Re: ip_conntrack_ftp issues

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Did some more tinkering around with it but had no luck. Any way for me to
specificly test the insmod commands at a granular level to see where
things are going and what is or is not being triggered?

<EOL>
Tib


On Fri, 10 Jun 2005, Tib wrote:
> I pulled off both modules and then did the following:
>
> altaica:~/iptables-boot# insmod ip_conntrack_ftp ports=21,42
> Using
> /lib/modules/2.4.20-1-686/kernel/net/ipv4/netfilter/ip_conntrack_ftp.o
> altaica:~/iptables-boot# insmod ip_nat_ftp ports=21,42
> Using /lib/modules/2.4.20-1-686/kernel/net/ipv4/netfilter/ip_nat_ftp.o
>
> And then tested by going to a remote host and logging in to the service
> and trying 'ls':
>
> 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
> 220-You are user number 1 of 3 allowed.
> 220-Local time is now 06:33. Server port: 42.
> 220-Only anonymous FTP is allowed here
> 220 You will be disconnected after 15 minutes of inactivity.
> Name (tigerknight.org:tib): anonymous
> 230-Your bandwidth usage is restricted
> 230 Anonymous user logged in
> Remote system type is UNIX.
> Using binary mode to transfer files.
> ftp> ls
> 200 PORT command successful
> 425 Could not open data connection to port 48136: Connection refused
> ftp>
>
>
> Considering I got no error messages on the insmod commands, is there just
> something else I'm missing? I have the following rules setup in my
> iptables config:
>
> iptables -A INPUT -i eth0 -m state --state ESTABLISHED,RELATED -j ACCEPT
> iptables -A INPUT -i eth0 -p tcp --destination-port 42 -j ACCEPT
> iptables -A INPUT -i eth0 -p udp --destination-port 42 -j ACCEPT
>
>
> *--edit for various other similar ports that are accepted--*
> *--and then down at the end is this--*
> iptables -A INPUT -i eth0 -p tcp -j DROP
> iptables -A INPUT -i eth0 -p udp -j DROP
>
>
> Pretty much it's setup to specificly allow only certain traffic, and
> refuse the rest - but the ip_conntrack_ftp module should be able to use
> the related/established flags to pick this up, right?


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux