RE: iptables and pop3 lockup

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Glad to here that worked for you.  

As for getting connection tracking to work I'll defer that to others on
the list.  I'm have a similar problem on a Fedora Core 2 virtual
instance that we lease offsite for a project.  In that case everything
was statically linked but I can't use any of the loaded modules (or
better said they don't work).  But for me it wasn't critical so I just
gave up on it.



> -----Original Message-----
> From: netfilter-bounces@xxxxxxxxxxxxxxxxxxx [mailto:netfilter-
> bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Bowie Bailey
> Sent: Wednesday, May 17, 2006 8:40 AM
> To: Netfilter List (E-mail)
> Subject: RE: iptables and pop3 lockup
> 
> Gary W. Smith wrote:
> > I'm now sure what the problem is.  There is nothing pointing out
right
> > now.  But these are the canned RH rules.  I would recommend making
the
> > following change just to rule out any connection tracking.  Here is
> > the reason.  If connection tracking is broken then any requests for
a
> > second packet will not be considered new which will fail to be
> > matched on the connection tracking site.
> >
> > Do this as a test (in place for the corresponding rules).
> >
> > -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 25 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 110 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 53 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m udp -p udp --dport 53 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 587 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 80 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 22 -s 172.16.0.0/16 -j
> > ACCEPT
> > -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 443 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 995 -j ACCEPT
> > -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 21 -j ACCEPT
> >
> > Connection tracking can save you some time in the chain processing
for
> > allowing for faster matches but we are trying to find out if it's
even
> > working or not.
> 
> I made the change you suggested, but only for pop3 since that was the
> only service with the problem.  Everything worked properly at that
> point.  So it seems that the problem is with the connection tracking.
> What can I do to fix it?
> 
> For comparison and clarity, this is my working rule list at the
> moment:
> 
> *filter
> :INPUT ACCEPT [0:0]
> :FORWARD ACCEPT [0:0]
> :OUTPUT ACCEPT [0:0]
> :RH-Firewall-1-INPUT - [0:0]
> -A INPUT -j RH-Firewall-1-INPUT
> -A FORWARD -j RH-Firewall-1-INPUT
> -A RH-Firewall-1-INPUT -i lo -j ACCEPT
> -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 25
-j
> ACCEPT
> -A RH-Firewall-1-INPUT -m tcp -p tcp --dport 110 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 53
-j
> ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 53
-j
> ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 587
-j
> ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80
-j
> ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22
-s
> 172.16.0.0/16 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443
-j
> ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 995
-j
> ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21
-j
> ACCEPT
> -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
> COMMIT
> 
> All I did was remove the state requirements from the pop3 rule.
> Everything else is still at my original settings.
> 
> Bowie




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux