All of lore.kernel.org
 help / color / mirror / Atom feed
* Allow active and passive FTP connections
@ 2004-06-17 11:03 Sagara Wijetunga
  2004-06-17 12:07 ` Chris Brenton
  2004-06-17 12:16 ` Rob Sterenborg
  0 siblings, 2 replies; 28+ messages in thread
From: Sagara Wijetunga @ 2004-06-17 11:03 UTC (permalink / raw)
  To: netfilter

Hi all 

I need to allow active as well as passive FTP
connections to my FTP server.

My firewall configuration is as follows:
/sbin/iptables -P INPUT DROP
/sbin/iptables -P FORWARD DROP
/sbin/iptables -P OUTPUT DROP
:
/sbin/iptables -A INPUT -m state --state
ESTABLISHED,RELATED -j ACCEPT
:
/sbin/iptables -A INPUT -p tcp --dport 21 --syn -j
ACCEPT
:
/sbin/iptables -A OUTPUT -m state --state
ESTABLISHED,RELATED -j ACCEPT
:

I have following issues relating to above rules:
1. For active FTP requests by remote clients, it drops
the data connection request to the remote client from
the server on the OUTPUT chain. 

2. For passive FTP requests by remote clients, it
drops the data connection request to the server from
remote clients on the INPUT chain.

I expected the RELATED on both INPUT and OUTPUT chains
will accept active as well as passive FTP connections.

The RELATED is defined on Packet Filtering HOWTO by
Rusty Russell as follows:
<quote>
RELATED
A packet which is related to, but not part of, an
existing connection, such as an ICMP error, or (with
the FTP module inserted), a packet establishing an ftp
data connection.
</quote>

What is this FTP module and how to insert it? 

I have already enabled the FTP support as part of the
Linux kernel.

Your comment in this regard is very much appreciated.

Kind regards
Sagara



		
__________________________________
Do you Yahoo!?
Yahoo! Mail - Helps protect you from nasty viruses.
http://promotions.yahoo.com/new_mail


^ permalink raw reply	[flat|nested] 28+ messages in thread
* RE: Allow active and passive FTP connections
@ 2004-06-17 12:13 Piszcz, Justin Michael
  2004-06-17 12:23 ` Antony Stone
  0 siblings, 1 reply; 28+ messages in thread
From: Piszcz, Justin Michael @ 2004-06-17 12:13 UTC (permalink / raw)
  To: Chris Brenton, Sagara Wijetunga; +Cc: netfilter

I think he meant, modprobe ip_conntrack_ftp and if you are behind nat
there is a module for that as well.


-----Original Message-----
From: netfilter-admin@lists.netfilter.org
[mailto:netfilter-admin@lists.netfilter.org] On Behalf Of Chris Brenton
Sent: Thursday, June 17, 2004 8:08 AM
To: Sagara Wijetunga
Cc: netfilter
Subject: Re: Allow active and passive FTP connections

On Thu, 2004-06-17 at 07:03, Sagara Wijetunga wrote:
>
> I have following issues relating to above rules:
> 1. For active FTP requests by remote clients, it drops
> the data connection request to the remote client from
> the server on the OUTPUT chain. 
> 
> 2. For passive FTP requests by remote clients, it
> drops the data connection request to the server from
> remote clients on the INPUT chain.

Try:
insmod ip_conntrack_ftp

HTH,
C







^ permalink raw reply	[flat|nested] 28+ messages in thread
* RE: Allow active and passive FTP connections
@ 2004-06-17 13:06 Piszcz, Justin Michael
  2004-06-17 13:24 ` Antony Stone
  0 siblings, 1 reply; 28+ messages in thread
From: Piszcz, Justin Michael @ 2004-06-17 13:06 UTC (permalink / raw)
  To: netfilter

root@p500:~# insmod ip_conntrack_ftp
insmod: can't read 'ip_conntrack_ftp': No such file or directory
root@p500:~#

- Insmod is when you load the module directly, there it would not work
unless you were in the _same_ directory as the ip_conntrack_ftp and you
renamed the ip_conntrack_ftp.{ko,o} ip_conntrack_ftp, then it would
work.

