On Thu, 9 Jun 2005, CompuGenic wrote: > Even though you're using port 42, you still need to specify port 21 for > it to work correctly. > For example, "insmod ip_conntrack_ftp ports=21,42 > Also, if you don't have at least kernel 2.6.11 , you'll also need to > "insmod ip_nat_ftp ports=21,42" as well. > > I hope that helps you out. I pulled off both modules and then did the following: altaica:~/iptables-boot# insmod ip_conntrack_ftp ports=21,42 Using /lib/modules/2.4.20-1-686/kernel/net/ipv4/netfilter/ip_conntrack_ftp.o altaica:~/iptables-boot# insmod ip_nat_ftp ports=21,42 Using /lib/modules/2.4.20-1-686/kernel/net/ipv4/netfilter/ip_nat_ftp.o And then tested by going to a remote host and logging in to the service and trying 'ls': 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220-You are user number 1 of 3 allowed. 220-Local time is now 06:33. Server port: 42. 220-Only anonymous FTP is allowed here 220 You will be disconnected after 15 minutes of inactivity. Name (tigerknight.org:tib): anonymous 230-Your bandwidth usage is restricted 230 Anonymous user logged in Remote system type is UNIX. Using binary mode to transfer files. ftp> ls 200 PORT command successful 425 Could not open data connection to port 48136: Connection refused ftp> Considering I got no error messages on the insmod commands, is there just something else I'm missing? I have the following rules setup in my iptables config: iptables -A INPUT -i eth0 -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A INPUT -i eth0 -p tcp --destination-port 42 -j ACCEPT iptables -A INPUT -i eth0 -p udp --destination-port 42 -j ACCEPT *--edit for various other similar ports that are accepted--* *--and then down at the end is this--* iptables -A INPUT -i eth0 -p tcp -j DROP iptables -A INPUT -i eth0 -p udp -j DROP Pretty much it's setup to specificly allow only certain traffic, and refuse the rest - but the ip_conntrack_ftp module should be able to use the related/established flags to pick this up, right? <EOL> Tib