Linux Netfilter discussions
 help / color / mirror / Atom feed
* Iptables rules...
@ 2002-09-07  9:39 Didier Hung Wan Luk
  2002-09-07 10:36 ` Antony Stone
  0 siblings, 1 reply; 20+ messages in thread
From: Didier Hung Wan Luk @ 2002-09-07  9:39 UTC (permalink / raw)
  To: Netfilter Mailing List

Hi All,


I am new to firewall/iptables can someone help me to clear up some concepts about firewalling?

If my default rule for the input chain of my external interface is DROP need I again specify to DROP packets in the INPUT chain of my external interface?

i.e..

#My Default rule
iptables -P INPUT DROP

#Drop all attempts on my ext. interface trough port 6000:6063

iptables -A INPUT -i ppp0 -p tcp --dport 6000:6063 -j DROP

If I am right I think that I need not include a rule again saying to drop packets to my 6000;6063 ports since I do not have a rule saying to accept connections on these ports...

Thanks,

Didier Hung Wan Luk




^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: Iptables rules...
  2002-09-07  9:39 Didier Hung Wan Luk
@ 2002-09-07 10:36 ` Antony Stone
  0 siblings, 0 replies; 20+ messages in thread
From: Antony Stone @ 2002-09-07 10:36 UTC (permalink / raw)
  To: Netfilter Mailing List

On Saturday 07 September 2002 10:39 am, Didier Hung Wan Luk wrote:

> Hi All,
>
>
> I am new to firewall/iptables can someone help me to clear up some concepts
> about firewalling?
>
> If my default rule for the input chain of my external interface is DROP
> need I again specify to DROP packets in the INPUT chain of my external
> interface?

There is only one INPUT chain.   The rules and the default policy apply to 
all interfaces.

> #My Default rule
> iptables -P INPUT DROP
>
> #Drop all attempts on my ext. interface trough port 6000:6063
>
> iptables -A INPUT -i ppp0 -p tcp --dport 6000:6063 -j DROP
>
> If I am right I think that I need not include a rule again saying to drop
> packets to my 6000;6063 ports since I do not have a rule saying to accept
> connections on these ports...

If you have a default DROP policy, then you should not (normally) need to 
specify any DROP rules.   If you do not have a rule ACCEPTing certain 
packets, then they will be DROPped by default.   That is what the policy is 
for.

For example:

iptables -P INPUT DROP
iptables -A INPUT -p tcp --dport 80 -j ACCEPT

will drop SMTP traffic on port 25, because there is no rule ACCEPTing it.

These rules will also drop POP3, IMAP, FTP, IDENT.......   everything except 
HTTP.

Antony.

-- 

90% of network problems are routing problems.
9 of the remaining 10% are routing problems in the other direction.
The remaining 1% might be something else, but check the routing anyway.


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: Iptables rules...
@ 2002-09-07 11:59 ashivale
  0 siblings, 0 replies; 20+ messages in thread
From: ashivale @ 2002-09-07 11:59 UTC (permalink / raw)
  To: Didier Hung Wan Luk; +Cc: Netfilter Mailing List

[-- Attachment #1: Type: text/plain, Size: 865 bytes --]

Hi,
The default policy you set is the default for all the packets in that chain. Hence you need not specify it again for the INPUT chain.
bye,
Amit

Didier Hung Wan Luk wrote:
> Hi All,
> 
> 
> I am new to firewall/iptables can someone help me to clear up some concepts about firewalling?
> 
> If my default rule for the input chain of my external interface is DROP need I again specify to DROP packets in the INPUT chain of my external interface?
> 
> i.e..
> 
> #My Default rule
> iptables -P INPUT DROP
> 
> #Drop all attempts on my ext. interface trough port 6000:6063
> 
> iptables -A INPUT -i ppp0 -p tcp --dport 6000:6063 -j DROP
> 
> If I am right I think that I need not include a rule again saying to drop packets to my 6000;6063 ports since I do not have a rule saying to accept connections on these ports...
> 
> Thanks,
> 
> Didier Hung Wan Luk
> 
> 


^ permalink raw reply	[flat|nested] 20+ messages in thread

* RE: Iptables rules...
@ 2002-09-09  4:06 Didier Hung Wan Luk
  0 siblings, 0 replies; 20+ messages in thread
From: Didier Hung Wan Luk @ 2002-09-09  4:06 UTC (permalink / raw)
  To: Antony Stone, Netfilter Mailing List

Thanks :-))

Didier Hung Wan Luk
FRCI, Sibotie House
L'Anse Courtois
Pailles
Tel: 230-2869636
Fax: 230-2869629


-----Original Message-----
From: Antony Stone [mailto:Antony@Soft-Solutions.co.uk] 
Sent: Saturday, September 07, 2002 2:37 PM
To: Netfilter Mailing List
Subject: Re: Iptables rules...

On Saturday 07 September 2002 10:39 am, Didier Hung Wan Luk wrote:

> Hi All,
>
>
> I am new to firewall/iptables can someone help me to clear up some concepts
> about firewalling?
>
> If my default rule for the input chain of my external interface is DROP
> need I again specify to DROP packets in the INPUT chain of my external
> interface?

There is only one INPUT chain.   The rules and the default policy apply to 
all interfaces.

> #My Default rule
> iptables -P INPUT DROP
>
> #Drop all attempts on my ext. interface trough port 6000:6063
>
> iptables -A INPUT -i ppp0 -p tcp --dport 6000:6063 -j DROP
>
> If I am right I think that I need not include a rule again saying to drop
> packets to my 6000;6063 ports since I do not have a rule saying to accept
> connections on these ports...

If you have a default DROP policy, then you should not (normally) need to 
specify any DROP rules.   If you do not have a rule ACCEPTing certain 
packets, then they will be DROPped by default.   That is what the policy is 
for.

For example:

iptables -P INPUT DROP
iptables -A INPUT -p tcp --dport 80 -j ACCEPT

will drop SMTP traffic on port 25, because there is no rule ACCEPTing it.

These rules will also drop POP3, IMAP, FTP, IDENT.......   everything except 
HTTP.

Antony.

-- 

90% of network problems are routing problems.
9 of the remaining 10% are routing problems in the other direction.
The remaining 1% might be something else, but check the routing anyway.



^ permalink raw reply	[flat|nested] 20+ messages in thread

* iptables rules
  2005-09-13 22:10     ` Maximum number of rules in iptables? Peggy Kam
@ 2005-09-15 15:22       ` Peggy Kam
  2005-09-15 15:26         ` Jörg Harmuth
  2005-09-15 15:33         ` Jörg Harmuth
  0 siblings, 2 replies; 20+ messages in thread
From: Peggy Kam @ 2005-09-15 15:22 UTC (permalink / raw)
  To: netfilter

Hi,

I have defined the following firewall rule in iptables:

iptables -I FORWARD -s 192.168.22.102 -d 192.168.1.112 -p tcp -m tcp -m
multiport --ports 22,23,24,25 -j ACCEPT

why were the packets able to get to 192.168.1.112 on port 22 when the
packets does not even come from ports 22,23,24 or 25?

Thanks in advance,
Peggy





^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: iptables rules
  2005-09-15 15:22       ` iptables rules Peggy Kam
@ 2005-09-15 15:26         ` Jörg Harmuth
  2005-09-15 15:37           ` Peggy Kam
  2005-09-15 15:33         ` Jörg Harmuth
  1 sibling, 1 reply; 20+ messages in thread
From: Jörg Harmuth @ 2005-09-15 15:26 UTC (permalink / raw)
  To: netfilter

Peggy Kam wrote:
> Hi,
> 
> I have defined the following firewall rule in iptables:
> 
> iptables -I FORWARD -s 192.168.22.102 -d 192.168.1.112 -p tcp -m tcp -m
> multiport --ports 22,23,24,25 -j ACCEPT
> 
> why were the packets able to get to 192.168.1.112 on port 22 when the
> packets does not even come from ports 22,23,24 or 25?

man iptables:

--ports [!] port[,port[,port:port...]]
               Match if either the source or destination
               ports are equal to one
               of the given ports.

So, this is expected behaviour, provided that there are no other rules 
in the way.

HTH,

Joerg



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: iptables rules
  2005-09-15 15:22       ` iptables rules Peggy Kam
  2005-09-15 15:26         ` Jörg Harmuth
@ 2005-09-15 15:33         ` Jörg Harmuth
  1 sibling, 0 replies; 20+ messages in thread
From: Jörg Harmuth @ 2005-09-15 15:33 UTC (permalink / raw)
  To: netfilter

For the sake of completeness :)

Peggy Kam wrote:
> Hi,
> 
> I have defined the following firewall rule in iptables:
> 
> iptables -I FORWARD -s 192.168.22.102 -d 192.168.1.112 -p tcp -m tcp -m
> multiport --ports 22,23,24,25 -j ACCEPT
> 
> why were the packets able to get to 192.168.1.112 on port 22 when the
> packets does not even come from ports 22,23,24 or 25?

man iptables:

multiport

...

       --ports [!] port[,port[,port:port...]]
               Match if either the source or destination
               ports are equal to one
               of the given ports.

So, this is expected behavior, provided that there are no other rules
in the way.

HTH,

Joerg



!DSPAM:43299390313231087616080!


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: iptables rules
  2005-09-15 15:26         ` Jörg Harmuth
@ 2005-09-15 15:37           ` Peggy Kam
  2005-09-15 16:23             ` Jörg Harmuth
  0 siblings, 1 reply; 20+ messages in thread
From: Peggy Kam @ 2005-09-15 15:37 UTC (permalink / raw)
  To: Jörg Harmuth; +Cc: netfilter

did the manpage gets changed recently?  the iptables manpage that I see
states that:

--port [port[,port]]
        Match if the both the source and destination ports are equal to
        each other and to one of the given ports.


On Thu, 2005-09-15 at 17:26 +0200, Jörg Harmuth wrote:
> Peggy Kam wrote:
> > Hi,
> > 
> > I have defined the following firewall rule in iptables:
> > 
> > iptables -I FORWARD -s 192.168.22.102 -d 192.168.1.112 -p tcp -m tcp -m
> > multiport --ports 22,23,24,25 -j ACCEPT
> > 
> > why were the packets able to get to 192.168.1.112 on port 22 when the
> > packets does not even come from ports 22,23,24 or 25?
> 
> man iptables:
> 
> --ports [!] port[,port[,port:port...]]
>                Match if either the source or destination
>                ports are equal to one
>                of the given ports.
> 
> So, this is expected behaviour, provided that there are no other rules 
> in the way.
> 
> HTH,
> 
> Joerg
> 
> 



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: iptables rules
  2005-09-15 15:37           ` Peggy Kam
@ 2005-09-15 16:23             ` Jörg Harmuth
  2005-10-21 13:46               ` Realos
  0 siblings, 1 reply; 20+ messages in thread
From: Jörg Harmuth @ 2005-09-15 16:23 UTC (permalink / raw)
  To: netfilter

Peggy Kam wrote:
> did the manpage gets changed recently?  the iptables manpage that I see
> states that:
> 
> --port [port[,port]]
>         Match if the both the source and destination ports are equal to
>         each other and to one of the given ports.


I see. You are referring to -m mport --port*s* (by the way, there is a 
typo or are you referring to another module ?), which is different from 
-m multiport --port*s* port[...] - which I was referring to. Your rule was

... -m multiport --ports 22,23,24,25 -j ACCEPT

So I looked for multiport.

HTH,

Joerg


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: iptables rules
  2005-09-15 16:23             ` Jörg Harmuth
@ 2005-10-21 13:46               ` Realos
  2005-10-21 16:03                 ` Rob Sterenborg
  2005-10-21 16:19                 ` Jörg Harmuth
  0 siblings, 2 replies; 20+ messages in thread
From: Realos @ 2005-10-21 13:46 UTC (permalink / raw)
  To: netfilter

Jörg Harmuth wanted us to know:


>I see. You are referring to -m mport --port*s* (by the way, there is a 
>typo or are you referring to another module ?), which is different from 
>-m multiport --port*s* port[...] - which I was referring to. Your rule was
>
>... -m multiport --ports 22,23,24,25 -j ACCEPT
>
>So I looked for multiport.

There seems to be an inconsistence between man pages Jörg Harmuth has installed
and of some other people (the original poster and myself at least).

man iptables:

mport
...
 --ports port[,port[,port...]]
	Match if the both the source and destination ports are
	equal to each other and to one  of  the  given
	ports.

multiport
...
	used in conjunction with -p tcp or -p udp.
	rts port[,port[,port...]]
	Match if the both the source and destination ports
	are equal to each other and to one  of  the  given
	ports.

Mar 09, 2002 IPTABLES(8)

BTW, what is the diffence between mport and multiport modules?


-- 
Realos


^ permalink raw reply	[flat|nested] 20+ messages in thread

* RE: iptables rules
  2005-10-21 13:46               ` Realos
@ 2005-10-21 16:03                 ` Rob Sterenborg
  2005-10-21 16:19                 ` Jörg Harmuth
  1 sibling, 0 replies; 20+ messages in thread
From: Rob Sterenborg @ 2005-10-21 16:03 UTC (permalink / raw)
  To: netfilter

> There seems to be an inconsistence between man pages Jörg
> Harmuth has installed and of some other people (the original poster
> and myself at least). 
> 
> man iptables:
> 
> mport
> ...
>  --ports port[,port[,port...]]
> 	Match if the both the source and destination ports are
> 	equal to each other and to one  of  the  given
> 	ports.
> 
> multiport
> ...
> 	used in conjunction with -p tcp or -p udp.
> 	rts port[,port[,port...]]
> 	Match if the both the source and destination ports
> 	are equal to each other and to one  of  the  given 	ports.
> 
> Mar 09, 2002 IPTABLES(8)
> 
> BTW, what is the diffence between mport and multiport modules?

Mport is obsoleted according to :
http://www.netfilter.org/projects/patch-o-matic/pom-obsolete.html

Searching the Netfilter site I read that mport was to be combined with
multiport :
http://www.netfilter.org/documentation/conferences/nf-workshop-2004-summ
ary.html (mport TODO: combine with multiport). So, I think this work has
been done.


Gr,
Rob



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: iptables rules
  2005-10-21 13:46               ` Realos
  2005-10-21 16:03                 ` Rob Sterenborg
@ 2005-10-21 16:19                 ` Jörg Harmuth
  1 sibling, 0 replies; 20+ messages in thread
From: Jörg Harmuth @ 2005-10-21 16:19 UTC (permalink / raw)
  To: netfilter

Realos wrote:
> Jörg Harmuth wanted us to know:
> 
> 
>> I see. You are referring to -m mport --port*s* (by the way, there is a 
>> typo or are you referring to another module ?), which is different from 
>> -m multiport --port*s* port[...] - which I was referring to. Your rule was
>>
>> ... -m multiport --ports 22,23,24,25 -j ACCEPT
>>
>> So I looked for multiport.
> 
> There seems to be an inconsistence between man pages Jörg Harmuth has installed
> and of some other people (the original poster and myself at least).
> 
> man iptables:
> 
> mport
> ...
>  --ports port[,port[,port...]]
> 	Match if the both the source and destination ports are
> 	equal to each other and to one  of  the  given
> 	ports.
> 
> multiport
> ...
> 	used in conjunction with -p tcp or -p udp.
> 	rts port[,port[,port...]]
> 	Match if the both the source and destination ports
> 	are equal to each other and to one  of  the  given
> 	ports.
> 
> Mar 09, 2002 IPTABLES(8)
> 
> BTW, what is the diffence between mport and multiport modules?
> 
> 

Hmm, interesting. I looked again and I see:

man iptables:

  mport
    --ports port[,port[,port...]]
            Match if the both the source and destination ports are
            equal to each other and to one of the given ports.

  multiport
    --ports [!] port[,port[,port:port...]]
            Match if either the source or destination ports are
            equal to one of the given ports.

My iptables is a self compiled 1.3.3 running on Sarge, one box with 
kernel 2.4.31 the other box with kernel 2.6.13.1. May be an iptables 
version issue ?

