
> 
You would not be doing any filtering in the nat table. You are simply passing
the packets destined for a Kazza client onto another machine and ports.
PRE/POST  ROUTING always supercede INPUT and OUTPUT filters.
>
http://iptables-tutorial.frozentux.net/chunkyhtml/traversingoftables.html#TRAVERSINGGENERAL
> 
> 
> >what is probably not making it through is the returning connection attempts
> of
> >the Kazza servers? In which case... you shouldn't be using FORWARD lines at
> all
> >sinnce these are supposedly destined for the local machine(as in the Linux
> box
> >itself and not anything in your lan).
> >
> 
> If you look further down in the link I posted, there is a diagram that 
> shows INPUT going to the localhost and the FORWARD being used for 
> packets destined for other hosts.  Hmmm again . . .  :-)

Again I don't think FORWARD is your answer here... best bet is nat (imho that
is)
> 
> > What I think is needed here is the
> >PREROUTING of a range or specific ports. I think this will solve your
> problem
> >for Kazza but it offers very little as in the way of security for those
> ports.
> >
> >An example of this is when I used to run my Half-Life Deadicated Server on
> my
> >internal Windows Machine I used a PREROUTING line such as...
> >
> >iptables -t nat -A PREROUTING -p udp --dport 27015 -i eth0 -j DNAT
> >--to-destination 192.168.1.25:27015
> >
> >While my scenerio was alot simpler than yours it's similar I think. Your
> >problem will be of course finding the range of ports. I would also say take
> >note of the use of limiting it to one protocol(if you can). Better to have a
> >straw open to the world than a big ol sewer pipe!
> >
> >  
> >
> Absolutely! That's what makes this an issue for me. I can't nail down 
> the ports Kazaa needs and the more I open up the less protection I have. 
> I need to find a better strategy and I'm open to suggestions.
> 
Ok I might can help with this... You may need something like ethereal or
ettercap fired up on your internal device (eth1 I'm guessing?) As the requests
go out you should be able to view source and destination ips/ports. An even
simpler method that might work is fire up Kazza and do a netstat -a from a
DOS/CMD window. mayb a netstat -al too.

> Jeff
> 
> 


=====
"Winky is not knowing how sir, winky is not knowing how?" -=Winky / Harry Potter and the Goblet of Fire=-"

__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux