Re: Is this firewall good enough?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--- Feizhou <feizhou@xxxxxxxxxxxxx> wrote:
> Antony Stone wrote:
> > How do you recommend dealing with reply packets
> instead?
> 
> I would create multiple chains
> 
> iptables -N tcp_packets and so on.
> 
> So to avoid loading the connection tracking module,
> I would put rules to 
> handle return packets in the proper chain.
> 
> eg: iptables -A tcp_packets -p tcp --sport
> 1024:65535 --dport 80 -j ACCEPT
> 
Do we have to worry at all on --sport? Our concern is
our server ports only, isn't it?

Don't we have to include --syn in above rule?

How do we accept udp connection requests on a given
destination port(ie. equivalent to --syn)?

> Then i put tcp/udp/icmp packets to the proper chain
> 
> eg: iptables -A INPUT -p tcp -j tcp_packets
> 
> You could make a catch all for return packets like:
> 
> iptables -A INPUT -p tcp ! --syn -j ACCEPT
> 
Can we consider it is either ESTABLISHED or RELATED
any packet other than --syn packet receiving on INPUT
chain?  Or how do we write rule/s equivalent to
ESTABLISHED and RELATED?

Appreciate your comment on this issue.

Sagara


	
		
__________________________________
Do you Yahoo!?
Friends.  Fun.  Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/ 


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux