Have you fiddled with the firewall settings in Kazaa that supposedly let you change the outgoing port to anything you like. I have heard in cases that you can change this to, say, port 80 and suddenly everything goes (web port and all). However I have exactly the same setup with exactly the same issue and this option didnt work for me. But maybe it will for someone else. Would also like to get this solved.
Suggestions appreciated.
Cheers
From: Jeffrey Laramie <JALaramie@xxxxxxxxxxxxxxxxxxx> To: SBlaze <dagent.geo@xxxxxxxxx> CC: netfilter@xxxxxxxxxxxxxxxxxxx Subject: Re: Kazaa Ports Date: Mon, 08 Sep 2003 18:47:18 -0400
Thanks for answering
Assuming that you are running the Kazza on a Internal windows machine the POSTROUTING should handle all of the out going of the Kazza Client...
hmmm . . . I revised my rule set recently using the iptables tutorial by Oskar Andreasson as a guide, and he recommends again doing any filtering in the nat tables.
http://iptables-tutorial.frozentux.net/chunkyhtml/traversingoftables.html#TRAVERSINGGENERAL
what is probably not making it through is the returning connection attempts of
the Kazza servers? In which case... you shouldn't be using FORWARD lines at all
sinnce these are supposedly destined for the local machine(as in the Linux box
itself and not anything in your lan).
If you look further down in the link I posted, there is a diagram that shows INPUT going to the localhost and the FORWARD being used for packets destined for other hosts. Hmmm again . . . :-)
What I think is needed here is theAbsolutely! That's what makes this an issue for me. I can't nail down the ports Kazaa needs and the more I open up the less protection I have. I need to find a better strategy and I'm open to suggestions.
PREROUTING of a range or specific ports. I think this will solve your problem
for Kazza but it offers very little as in the way of security for those ports.
An example of this is when I used to run my Half-Life Deadicated Server on my
internal Windows Machine I used a PREROUTING line such as...
iptables -t nat -A PREROUTING -p udp --dport 27015 -i eth0 -j DNAT --to-destination 192.168.1.25:27015
While my scenerio was alot simpler than yours it's similar I think. Your
problem will be of course finding the range of ports. I would also say take
note of the use of limiting it to one protocol(if you can). Better to have a
straw open to the world than a big ol sewer pipe!
Jeff
_________________________________________________________________
Tired of 56k? Get a FREE BT Broadband connection http://www.msn.co.uk/specials/btbroadband