Otherwise, I do not see how you come to that conclusion.


-----Original Message-----
From: netfilter-admin@lists.netfilter.org
[mailto:netfilter-admin@lists.netfilter.org] On Behalf Of Antony Stone
Sent: Thursday, June 17, 2004 8:23 AM
To: netfilter
Subject: Re: Allow active and passive FTP connections

On Thursday 17 June 2004 1:13 pm, Piszcz, Justin Michael wrote:

> I think he meant, modprobe ip_conntrack_ftp and if you are behind nat
> there is a module for that as well.

insmod should do the job perfectly well.

NAT is very unlikely when the rules are running on the FTP server itself

(they're in the INPUT & OUTPUT chains).

Regards,

Antony.

> -----Original Message-----
> From: netfilter-admin@lists.netfilter.org
> [mailto:netfilter-admin@lists.netfilter.org] On Behalf Of Chris
Brenton
> Sent: Thursday, June 17, 2004 8:08 AM
> To: Sagara Wijetunga
> Cc: netfilter
> Subject: Re: Allow active and passive FTP connections
>
> On Thu, 2004-06-17 at 07:03, Sagara Wijetunga wrote:
> > I have following issues relating to above rules:
> > 1. For active FTP requests by remote clients, it drops
> > the data connection request to the remote client from
> > the server on the OUTPUT chain.
> >
> > 2. For passive FTP requests by remote clients, it
> > drops the data connection request to the server from
> > remote clients on the INPUT chain.
>
> Try:
> insmod ip_conntrack_ftp
>
> HTH,
> C

-- 
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
A: Top-posting.
Q: What is the most annoying thing on usenet and in e-mail?

                                                     Please reply to the
list;
                                                           please don't
CC me.






^ permalink raw reply	[flat|nested] 28+ messages in thread
* RE: Allow active and passive FTP connections
@ 2004-06-17 15:22 Piszcz, Justin Michael
  2004-06-17 16:41 ` Sagara Wijetunga
  0 siblings, 1 reply; 28+ messages in thread
From: Piszcz, Justin Michael @ 2004-06-17 15:22 UTC (permalink / raw)
  To: Sagara Wijetunga, netfilter

Is it necessary to build ip_conntrack_ftp as a module?
If you want to do ports other than 21 on 2.4, yes, on 2.6, no, you can
use the append="" option in LILO.

-----Original Message-----
From: netfilter-admin@lists.netfilter.org
[mailto:netfilter-admin@lists.netfilter.org] On Behalf Of Sagara
Wijetunga
Sent: Thursday, June 17, 2004 11:13 AM
To: netfilter
Subject: Re: Allow active and passive FTP connections

--- Antony Stone <Antony@Soft-Solutions.co.uk> wrote:
> On Thursday 17 June 2004 1:13 pm, Piszcz, Justin
> Michael wrote:
> 
> > I think he meant, modprobe ip_conntrack_ftp and if
> you are behind nat
> > there is a module for that as well.
> 
> insmod should do the job perfectly well.
> 
> NAT is very unlikely when the rules are running on
> the FTP server itself 
> (they're in the INPUT & OUTPUT chains).
> 
Thanks very much for everybody's comments on this. 

In my Linux kernel, the "FTP protocol support" under
"IP: Netfilter Configuration" is build into the
kernel. Therefore, there is no ip_conntrack_ftp module
to load.

I use Linux kernel 2.6.5, I don't use NAT and I use
iptables v1.2.10.

I noticed "IP: kernel level autoconfiguration" was not
set. I just build that also in to the kernel,
recompiled, reinstalled the Linux kernel, rebuild all
modules and rebooted the server and retried the FTP
connection. But my problem is still the same. 

For active FTP connections it drops the following
packet:
Jun 17 22:51:04 svr1 kernel: OUTPUT PKT DROPPED: IN=
OUT=eth0 SRC=[server IP addr] DST=[client IP addr]
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=33736 DF PROTO=TCP
SPT=20 DPT=32914 WINDOW=5840 RES=0x00 SYN URGP=0

For passive FTP connections it drops the following
packet:
Jun 17 22:54:12 svr1 kernel: INPUT PKT DROPPED:
IN=eth0 OUT=
MAC=00:e0:29:34:b3:58:00:e0:29:34:bb:36:08:00
SRC=[client IP addr] DST=[server IP addr] LEN=60
TOS=0x00 PREC=0x00 TTL=64 ID=40886 DF PROTO=TCP
SPT=32916 DPT=32769 WINDOW=5840 RES=0x00 SYN URGP=0

Is it necessary to build ip_conntrack_ftp as a module?


Sagara


	
		
__________________________________
Do you Yahoo!?
New and Improved Yahoo! Mail - 100MB free storage!
http://promotions.yahoo.com/new_mail 





^ permalink raw reply	[flat|nested] 28+ messages in thread
* RE: Allow active and passive FTP connections
@ 2004-06-17 17:04 Piszcz, Justin Michael
  0 siblings, 0 replies; 28+ messages in thread
From: Piszcz, Justin Michael @ 2004-06-17 17:04 UTC (permalink / raw)
  To: netfilter

Yup.


-----Original Message-----
From: netfilter-admin@lists.netfilter.org
[mailto:netfilter-admin@lists.netfilter.org] On Behalf Of Antony Stone
Sent: Thursday, June 17, 2004 12:52 PM
To: netfilter@lists.netfilter.org
Subject: Re: Allow active and passive FTP connections

On Thursday 17 June 2004 5:41 pm, Sagara Wijetunga wrote:

> <justin.piszcz@mitretek.org> wrote:
> > Is it necessary to build ip_conntrack_ftp as a
> > module?
> > If you want to do ports other than 21 on 2.4, yes,
> > on 2.6, no, you can
> > use the append="" option in LILO.
>
> Could you elaborate this a bit? I use Linux kernel
> 2.6.5 and ip_conntrack_ftp is compiled into the
> kernel. Do I still have to pass a append="" option to
> kernel at LILO?

Only if you want to connect to a non-standard port number (ie: other
than 21)

Regards,

Antony.

-- 
This email is intended for the use of the individual addressee(s) named
above 
and may contain information that is confidential, privileged or
unsuitable 
for overly sensitive persons with low self-esteem, no sense of humour,
or 
irrational religious beliefs.

If you have received this email in error, you are required to shred it 
immediately, add some nutmeg, three egg whites and a dessertspoonful of 
caster sugar.   Whisk until soft peaks form, then place in a warm oven
for 40 
minutes.   Remove promptly and let stand for 2 hours before adding some 
decorative kiwi fruit and cream.   Then notify me immediately by return
email 
and eat the original message.

                                                     Please reply to the
list;
                                                           please don't
CC me.






^ permalink raw reply	[flat|nested] 28+ messages in thread
* RE: Allow active and passive FTP connections
@ 2004-06-18 17:14 Sagara Wijetunga
  2004-06-18 19:16 ` Jozsef Kadlecsik
  0 siblings, 1 reply; 28+ messages in thread
From: Sagara Wijetunga @ 2004-06-18 17:14 UTC (permalink / raw)
  To: netfilter

Hi all

Today I upgraded the Linux kernel to 2.6.7. 

Applied following patches of the
patch-o-matic-ng-20040302:
init_conntrack-optimize NETMAP SAME TTL connlimit
fuzzy iprange ipv4options mport raw CLASSIFY addrtype
childlevel owner-socketlookup

Compiled in all netfiter options to the kernel.

After the server is booted with the new kernel, I
recompiled and reinstalled the iptables.

But my problem is still the same. The “-m state
--state ESTABLISHED” works well, but the “-m state
--state RELATED” does not work at all for FTP data
connections. What have I missed?

Is there an alternative method to know that a
particular --syn connection a part of an existing FTP
connection without using RELATED?

Any ideas please?

Sagara




		
__________________________________
Do you Yahoo!?
Yahoo! Mail is new and improved - Check it out!
http://promotions.yahoo.com/new_mail


^ permalink raw reply	[flat|nested] 28+ messages in thread
* RE: Allow active and passive FTP connections
@ 2004-06-21 11:10 Piszcz, Justin Michael
  2004-06-21 14:56 ` Sagara Wijetunga
  0 siblings, 1 reply; 28+ messages in thread
From: Piszcz, Justin Michael @ 2004-06-21 11:10 UTC (permalink / raw)
  To: Sagara Wijetunga, netfilter

This is one of the first iptables firewalls I made (2-3 years ago) and
it does exactly that.
Let me know if it works for you, thanks.

fw_start() { 
#######################################
# STEP 1 - SET VARIABLES 
#######################################
# YOUR LOCAL LOOPBACK DEVICE
LB="lo"
# YOUR PRIVATE INTERFACE 
LAN="eth0"
# YOUR PRIVATE LAN IP
LIP="192.168.0.253"
# YOUR LOCAL AREA NETWORK
LSAT="192.168.0.0/24"
# YOUR INTERNET INTERFACE
INET="eth1"
# THE PATH TO IPTABLES
IPTABLES="/usr/sbin/iptables"
#######################################
# STEP 2 - TURN ON IP FORWARDING
#######################################
echo "1" > /proc/sys/net/ipv4/ip_forward
#######################################
# STEP 3 - FLUSH EXISTING RULES
#######################################
$IPTABLES --flush INPUT 
$IPTABLES --flush OUTPUT
$IPTABLES --flush FORWARD
#######################################
# STEP 4 - SET DEFAULT POLICIES
#######################################
$IPTABLES -P INPUT DROP
$IPTABLES -P OUTPUT ACCEPT
$IPTABLES -P FORWARD ACCEPT
#######################################
# STEP 5 - CREATE DEFAULT BLOCK CHAIN 
#######################################
$IPTABLES -N BLOCK 
$IPTABLES -A BLOCK -j LOG --log-level 3 --log-prefix "BLOCK: "
$IPTABLES -A BLOCK -j DROP
#######################################
# STEP 6 - SETUP MASQUERADING
#######################################
$IPTABLES -t nat -A POSTROUTING -o $INET -j MASQUERADE
#######################################
# STEP 7 - ALLOW LOCAL ENTITIES 
#######################################
# ALLOW LOOPBACK
$IPTABLES -A INPUT -i $LB -j ACCEPT 
# ALLOW LOCAL AREA NETWORK
$IPTABLES -A INPUT -i $LAN -s $LSAT -j ACCEPT
#######################################
# STEP 8 - ALLOW SPECIFC TRAFFIC
#######################################
# EXAMPLE OF WHERE AND HOW TO ALLOW INBOUND TRAFFIC.
$IPTABLES -A INPUT -i $INET -p tcp --dport 21 -j ACCEPT
$IPTABLES -A INPUT -i $INET -p tcp --dport 22 -j ACCEPT
#######################################
# STEP 9 - ALLOW IN WHAT WE SEND OUT
#######################################
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
#######################################
# STEP 10 - DENY EVERYTHING NOT ALLOWED
#######################################
$IPTABLES -A INPUT -j BLOCK
#######################################
} 

fw_stop() {
IPTABLES="/usr/sbin/iptables"
$IPTABLES --flush INPUT
$IPTABLES --flush OUTPUT
$IPTABLES --flush FORWARD
$IPTABLES --flush BLOCK
$IPTABLES --delete-chain BLOCK
}

fw_restart() {
  fw_stop
  fw_start
}
 
case "$1" in
'start')
  fw_start
  ;;
'stop')
  fw_stop
  ;;
'restart')
  fw_restart
  ;;
*)
  echo "usage $0 start|stop|restart"
esac


-----Original Message-----
From: netfilter-admin@lists.netfilter.org
[mailto:netfilter-admin@lists.netfilter.org] On Behalf Of Sagara
Wijetunga
Sent: Monday, June 21, 2004 6:57 AM
To: netfilter@lists.netfilter.org
Subject: RE: Allow active and passive FTP connections

--- Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> wrote:
> Are you sure, you run the kernel indicated?
> 
uname -a
Linux svr1.myDomain 2.6.7 ...

> How did you compile iptables-1.2.10? There was a bug
> introduced in
> linux-2.6.7, which prevented anyone to compile the
> iptables source
> using linux-2.6.7.
> 
I exported the variable CC before I compile iptables
as follows:

CC="gcc -D__user= "
export CC

make BINDIR=/sbin LIBDIR=/lib \
MANDIR=/usr/share/man KERNEL_DIR=/usr/src/linux-2.6.7
>& iptables-make.log

make BINDIR=/sbin LIBDIR=/lib \
MANDIR=/usr/share/man install
KERNEL_DIR=/usr/src/linux-2.6.7  >&
iptables-install.log

Anyway, my problem is nothing to do with Linux kernel
2.6.7. The RELATED did not work on kernel 2.6.5 and
iptables 1.2.9. That's why I upgraded the kernel and
the iptables.

> > > You should post the complete list of your rules
> in
> > > all of the tables.
> > >
> > 	/sbin/iptables -P INPUT DROP
> > 	/sbin/iptables -P FORWARD DROP
> > 	/sbin/iptables -P OUTPUT DROP
> 
> What about the nat/mangle/raw tables?
> 
I do not use NAT. It does not operate as a router.
Therefore, no IP forwarding. It's not connected to any
office LAN. Access is only thru the eth0.

I'm not sure about mangle and raw tables. My intention
is to allow access only to the services I offer.

Do I have to use mangle and raw tables? 

Could you kindly write for me a complete iptables
firewall allowing access ONLY to the FTP and ssh? I
know this is a crazy request. But I can implement it
on my server and test. So our test firewall should be
able to accept active as well as passive FTP client
connections for file upload and download and ssh
access for me to manipulate the server.

Kind regards
Sagara


		
__________________________________
Do you Yahoo!?
New and Improved Yahoo! Mail - Send 10MB messages!
http://promotions.yahoo.com/new_mail 





^ permalink raw reply	[flat|nested] 28+ messages in thread
* RE: Allow active and passive FTP connections
@ 2004-06-21 15:03 Piszcz, Justin Michael
  2004-06-21 15:21 ` Sagara Wijetunga
  2004-06-21 15:43 ` Sagara Wijetunga
  0 siblings, 2 replies; 28+ messages in thread
From: Piszcz, Justin Michael @ 2004-06-21 15:03 UTC (permalink / raw)
  To: Sagara Wijetunga, netfilter

I see..

Some questions for you:

You are running the IP connection tracker for FTP in the KERNEL or
MODULE?
You are running the FTP daemon on port 21?
You are *NOT* running an (SSL) FTP daemon, correct? (The current
conntrack module for FTP does _NOT_ support this).


-----Original Message-----
From: netfilter-admin@lists.netfilter.org
[mailto:netfilter-admin@lists.netfilter.org] On Behalf Of Sagara
Wijetunga
Sent: Monday, June 21, 2004 10:56 AM
To: netfilter@lists.netfilter.org
Subject: RE: Allow active and passive FTP connections

--- "Piszcz, Justin Michael"
<justin.piszcz@mitretek.org> wrote:
> This is one of the first iptables firewalls I made
> (2-3 years ago) and
> it does exactly that.
> Let me know if it works for you, thanks.
>
Thanks for your sample firewall.

My server is not connected to a LAN. Therefore, I have
disabled your LAN related rules. All modifications are
highlighted with "<<== Sagara".  

This is what I have tried:

#!/bin/sh

fw_start() { 
#######################################
# STEP 1 - SET VARIABLES 
#######################################
# YOUR LOCAL LOOPBACK DEVICE
LB="lo"
# YOUR PRIVATE INTERFACE 
#LAN="eth0"	<<== Sagara
# YOUR PRIVATE LAN IP
#LIP="192.168.0.253"	<<== Sagara
# YOUR LOCAL AREA NETWORK
#LSAT="192.168.0.0/24"	<<== Sagara
# YOUR INTERNET INTERFACE
#INET="eth1"	<<== Sagara
INET="eth0"
# THE PATH TO IPTABLES
#IPTABLES="/usr/sbin/iptables"	<<== Sagara
IPTABLES="/sbin/iptables"
#######################################
# STEP 2 - TURN ON IP FORWARDING
#######################################
#echo "1" > /proc/sys/net/ipv4/ip_forward <<== Sagara
#######################################
# STEP 3 - FLUSH EXISTING RULES
#######################################
$IPTABLES --flush INPUT 
$IPTABLES --flush OUTPUT
$IPTABLES --flush FORWARD
#######################################
# STEP 4 - SET DEFAULT POLICIES
#######################################
$IPTABLES -P INPUT DROP
$IPTABLES -P OUTPUT ACCEPT
$IPTABLES -P FORWARD ACCEPT
#######################################
# STEP 5 - CREATE DEFAULT BLOCK CHAIN 
#######################################
$IPTABLES -N BLOCK 
$IPTABLES -A BLOCK -j LOG --log-level 3 --log-prefix
"BLOCK: "
$IPTABLES -A BLOCK -j DROP
#######################################
# STEP 6 - SETUP MASQUERADING
#######################################
#$IPTABLES -t nat -A POSTROUTING -o $INET -j
MASQUERADE	<<== Sagara
#######################################
# STEP 7 - ALLOW LOCAL ENTITIES 
#######################################
# ALLOW LOOPBACK
$IPTABLES -A INPUT -i $LB -j ACCEPT 
# ALLOW LOCAL AREA NETWORK
#$IPTABLES -A INPUT -i $LAN -s $LSAT -j ACCEPT	<<==
Sagara
#######################################
# STEP 8 - ALLOW SPECIFC TRAFFIC
#######################################
# EXAMPLE OF WHERE AND HOW TO ALLOW INBOUND TRAFFIC.
$IPTABLES -A INPUT -i $INET -p tcp --dport 21 -j
ACCEPT
$IPTABLES -A INPUT -i $INET -p tcp --dport 22 -j
ACCEPT
#######################################
# STEP 9 - ALLOW IN WHAT WE SEND OUT
#######################################
$IPTABLES -A INPUT -m state --state
ESTABLISHED,RELATED -j ACCEPT
#######################################
# STEP 10 - DENY EVERYTHING NOT ALLOWED
#######################################
$IPTABLES -A INPUT -j BLOCK
#######################################
} 

fw_stop() {
#IPTABLES="/usr/sbin/iptables"	<<== Sagara
IPTABLES="/sbin/iptables"
$IPTABLES --flush INPUT
$IPTABLES --flush OUTPUT
$IPTABLES --flush FORWARD
$IPTABLES --flush BLOCK
$IPTABLES --delete-chain BLOCK
}

fw_restart() {
  fw_stop
  fw_start
}
 
case "$1" in
'start')
  fw_start
  ;;
'stop')
  fw_stop
  ;;
'restart')
  fw_restart
  ;;
*)
  echo "usage $0 start|stop|restart"
esac

This is the result of passive FTP connect try:

Jun 21 22:56:07 svr1 kernel: BLOCK: IN=eth0 OUT=
MAC=00:e0:29:34:b3:58:00:e0:29:34:bb:36:08:00
SRC=[client IP addr] DST=[server IP addr] LEN=60
TOS=0x00 PREC=0x00 TTL=64 ID=61616 DF PROTO=TCP
SPT=32936 DPT=64638 WINDOW=5840 RES=0x00 SYN URGP=0

Pls let me know have I made a mistake. 

Kind regards
Sagara



		
__________________________________
Do you Yahoo!?
Yahoo! Mail - You care about security. So do we.
http://promotions.yahoo.com/new_mail





^ permalink raw reply	[flat|nested] 28+ messages in thread
* RE: Allow active and passive FTP connections
@ 2004-06-21 16:18 Piszcz, Justin Michael
  2004-06-22  3:10 ` Sagara Wijetunga
  0 siblings, 1 reply; 28+ messages in thread
From: Piszcz, Justin Michael @ 2004-06-21 16:18 UTC (permalink / raw)
  To: Sagara Wijetunga, netfilter

If you find one (that works with TLS/SSL), please let me know :)
Sorry I have not seen one as of yet.

Justin.

-----Original Message-----
From: netfilter-admin@lists.netfilter.org
[mailto:netfilter-admin@lists.netfilter.org] On Behalf Of Sagara
Wijetunga
Sent: Monday, June 21, 2004 11:43 AM
To: netfilter@lists.netfilter.org
Subject: RE: Allow active and passive FTP connections

--- "Piszcz, Justin Michael"
<justin.piszcz@mitretek.org> wrote:
> You are *NOT* running an (SSL) FTP daemon, correct?
> (The current
> conntrack module for FTP does _NOT_ support this).
> 
You are right! I disabled SSL from the FTP server. Now
the RELATED rule *works* as I expected for both active
and passive FTP connections.

Thank you very much to highlight it to me. Is there a
workaround for this?

kind regards
Sagara




	
		
__________________________________
Do you Yahoo!?
New and Improved Yahoo! Mail - 100MB free storage!
http://promotions.yahoo.com/new_mail 





^ permalink raw reply	[flat|nested] 28+ messages in thread

end of thread, other threads:[~2004-06-22 15:38 UTC | newest]

Thread overview: 28+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-06-17 11:03 Allow active and passive FTP connections Sagara Wijetunga
2004-06-17 12:07 ` Chris Brenton
2004-06-17 12:16 ` Rob Sterenborg
  -- strict thread matches above, loose matches on Subject: below --
2004-06-17 12:13 Piszcz, Justin Michael
2004-06-17 12:23 ` Antony Stone
2004-06-17 15:13   ` Sagara Wijetunga
2004-06-17 15:27     ` Antony Stone
2004-06-17 16:29       ` Sagara Wijetunga
2004-06-17 13:06 Piszcz, Justin Michael
2004-06-17 13:24 ` Antony Stone
2004-06-17 15:22 Piszcz, Justin Michael
2004-06-17 16:41 ` Sagara Wijetunga
2004-06-17 16:52   ` Antony Stone
2004-06-17 17:04 Piszcz, Justin Michael
2004-06-18 17:14 Sagara Wijetunga
2004-06-18 19:16 ` Jozsef Kadlecsik
2004-06-19  4:26   ` Sagara Wijetunga
2004-06-21  9:47     ` Jozsef Kadlecsik
2004-06-21 10:57       ` Sagara Wijetunga
2004-06-21 11:10 Piszcz, Justin Michael
2004-06-21 14:56 ` Sagara Wijetunga
2004-06-21 15:03 Piszcz, Justin Michael
2004-06-21 15:21 ` Sagara Wijetunga
2004-06-21 15:43 ` Sagara Wijetunga
2004-06-21 16:18 Piszcz, Justin Michael
2004-06-22  3:10 ` Sagara Wijetunga
2004-06-22  8:16   ` Jozsef Kadlecsik
2004-06-22 15:38     ` Sagara Wijetunga

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.