RE: iptables and pop3 lockup

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Um, have you tried adding a log statement before the drop to see what is
being caught? 

Try adding the following right before the reject rule.

-A RH-Firewall-1-INPUT -j LOG --log-prefix "FIREWALL: " --log-level 1

Then tail the log while trying to make a pop3 connection to it.  

> -----Original Message-----
> From: netfilter-bounces@xxxxxxxxxxxxxxxxxxx [mailto:netfilter-
> bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Bowie Bailey
> Sent: Tuesday, May 16, 2006 9:56 AM
> To: Netfilter List (E-mail)
> Subject: iptables and pop3 lockup
> 
> I am having a problem implementing iptables with Courier's pop3
> server.  If I disable iptables, everything works fine.  As soon as I
> enable it, pop3 will stop working for messages over 32K.  Small
> messages will go through with no problems, but large ones will time
> out.
> 
> I get this message from OE: "Your POP3 server has not responded in 60
> seconds."  And an option to stop or continue waiting.  I can wait as
> long as I want, but it will not download the message.
> 
> This problem only exists with connections coming from outside our
> network.  Connections from within the network can download large
> messages with no problems.
> 
> Has anyone seen this before?  I would like to implement iptables for
> more security, but I can't do it if this problem persists.
> 
> My server is:
>     P4 2.8, 1GB RAM
>     CentOS 4.3 (fully patched)
>     Courier 0.53.1
> 
> My iptables rules were initially created with
> system-config-securitylevel and then modified from there.  The current
> rules are:
> 
> Chain INPUT (policy ACCEPT)
>  target               prot opt in  out  source     destination
>  RH-Firewall-1-INPUT  all  --  *   *    0.0.0.0/0  0.0.0.0/0
> 
> Chain FORWARD (policy ACCEPT)
>  target               prot opt in  out  source     destination
>  RH-Firewall-1-INPUT  all  --  *   *    0.0.0.0/0  0.0.0.0/0
> 
> Chain OUTPUT (policy ACCEPT)
>  target  prot opt in  out  source         destination
> 
> Chain RH-Firewall-1-INPUT (2 references)
>  target  prot opt in  out  source         destination
>  ACCEPT  all  --  lo  *    0.0.0.0/0      0.0.0.0/0
>  ACCEPT  icmp --  *   *    0.0.0.0/0      0.0.0.0/0  icmp type 255
>  ACCEPT  all  --  *   *    0.0.0.0/0      0.0.0.0/0  state
> RELATED,ESTABLISHED
>  ACCEPT  tcp  --  *   *    0.0.0.0/0      0.0.0.0/0  state NEW tcp
dpt:25
>  ACCEPT  tcp  --  *   *    0.0.0.0/0      0.0.0.0/0  state NEW tcp
dpt:110
>  ACCEPT  tcp  --  *   *    0.0.0.0/0      0.0.0.0/0  state NEW tcp
dpt:53
>  ACCEPT  udp  --  *   *    0.0.0.0/0      0.0.0.0/0  state NEW udp
dpt:53
>  ACCEPT  tcp  --  *   *    0.0.0.0/0      0.0.0.0/0  state NEW tcp
dpt:587
>  ACCEPT  tcp  --  *   *    0.0.0.0/0      0.0.0.0/0  state NEW tcp
dpt:80
>  ACCEPT  tcp  --  *   *    172.16.0.0/16  0.0.0.0/0  state NEW tcp
dpt:22
>  ACCEPT  tcp  --  *   *    0.0.0.0/0      0.0.0.0/0  state NEW tcp
dpt:443
>  ACCEPT  tcp  --  *   *    0.0.0.0/0      0.0.0.0/0  state NEW tcp
dpt:995
>  REJECT  all  --  *   *    0.0.0.0/0      0.0.0.0/0  reject-with
> icmp-host-prohibited
> 
> I have found information on Google indicating that this might be a
> problem with the MTU or MSS setting, but the solutions given seemed to
> be aimed at the end user rather than the server.  I tried them anyway,
> but they didn't seem to help.
> 
> This is what was generally suggested:
> 
>     iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN \
>              -j TCPMSS --clamp-mss-to-pmtu
> 
> It didn't get any hits on the FORWARD chain.  I put it on the OUTPUT
> chain and it got some hits there, but didn't have any effect on the
> problem.  I also tried the --set-mss option with the same lack of
> results.
> 
> I appreciate any suggestions.
> 
> --
> Bowie




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux