* Fwd: Linux as router (Gateway Server) [not found] <1dceb012050211233357e23dd4@mail.gmail.com> @ 2005-02-12 7:48 ` Navneet Choudhary 2005-02-12 8:15 ` Askar 2005-02-12 14:01 ` Fwd: " Jason Opperisano 0 siblings, 2 replies; 17+ messages in thread From: Navneet Choudhary @ 2005-02-12 7:48 UTC (permalink / raw) To: netfilter@lists.netfilter.org hi list, i require further co-operation from yours side. Squid Server is serving as Proxy server, Gateway & Firewall Problem: Squid daemon dies at startup. Here is log output of /var/log/messages Feb 12 09:15:25 squid squid[3652]: Squid Parent: child process 3654 started Feb 12 09:15:25 squid (squid): Cannot open HTTP Port Feb 12 09:15:29 squid squid[3720]: Squid Parent: child process 3722 exited due to signal 6 Feb 12 09:15:32 squid squid[3720]: Squid Parent: child process 4385 started Feb 12 09:15:32 squid squid[3720]: Squid Parent: child process 4385 exited with status 1 Feb 12 09:15:33 squid (squid): Cannot open HTTP Port Why my iptables rule blocking squid to open HTTP port. Note: existing rule being attached at the end of mail Since, process will not die if I disable/flush my rules? Squid being started from /etc/rc.local Where i am doing mistakes? Please suggest since its causing startup hiccup Thanks & regards, Navneet Choudhary Updates & quick recap 1.> Basically I want clients to be able to : a). Send and receives mails from mail.ISP.net [X.X.X.160] and sometimes from X.X.X.78 Status: Working b). Browse the net through squid [3128] Status: Working c). Use Jabber [??], MSN [1863] and Yahoo [5050] Status: Working d) Down and upload data using ftp from 202.134.192.21 & 221.171.85.41 Status: Working e) Down and upload data using SONICMQ [IP & Port?] Status: Require HELP e) Allow SSH connection to this system [eth0]. Status: Working f) We can ping/trace route by domain name i.e. ping yahoo.com Status: Working 2.What i am using? My network configuration is as follows: - WAN | eth1 (172.21.0.133/28) | | Red Hat 9 [Squid Proxy, Gateway ,firewall & FTP] | | | (133.147.0.0/16) eth0 | ---- SWITCH---------- | | | LAN where:- eth0-Intel Corp. 82557/8/9 [Ethernet Pro 100] eth1-Broadcom Corporation NetXtreme BCM5702 Gigabit Ethernet Kernel 2.4.20-8 iptables v1.2.7a 3.What I have done:- a)Enabled IP forwarding by adding vi /etc/sysctl.conf # Controls IP packet forwarding net.ipv4.ip_forward = 1 b)Automatic loading of modules by adding vi /etc/rc.local /sbin/insmod ip_nat_ftp /sbin/insmod ip_conntrack_ftp b)Firewall rules as follows:- # Generated by iptables-save v1.2.7a on Thu Feb 10 20:02:43 2005 *mangle :PREROUTING ACCEPT [1308:428675] :INPUT ACCEPT [1308:428675] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [1273:553710] :POSTROUTING ACCEPT [1273:553710] -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP COMMIT # Completed on Thu Feb 10 20:02:43 2005 # Generated by iptables-save v1.2.7a on Thu Feb 10 20:02:43 2005 *nat :PREROUTING ACCEPT [10233:846887] :POSTROUTING ACCEPT [71:4821] :OUTPUT ACCEPT [67:4688] -A POSTROUTING -s 133.147.0.0/255.255.0.0 -o eth1 -j SNAT --to-source 172.21.0.132 COMMIT # Completed on Thu Feb 10 20:02:43 2005 # Generated by iptables-save v1.2.7a on Thu Feb 10 20:02:43 2005 *filter :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT DROP [0:0] -A INPUT -s 127.0.0.1 -j ACCEPT -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 3128 --tcp-flags SYN,RST,ACK SYN -j ACCEPT -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 22 --tcp-flags SYN,RST,ACK SYN -j ACCEPT -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 21 --tcp-flags SYN,RST,ACK SYN -j ACCEPT -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 20 --tcp-flags SYN,RST,ACK SYN -j ACCEPT -A INPUT -p udp -j DROP -A INPUT -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j DROP -A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT -A FORWARD -i eth0 -o eth1 -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 25 --tcp-flags SYN,RST,ACK SYN -j ACCEPT -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 110 --tcp-flags SYN,RST,ACK SYN -j ACCEPT -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 21 -j ACCEPT -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 20 -j ACCEPT -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 1863 --tcp-flags SYN,RST,ACK SYN -j ACCEPT -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 5050 --tcp-flags SYN,RST,ACK SYN -j ACCEPT -A FORWARD -p icmp -m icmp --icmp-type 8 -j ACCEPT -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A OUTPUT -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT -A OUTPUT -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 80 --tcp-flags SYN,RST,ACK SYN -m owner --uid-owner squid -j ACCEPT -A OUTPUT -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 443 --tcp-flags SYN,RST,ACK SYN -m owner --uid-owner squid -j ACCEPT -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT COMMIT # Completed on Thu Feb 10 20:02:43 2005 ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Linux as router (Gateway Server) 2005-02-12 7:48 ` Fwd: Linux as router (Gateway Server) Navneet Choudhary @ 2005-02-12 8:15 ` Askar 2005-02-13 16:06 ` Navneet Choudhary 2005-02-12 14:01 ` Fwd: " Jason Opperisano 1 sibling, 1 reply; 17+ messages in thread From: Askar @ 2005-02-12 8:15 UTC (permalink / raw) To: Navneet Choudhary; +Cc: netfilter@lists.netfilter.org dude add this rule to yur iptables script iptables -A INPUT -p tcp -s 0/0 --dport 80 -j ACCEPT second "squid squid[3720]: Squid Parent: child process 3722 exited due to signal 6" is not iptables related, better place to check is squid mailing list. You are running squid in interception mode? remember when squid is running in interception packets destined fro squid machine not hit FORWARD chain but INPUT. :) Note: which version of squid you are using, what cache.log say? solution try to upgrade your squid with never version. I hope this will help regards On Sat, 12 Feb 2005 13:18:25 +0530, Navneet Choudhary <navneetkc@gmail.com> wrote: > hi list, > > i require further co-operation from yours side. > > Squid Server is serving as Proxy server, Gateway & Firewall > > Problem: > Squid daemon dies at startup. > > Here is log output of /var/log/messages > > Feb 12 09:15:25 squid squid[3652]: Squid Parent: child process 3654 started > Feb 12 09:15:25 squid (squid): Cannot open HTTP Port > Feb 12 09:15:29 squid squid[3720]: Squid Parent: child process 3722 > exited due to signal 6 > Feb 12 09:15:32 squid squid[3720]: Squid Parent: child process 4385 started > Feb 12 09:15:32 squid squid[3720]: Squid Parent: child process 4385 > exited with status 1 > Feb 12 09:15:33 squid (squid): Cannot open HTTP Port > > Why my iptables rule blocking squid to open HTTP port. > > Note: existing rule being attached at the end of mail > > Since, process will not die if I disable/flush my rules? > > Squid being started from /etc/rc.local > > Where i am doing mistakes? > > Please suggest since its causing startup hiccup > > Thanks & regards, > > Navneet Choudhary > > Updates & quick recap > > 1.> Basically I want clients to be able to : > > a). Send and receives mails from mail.ISP.net [X.X.X.160] and > sometimes from X.X.X.78 > Status: Working > b). Browse the net through squid [3128] > Status: Working > > c). Use Jabber [??], MSN [1863] and Yahoo [5050] > Status: Working > > d) Down and upload data using ftp from 202.134.192.21 & 221.171.85.41 > > Status: Working > e) Down and upload data using SONICMQ [IP & Port?] > > Status: Require HELP > e) Allow SSH connection to this system [eth0]. > Status: Working > f) We can ping/trace route by domain name i.e. ping yahoo.com > Status: Working > > 2.What i am using? > > My network configuration is as follows: - > > WAN > | > eth1 > (172.21.0.133/28) > | > | > Red Hat 9 > [Squid Proxy, Gateway ,firewall & FTP] > | > | > | > (133.147.0.0/16) > eth0 > | > ---- SWITCH---------- > | > | > | > LAN > > where:- > eth0-Intel Corp. 82557/8/9 [Ethernet Pro 100] > eth1-Broadcom Corporation NetXtreme BCM5702 Gigabit Ethernet > > Kernel 2.4.20-8 > > iptables v1.2.7a > > 3.What I have done:- > > a)Enabled IP forwarding by adding > vi /etc/sysctl.conf > > # Controls IP packet forwarding > net.ipv4.ip_forward = 1 > > b)Automatic loading of modules by adding > vi /etc/rc.local > > /sbin/insmod ip_nat_ftp > /sbin/insmod ip_conntrack_ftp > > b)Firewall rules as follows:- > # Generated by iptables-save v1.2.7a on Thu Feb 10 20:02:43 2005 > *mangle > :PREROUTING ACCEPT [1308:428675] > :INPUT ACCEPT [1308:428675] > :FORWARD ACCEPT [0:0] > :OUTPUT ACCEPT [1273:553710] > :POSTROUTING ACCEPT [1273:553710] > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG > FIN,PSH,URG -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG > FIN,PSH,URG -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG > FIN,PSH,URG -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG > FIN,PSH,URG -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP > COMMIT > # Completed on Thu Feb 10 20:02:43 2005 > # Generated by iptables-save v1.2.7a on Thu Feb 10 20:02:43 2005 > *nat > :PREROUTING ACCEPT [10233:846887] > :POSTROUTING ACCEPT [71:4821] > :OUTPUT ACCEPT [67:4688] > -A POSTROUTING -s 133.147.0.0/255.255.0.0 -o eth1 -j SNAT --to-source > 172.21.0.132 > COMMIT > # Completed on Thu Feb 10 20:02:43 2005 > # Generated by iptables-save v1.2.7a on Thu Feb 10 20:02:43 2005 > *filter > :INPUT DROP [0:0] > :FORWARD DROP [0:0] > :OUTPUT DROP [0:0] > -A INPUT -s 127.0.0.1 -j ACCEPT > -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT > -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 3128 > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 22 > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 21 > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 20 > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > -A INPUT -p udp -j DROP > -A INPUT -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j DROP > -A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT > -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT > -A FORWARD -i eth0 -o eth1 -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 25 > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport > 110 --tcp-flags SYN,RST,ACK SYN -j ACCEPT > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 21 -j ACCEPT > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 20 -j ACCEPT > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport > 1863 --tcp-flags SYN,RST,ACK SYN -j ACCEPT > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport > 5050 --tcp-flags SYN,RST,ACK SYN -j ACCEPT > -A FORWARD -p icmp -m icmp --icmp-type 8 -j ACCEPT > -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT > -A OUTPUT -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT > -A OUTPUT -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 80 > --tcp-flags SYN,RST,ACK SYN -m owner --uid-owner squid -j ACCEPT > -A OUTPUT -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 443 > --tcp-flags SYN,RST,ACK SYN -m owner --uid-owner squid -j ACCEPT > -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT > COMMIT > # Completed on Thu Feb 10 20:02:43 2005 > > -- I love deadlines. I like the whooshing sound they make as they fly by. Douglas Adams ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Linux as router (Gateway Server) 2005-02-12 8:15 ` Askar @ 2005-02-13 16:06 ` Navneet Choudhary 0 siblings, 0 replies; 17+ messages in thread From: Navneet Choudhary @ 2005-02-13 16:06 UTC (permalink / raw) To: Askar; +Cc: netfilter@lists.netfilter.org > dude add this rule to yur iptables script > iptables -A INPUT -p tcp -s 0/0 --dport 80 -j ACCEPT tried this, problem still exists. > second "squid squid[3720]: Squid Parent: child process 3722 > exited due to signal 6" is not iptables related, better place to check > is squid mailing list. Didn't i mentioned in my original mail "Since, process will NOT die if I disable/flush my rules?" > You are running squid in interception mode? so , what > remember when squid is running in interception packets destined fro > squid machine not hit FORWARD chain but INPUT. :) Then, allowing INPUT to port 80 should have worked? Since, i've already allowed local loopback in my rules. > Note: which version of squid you are using, what cache.log say? > solution try to upgrade your squid with never version. squid-2.5.STABLE7 at the time installation latest one. upgrade? anyperticular strong reason for that? > I hope this will help > > regards > > On Sat, 12 Feb 2005 13:18:25 +0530, Navneet Choudhary > <navneetkc@gmail.com> wrote: > > hi list, > > > > i require further co-operation from yours side. > > > > Squid Server is serving as Proxy server, Gateway & Firewall > > > > Problem: > > Squid daemon dies at startup. > > > > Here is log output of /var/log/messages > > > > Feb 12 09:15:25 squid squid[3652]: Squid Parent: child process 3654 started > > Feb 12 09:15:25 squid (squid): Cannot open HTTP Port > > Feb 12 09:15:29 squid squid[3720]: Squid Parent: child process 3722 > > exited due to signal 6 > > Feb 12 09:15:32 squid squid[3720]: Squid Parent: child process 4385 started > > Feb 12 09:15:32 squid squid[3720]: Squid Parent: child process 4385 > > exited with status 1 > > Feb 12 09:15:33 squid (squid): Cannot open HTTP Port > > > > Why my iptables rule blocking squid to open HTTP port. > > > > Note: existing rule being attached at the end of mail > > > > Since, process will not die if I disable/flush my rules? > > > > Squid being started from /etc/rc.local > > > > Where i am doing mistakes? > > > > Please suggest since its causing startup hiccup > > > > Thanks & regards, > > > > Navneet Choudhary > > > > Updates & quick recap > > > > 1.> Basically I want clients to be able to : > > > > a). Send and receives mails from mail.ISP.net [X.X.X.160] and > > sometimes from X.X.X.78 > > Status: Working > > b). Browse the net through squid [3128] > > Status: Working > > > > c). Use Jabber [??], MSN [1863] and Yahoo [5050] > > Status: Working > > > > d) Down and upload data using ftp from 202.134.192.21 & 221.171.85.41 > > > > Status: Working > > e) Down and upload data using SONICMQ [IP & Port?] > > > > Status: Require HELP > > e) Allow SSH connection to this system [eth0]. > > Status: Working > > f) We can ping/trace route by domain name i.e. ping yahoo.com > > Status: Working > > > > 2.What i am using? > > > > My network configuration is as follows: - > > > > WAN > > | > > eth1 > > (172.21.0.133/28) > > | > > | > > Red Hat 9 > > [Squid Proxy, Gateway ,firewall & FTP] > > | > > | > > | > > (133.147.0.0/16) > > eth0 > > | > > ---- SWITCH---------- > > | > > | > > | > > LAN > > > > where:- > > eth0-Intel Corp. 82557/8/9 [Ethernet Pro 100] > > eth1-Broadcom Corporation NetXtreme BCM5702 Gigabit Ethernet > > > > Kernel 2.4.20-8 > > > > iptables v1.2.7a > > > > 3.What I have done:- > > > > a)Enabled IP forwarding by adding > > vi /etc/sysctl.conf > > > > # Controls IP packet forwarding > > net.ipv4.ip_forward = 1 > > > > b)Automatic loading of modules by adding > > vi /etc/rc.local > > > > /sbin/insmod ip_nat_ftp > > /sbin/insmod ip_conntrack_ftp > > > > b)Firewall rules as follows:- > > # Generated by iptables-save v1.2.7a on Thu Feb 10 20:02:43 2005 > > *mangle > > :PREROUTING ACCEPT [1308:428675] > > :INPUT ACCEPT [1308:428675] > > :FORWARD ACCEPT [0:0] > > :OUTPUT ACCEPT [1273:553710] > > :POSTROUTING ACCEPT [1273:553710] > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG > > FIN,PSH,URG -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG > > FIN,PSH,URG -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG > > FIN,PSH,URG -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG > > FIN,PSH,URG -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP > > -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP > > COMMIT > > # Completed on Thu Feb 10 20:02:43 2005 > > # Generated by iptables-save v1.2.7a on Thu Feb 10 20:02:43 2005 > > *nat > > :PREROUTING ACCEPT [10233:846887] > > :POSTROUTING ACCEPT [71:4821] > > :OUTPUT ACCEPT [67:4688] > > -A POSTROUTING -s 133.147.0.0/255.255.0.0 -o eth1 -j SNAT --to-source > > 172.21.0.132 > > COMMIT > > # Completed on Thu Feb 10 20:02:43 2005 > > # Generated by iptables-save v1.2.7a on Thu Feb 10 20:02:43 2005 > > *filter > > :INPUT DROP [0:0] > > :FORWARD DROP [0:0] > > :OUTPUT DROP [0:0] > > -A INPUT -s 127.0.0.1 -j ACCEPT > > -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT > > -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 3128 > > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > > -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 22 > > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > > -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 21 > > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > > -A INPUT -i eth0 -p tcp -m tcp --sport 1024:65535 --dport 20 > > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > > -A INPUT -p udp -j DROP > > -A INPUT -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j DROP > > -A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT > > -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT > > -A FORWARD -i eth0 -o eth1 -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT > > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 25 > > --tcp-flags SYN,RST,ACK SYN -j ACCEPT > > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport > > 110 --tcp-flags SYN,RST,ACK SYN -j ACCEPT > > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 21 -j ACCEPT > > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 20 -j ACCEPT > > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport > > 1863 --tcp-flags SYN,RST,ACK SYN -j ACCEPT > > -A FORWARD -i eth0 -o eth1 -p tcp -m tcp --sport 1024:65535 --dport > > 5050 --tcp-flags SYN,RST,ACK SYN -j ACCEPT > > -A FORWARD -p icmp -m icmp --icmp-type 8 -j ACCEPT > > -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT > > -A OUTPUT -p udp -m udp --sport 1024:65535 --dport 53 -j ACCEPT > > -A OUTPUT -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 80 > > --tcp-flags SYN,RST,ACK SYN -m owner --uid-owner squid -j ACCEPT > > -A OUTPUT -o eth1 -p tcp -m tcp --sport 1024:65535 --dport 443 > > --tcp-flags SYN,RST,ACK SYN -m owner --uid-owner squid -j ACCEPT > > -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT > > COMMIT > > # Completed on Thu Feb 10 20:02:43 2005 > > > > > > -- > I love deadlines. I like the whooshing sound they make as they fly by. > Douglas Adams > ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-12 7:48 ` Fwd: Linux as router (Gateway Server) Navneet Choudhary 2005-02-12 8:15 ` Askar @ 2005-02-12 14:01 ` Jason Opperisano 2005-02-12 22:02 ` Josh Nerius 2005-02-13 17:04 ` Navneet Choudhary 1 sibling, 2 replies; 17+ messages in thread From: Jason Opperisano @ 2005-02-12 14:01 UTC (permalink / raw) To: netfilter On Sat, 2005-02-12 at 02:48, Navneet Choudhary wrote: > hi list, > > i require further co-operation from yours side. > > Squid Server is serving as Proxy server, Gateway & Firewall > > Problem: > Squid daemon dies at startup. > > Here is log output of /var/log/messages > > Feb 12 09:15:25 squid squid[3652]: Squid Parent: child process 3654 started > Feb 12 09:15:25 squid (squid): Cannot open HTTP Port > Feb 12 09:15:29 squid squid[3720]: Squid Parent: child process 3722 > exited due to signal 6 > Feb 12 09:15:32 squid squid[3720]: Squid Parent: child process 4385 started > Feb 12 09:15:32 squid squid[3720]: Squid Parent: child process 4385 > exited with status 1 > Feb 12 09:15:33 squid (squid): Cannot open HTTP Port that has nothing to do with iptables. my guess is that you are either: (a) telling squid to listen on a port that is already in use by another process (b) trying to start squid after it's already started (c) running squid as an unprivileged user and trying to bind to a privileged port go read: http://www.squid-cache.org/Doc/FAQ/FAQ-11.html#ss11.23 (ps - google is your friend) > Why my iptables rule blocking squid to open HTTP port. it isn't. -j -- "It's not easy to juggle a pregnant wife and a troubled child, but somehow I managed to fit in eight hours of TV a day." --The Simpsons ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-12 14:01 ` Fwd: " Jason Opperisano @ 2005-02-12 22:02 ` Josh Nerius 2005-02-13 2:13 ` Georgi Alexandrov 2005-02-13 17:19 ` Navneet Choudhary 2005-02-13 17:04 ` Navneet Choudhary 1 sibling, 2 replies; 17+ messages in thread From: Josh Nerius @ 2005-02-12 22:02 UTC (permalink / raw) To: Jason Opperisano; +Cc: netfilter >> that has nothing to do with iptables. This could have everything to do with iptables, depending on his configuration. If there is a redirector being used, the connection that a child redirector process makes to the squid daemon can be affected by iptables rules. The fact that it has difficulty binding to the assigned port may be due to other errors related to this child process communication causing the squid process to die before it finishes starting. As to trying to bind to a privileged port from an unprevileged account, he already stated that he's binding to the standard 3128. >> (ps - google is your friend) It may do you good to keep that in mind. > > > Why my iptables rule blocking squid to open HTTP port. I'm currently searching for the exact information from the squid documentation, but when I had a similar problem about 6 months ago, I recall adding rules to the INPUT and possibly OUTPUT chains to accept traffic coming from the loopback interface to/from the squid (or possibly redirector) port. > it isn't. > > -j Jason, please do your homework. You have a good knowledge of netfilter/iptables but please leave subjects you don't understand to those who do. Josh Nerius -- Math problems? Call 1-800-[(10x)(13i)^2]-[sin(xy)/2.362x] ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-12 22:02 ` Josh Nerius @ 2005-02-13 2:13 ` Georgi Alexandrov 2005-02-13 2:33 ` Josh Nerius 2005-02-13 17:21 ` Navneet Choudhary 2005-02-13 17:19 ` Navneet Choudhary 1 sibling, 2 replies; 17+ messages in thread From: Georgi Alexandrov @ 2005-02-13 2:13 UTC (permalink / raw) To: netfilter Josh Nerius wrote: >>>that has nothing to do with iptables. >>> >>> > >This could have everything to do with iptables, depending on his >configuration. If there is a redirector being used, the connection >that a child redirector process makes to the squid daemon can be >affected by iptables rules. The fact that it has difficulty binding to >the assigned port may be due to other errors related to this child >process communication causing the squid process to die before it >finishes starting. > >As to trying to bind to a privileged port from an unprevileged >account, he already stated that he's binding to the standard 3128. > > > >>>(ps - google is your friend) >>> >>> > >It may do you good to keep that in mind. > > > >>>>Why my iptables rule blocking squid to open HTTP port. >>>> >>>> > >I'm currently searching for the exact information from the squid >documentation, but when I had a similar problem about 6 months ago, I >recall adding rules to the INPUT and possibly OUTPUT chains to accept >traffic coming from the loopback interface to/from the squid (or >possibly redirector) port. > > > >>it isn't. >> >>-j >> >> > >Jason, please do your homework. You have a good knowledge of >netfilter/iptables but please leave subjects you don't understand to >those who do. > >Josh Nerius > > > hello josh. I stand 100% with Jason O.'s opinion .. netfilter/iptables has nothing to do with squid binding to some/any port. whoever had to do his homework ... i beleive has done it. Accessing that port is something different (-i lo -j ACCEPT), but i beleive that's not the case. regards, Georgi Alexandrov ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-13 2:13 ` Georgi Alexandrov @ 2005-02-13 2:33 ` Josh Nerius 2005-02-13 11:55 ` Georgi Alexandrov ` (2 more replies) 2005-02-13 17:21 ` Navneet Choudhary 1 sibling, 3 replies; 17+ messages in thread From: Josh Nerius @ 2005-02-13 2:33 UTC (permalink / raw) To: netfilter > hello josh. > > I stand 100% with Jason O.'s opinion .. > netfilter/iptables has nothing to do with squid binding to some/any port. > whoever had to do his homework ... i beleive has done it. > Accessing that port is something different (-i lo -j ACCEPT), but i > beleive that's not the case. > > regards, > Georgi Alexandrov Hello George, From experience...not speculation, I still stand by what I said. Squid can be a strange animal. In many configurations, the communication between child processes relies on being able to communicate via the loopback interface of the machine. Iptables can, and and in configurations I've worked with, has caused the same symptoms described. Basically, the daemon never gets a chance to bind to a port as the initial communication between these child processes is broken causing the entire startup procedure to fail. This makes the illusion that the problem is related to binding the port when in fact the program can't start for other reasons. This problem *can* be caused by firewall rules in place that prevent this communication from happening. If you examine the rulesets posted, it looks like he is using policy DROP on the INPUT chain which may certainly cause problems with squid if proper rules to allow the necessary traffic are not in place. Another thing to note here, and the reason that I'm of the opinion that this could be a netfilter/iptables problem is the fact that the original poster seems to have indicated that squid works when iptables is flushed. The last point mentioned above, coupled with the fact that I've dealt with this problem during the development of a transparent redirection appliance for the company I work for, is why I maintain the opinion that I do. As mentioned before, Jason has a good knowledge of netfilter, but apparently not Squid, thus my homework comment. Thanks, and hopefully this information helps to clarify the information I posted. :-) Josh Nerius -- Math problems? Call 1-800-[(10x)(13i)^2]-[sin(xy)/2.362x] ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-13 2:33 ` Josh Nerius @ 2005-02-13 11:55 ` Georgi Alexandrov 2005-02-13 17:34 ` Navneet Choudhary 2005-02-13 17:26 ` Navneet Choudhary [not found] ` <420F4010.7050609@hotpop.com> 2 siblings, 1 reply; 17+ messages in thread From: Georgi Alexandrov @ 2005-02-13 11:55 UTC (permalink / raw) To: netfilter Josh Nerius wrote: >>hello josh. >> >>I stand 100% with Jason O.'s opinion .. >>netfilter/iptables has nothing to do with squid binding to some/any port. >>whoever had to do his homework ... i beleive has done it. >>Accessing that port is something different (-i lo -j ACCEPT), but i >>beleive that's not the case. >> >>regards, >>Georgi Alexandrov >> >> > >Hello George, > >>From experience...not speculation, I still stand by what I said. > >Squid can be a strange animal. In many configurations, the >communication between child processes relies on being able to >communicate via the loopback interface of the machine. Iptables can, >and and in configurations I've worked with, has caused the same >symptoms described. Basically, the daemon never gets a chance to bind >to a port as the initial communication between these child processes >is broken causing the entire startup procedure to fail. This makes the >illusion that the problem is related to binding the port when in fact >the program can't start for other reasons. > >This problem *can* be caused by firewall rules in place that prevent >this communication from happening. If you examine the rulesets posted, >it looks like he is using policy DROP on the INPUT chain which may >certainly cause problems with squid if proper rules to allow the >necessary traffic are not in place. > >Another thing to note here, and the reason that I'm of the opinion >that this could be a netfilter/iptables problem is the fact that the >original poster seems to have indicated that squid works when iptables >is flushed. > >The last point mentioned above, coupled with the fact that I've dealt >with this problem during the development of a transparent redirection >appliance for the company I work for, is why I maintain the opinion >that I do. > >As mentioned before, Jason has a good knowledge of netfilter, but >apparently not Squid, thus my homework comment. > >Thanks, and hopefully this information helps to clarify the >information I posted. :-) > >Josh Nerius > > > > hola Josh, I did a quick test: DROP policy on the INPUT chain, and flushed all the rules (as a result i couldn't even ping myself) squid: standart debian/unstable package - unprivilleged user, port 3128. the result: squid is able to bind to his port fine, with DROP policy on the INPUT chain and no rules at all. regards, Georgi Alexandrov ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-13 11:55 ` Georgi Alexandrov @ 2005-02-13 17:34 ` Navneet Choudhary 0 siblings, 0 replies; 17+ messages in thread From: Navneet Choudhary @ 2005-02-13 17:34 UTC (permalink / raw) To: Georgi Alexandrov; +Cc: netfilter > hola Josh, hello list, > I did a quick test: > DROP policy on the INPUT chain, and flushed all the rules (as a result i > couldn't even ping myself) please refer my rules before quick test[below line from my original mail's rule set might help you to ping you ping your system ? -A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT > squid: standart debian/unstable package - unprivilleged user, port 3128. > the result: squid is able to bind to his port fine, with DROP policy on > the INPUT chain and no rules at all. reverting to you all shortly with my detail test. > regards, > Georgi Alexandrov Regards, Navneet |Anytime you feel i need to understand | |a concept before i am eligible to get | |an answer i would be happy to know. | ^*******************************************^ ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-13 2:33 ` Josh Nerius 2005-02-13 11:55 ` Georgi Alexandrov @ 2005-02-13 17:26 ` Navneet Choudhary [not found] ` <420F4010.7050609@hotpop.com> 2 siblings, 0 replies; 17+ messages in thread From: Navneet Choudhary @ 2005-02-13 17:26 UTC (permalink / raw) To: Josh Nerius; +Cc: netfilter On Sat, 12 Feb 2005 20:33:52 -0600, Josh Nerius <jnerius@gmail.com> wrote: > > hello josh. > > > > I stand 100% with Jason O.'s opinion .. > > netfilter/iptables has nothing to do with squid binding to some/any port. > > whoever had to do his homework ... i beleive has done it. > > Accessing that port is something different (-i lo -j ACCEPT), but i > > beleive that's not the case. > > > > regards, > > Georgi Alexandrov > > Hello George, > > >From experience...not speculation, I still stand by what I said. > > Squid can be a strange animal. In many configurations, the > communication between child processes relies on being able to > communicate via the loopback interface of the machine. Iptables can, > and and in configurations I've worked with, has caused the same > symptoms described. Basically, the daemon never gets a chance to bind > to a port as the initial communication between these child processes > is broken causing the entire startup procedure to fail. This makes the > illusion that the problem is related to binding the port when in fact > the program can't start for other reasons. > > This problem *can* be caused by firewall rules in place that prevent > this communication from happening. If you examine the rulesets posted, > it looks like he is using policy DROP on the INPUT chain which may > certainly cause problems with squid if proper rules to allow the > necessary traffic are not in place. I will test by removing DROP rule on the INPUT chain. > Another thing to note here, and the reason that I'm of the opinion > that this could be a netfilter/iptables problem is the fact that the > original poster seems to have indicated that squid works when iptables > is flushed. > > The last point mentioned above, coupled with the fact that I've dealt > with this problem during the development of a transparent redirection > appliance for the company I work for, is why I maintain the opinion > that I do. > > As mentioned before, Jason has a good knowledge of netfilter, but > apparently not Squid, thus my homework comment. > > Thanks, and hopefully this information helps to clarify the > information I posted. :-) Sorry, for being so late in replying. > Josh Nerius ^ permalink raw reply [flat|nested] 17+ messages in thread
[parent not found: <420F4010.7050609@hotpop.com>]
* Re: Fwd: Linux as router (Gateway Server) [not found] ` <420F4010.7050609@hotpop.com> @ 2005-02-13 21:38 ` Josh Nerius 2005-02-14 22:15 ` Jason Opperisano 0 siblings, 1 reply; 17+ messages in thread From: Josh Nerius @ 2005-02-13 21:38 UTC (permalink / raw) To: netfilter > hola Josh, > > I did a quick test: > DROP policy on the INPUT chain, and flushed all the rules (as a result i > couldn't even ping myself) > squid: standart debian/unstable package - unprivilleged user, port 3128. > the result: squid is able to bind to his port fine, with DROP policy on > the INPUT chain and no rules at all. > > regards, > Georgi Alexandrov George, As Navneet pointed out, he using a redirector (squidguard). This is exactly what I suspected, and exactly what I explained. The reasons you had the results you did, is because your setup is *not* duplicating that of Navneets or the situation I described. I find it amusing, but irritating, that you seem to be trying to prove what I have said wrong when you do not have an understanding of the problem, or the information I provided. ------------------------------ Navneet, I had the same issue you are experiencing while using SquidGuard some time back. The resolution was playing with accepting traffic from and to 127.0.0.1. I honestly don't remember the exact rules as it was some time ago I dealt with this issue, but a minor amount of experimentation should prove to solve the issue. I'm currently digging through old configs etc and will let you know if/when I find the exact rules I put in place to resolve the issue. I hope everything works out for you. -- Math problems? Call 1-800-[(10x)(13i)^2]-[sin(xy)/2.362x] ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-13 21:38 ` Josh Nerius @ 2005-02-14 22:15 ` Jason Opperisano 2005-02-15 2:32 ` Josh Nerius 0 siblings, 1 reply; 17+ messages in thread From: Jason Opperisano @ 2005-02-14 22:15 UTC (permalink / raw) To: netfilter On Sun, 2005-02-13 at 16:38, Josh Nerius wrote: > Navneet, > > I had the same issue you are experiencing while using SquidGuard some > time back. The resolution was playing with accepting traffic from and > to 127.0.0.1. I honestly don't remember the exact rules as it was some > time ago I dealt with this issue, but a minor amount of > experimentation should prove to solve the issue. I'm currently digging > through old configs etc and will let you know if/when I find the exact > rules I put in place to resolve the issue. > > I hope everything works out for you. didn't someone in this thread already point out that his rules don't include: iptables -A INPUT -i lo -j ACCEPT iptables -A OUTPUT -o lo -j ACCEPT -j -- "Asleep at the switch? I wasn't asleep, I was drunk!" --The Simpsons ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-14 22:15 ` Jason Opperisano @ 2005-02-15 2:32 ` Josh Nerius 0 siblings, 0 replies; 17+ messages in thread From: Josh Nerius @ 2005-02-15 2:32 UTC (permalink / raw) To: netfilter > didn't someone in this thread already point out that his rules don't > include: > > iptables -A INPUT -i lo -j ACCEPT > iptables -A OUTPUT -o lo -j ACCEPT > > -j Yes, I believe I said something to that effect in my original reply. -- Math problems? Call 1-800-[(10x)(13i)^2]-[sin(xy)/2.362x] ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-13 2:13 ` Georgi Alexandrov 2005-02-13 2:33 ` Josh Nerius @ 2005-02-13 17:21 ` Navneet Choudhary 1 sibling, 0 replies; 17+ messages in thread From: Navneet Choudhary @ 2005-02-13 17:21 UTC (permalink / raw) To: Georgi Alexandrov; +Cc: netfilter > hello josh. > > I stand 100% with Jason O.'s opinion .. > netfilter/iptables has nothing to do with squid binding to some/any port. > whoever had to do his homework ... i beleive has done it. > Accessing that port is something different (-i lo -j ACCEPT), but i > beleive that's not the case. any pointer? > regards, > Georgi Alexandrov > > ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-12 22:02 ` Josh Nerius 2005-02-13 2:13 ` Georgi Alexandrov @ 2005-02-13 17:19 ` Navneet Choudhary 1 sibling, 0 replies; 17+ messages in thread From: Navneet Choudhary @ 2005-02-13 17:19 UTC (permalink / raw) To: Josh Nerius; +Cc: netfilter On Sat, 12 Feb 2005 16:02:58 -0600, Josh Nerius <jnerius@gmail.com> wrote: > >> that has nothing to do with iptables. > > This could have everything to do with iptables, depending on his > configuration. If there is a redirector being used, the connection > that a child redirector process makes to the squid daemon can be yes i am using SquidGuard > affected by iptables rules. The fact that it has difficulty binding to > the assigned port may be due to other errors related to this child > process communication causing the squid process to die before it > finishes starting. > > As to trying to bind to a privileged port from an unprevileged > account, he already stated that he's binding to the standard 3128. > > >> (ps - google is your friend) > > It may do you good to keep that in mind. > > > > > Why my iptables rule blocking squid to open HTTP port. > > I'm currently searching for the exact information from the squid > documentation, but when I had a similar problem about 6 months ago, I > recall adding rules to the INPUT and possibly OUTPUT chains to accept > traffic coming from the loopback interface to/from the squid (or > possibly redirector) port. Allowing loopback[used] -A INPUT -s 127.0.0.1 -j ACCEPT Any other rule ? possible for OUTPUT > > it isn't. > > > > -j > > Jason, please do your homework. You have a good knowledge of > netfilter/iptables but please leave subjects you don't understand to > those who do. > > Josh Nerius > > -- > Math problems? Call 1-800-[(10x)(13i)^2]-[sin(xy)/2.362x] > > ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: Fwd: Linux as router (Gateway Server) 2005-02-12 14:01 ` Fwd: " Jason Opperisano 2005-02-12 22:02 ` Josh Nerius @ 2005-02-13 17:04 ` Navneet Choudhary 1 sibling, 0 replies; 17+ messages in thread From: Navneet Choudhary @ 2005-02-13 17:04 UTC (permalink / raw) To: Jason Opperisano; +Cc: netfilter > > Feb 12 09:15:33 squid (squid): Cannot open HTTP Port > > that has nothing to do with iptables. my guess is that you are either: > > (a) telling squid to listen on a port that is already in use by another process No, squid is listening on port 3128(not used by any process) > (b) trying to start squid after it's already started No, it's just started once. > (c) running squid as an unprivileged user and trying to bind to a > privileged port No, it's being started by root.Afterward it's owned by squid Is this stopping squid to access HTTP port? Since, OUTPUT rule only allow user squid to access port 80 [Wild guess] -A OUTPUT -o eth1 -p tcp -m tcp --sport 1024:65535 \ --dport 80 --tcp-flags SYN,RST,ACK SYN -m owner --uid-owner squid -j ACCEPT > go read: > > http://www.squid-cache.org/Doc/FAQ/FAQ-11.html#ss11.23 > > (ps - google is your friend) Always been our friend. > > Why my iptables rule blocking squid to open HTTP port. > > it isn't. I think some way this problem is related to iptables rule Since, squid daemon won't die if i start it with no fireawall rule (allowing everything to pass, no blocking/restrictions) > -j By the way, all my iptables rules were lifted or inspired by yours reply to this mailing list[posted this month itself]. Thank you for your help & co-operation regards, Navneet > -- > "It's not easy to juggle a pregnant wife and a troubled child, but > somehow I managed to fit in eight hours of TV a day." > --The Simpsons > > ^ permalink raw reply [flat|nested] 17+ messages in thread
* RE: Fwd: Linux as router (Gateway Server) @ 2005-02-13 17:24 Gary W. Smith 0 siblings, 0 replies; 17+ messages in thread From: Gary W. Smith @ 2005-02-13 17:24 UTC (permalink / raw) To: Navneet Choudhary, Josh Nerius; +Cc: netfilter Wouldn't it just easier to put a log statement before the drop so you can see what iptables is dropping? This might really simplify your troubleshooting. Besides Google, log files are your friends as well. If your default rule is to DROP everything but the log isn't catching anything then you have another problem otherwise you'll know immediately which ports to open. Gary Smith ^ permalink raw reply [flat|nested] 17+ messages in thread
end of thread, other threads:[~2005-02-15 2:32 UTC | newest]
Thread overview: 17+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <1dceb012050211233357e23dd4@mail.gmail.com>
2005-02-12 7:48 ` Fwd: Linux as router (Gateway Server) Navneet Choudhary
2005-02-12 8:15 ` Askar
2005-02-13 16:06 ` Navneet Choudhary
2005-02-12 14:01 ` Fwd: " Jason Opperisano
2005-02-12 22:02 ` Josh Nerius
2005-02-13 2:13 ` Georgi Alexandrov
2005-02-13 2:33 ` Josh Nerius
2005-02-13 11:55 ` Georgi Alexandrov
2005-02-13 17:34 ` Navneet Choudhary
2005-02-13 17:26 ` Navneet Choudhary
[not found] ` <420F4010.7050609@hotpop.com>
2005-02-13 21:38 ` Josh Nerius
2005-02-14 22:15 ` Jason Opperisano
2005-02-15 2:32 ` Josh Nerius
2005-02-13 17:21 ` Navneet Choudhary
2005-02-13 17:19 ` Navneet Choudhary
2005-02-13 17:04 ` Navneet Choudhary
2005-02-13 17:24 Gary W. Smith
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.