Have a nice time,

Joerg



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Iptables rules.
@ 2007-09-22 18:57 Shams Fantar
  2007-09-22 19:32 ` Eljas Alakulppi
  2007-09-22 19:44 ` Mike Wright
  0 siblings, 2 replies; 20+ messages in thread
From: Shams Fantar @ 2007-09-22 18:57 UTC (permalink / raw)
  To: netfilter

Hello,

I am writing iptables rules. Here is the rules, they are in a script : 
http://jumble.snurf.info/iptables-start

When I use it, It blocks all access to the network. Why ?

Do you have suggestions for my rules ?

Regards,

-- 
Shams Fantar (http://snurf.info)


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: Iptables rules.
  2007-09-22 18:57 Iptables rules Shams Fantar
@ 2007-09-22 19:32 ` Eljas Alakulppi
  2007-09-22 19:44 ` Mike Wright
  1 sibling, 0 replies; 20+ messages in thread
From: Eljas Alakulppi @ 2007-09-22 19:32 UTC (permalink / raw)
  To: Shams Fantar, netfilter

Add:
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT

Reason: You aren't allowing the incoming packets from the host you are  
connected to (you send a packet, server recieves the packet, server sends  
reply, your iptables rules drop it).

Shams Fantar <sfantar@snurf.info> kirjoitti Sat, 22 Sep 2007 21:57:21  
+0300:

> Hello,
>
> I am writing iptables rules. Here is the rules, they are in a script :  
> http://jumble.snurf.info/iptables-start
>
> When I use it, It blocks all access to the network. Why ?
>
> Do you have suggestions for my rules ?
>
> Regards,
>



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: Iptables rules.
  2007-09-22 18:57 Iptables rules Shams Fantar
  2007-09-22 19:32 ` Eljas Alakulppi
@ 2007-09-22 19:44 ` Mike Wright
  1 sibling, 0 replies; 20+ messages in thread
From: Mike Wright @ 2007-09-22 19:44 UTC (permalink / raw)
  To: Shams Fantar; +Cc: netfilter

Shams Fantar wrote:
> Hello,
> 
> I am writing iptables rules. Here is the rules, they are in a script : 
> http://jumble.snurf.info/iptables-start
> 
> When I use it, It blocks all access to the network. Why ?
> 
> Do you have suggestions for my rules ?

There has to be a way for replies to outbound traffic to get back in. 
Maybe this (probably near the top):

iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

The rules -A OUTPUT aren't needed because OUTPUT's policy is already ACCEPT.

hth,
:m)

^ permalink raw reply	[flat|nested] 20+ messages in thread

* Iptables Rules
@ 2008-04-08 22:01 Minh Cao
  2008-04-09  4:12 ` Jan Engelhardt
  0 siblings, 1 reply; 20+ messages in thread
From: Minh Cao @ 2008-04-08 22:01 UTC (permalink / raw)
  To: netfilter

Hi, 
Is that matter if I placed the options/extensions ( -m
and -p ) in different orders ? 

Please tell me these 4 configurations make any
difference ... in term allows ssh to my workstation. 


-A INPUT -s 1.2.3.0/24 -p tcp -m tcp --dport 22 -j
ACCEPT 


-A INPUT -s 1.2.3.0/24 -m tcp -p tcp --dport 22 -j
ACCEPT 


-A INPUT -s 1.2.3.0/24 -p tcp -m state --state NEW -m
tcp --dport 22 -j ACCEPT 


-A INPUT -s 1.2.3.0/24 -m state --state NEW -m tcp -p
tcp --dport 22 -j ACCEPT 


Thanks ! 




^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: Iptables Rules
  2008-04-08 22:01 Minh Cao
@ 2008-04-09  4:12 ` Jan Engelhardt
  0 siblings, 0 replies; 20+ messages in thread
From: Jan Engelhardt @ 2008-04-09  4:12 UTC (permalink / raw)
  To: Minh Cao; +Cc: netfilter


On Wednesday 2008-04-09 00:01, Minh Cao wrote:
>Hi, 
>Is that matter if I placed the options/extensions ( -m
>and -p ) in different orders ? 

No, but it matters between multiple -m.

>-A INPUT -s 1.2.3.0/24 -p tcp -m tcp --dport 22 -j
>ACCEPT 
>-A INPUT -s 1.2.3.0/24 -m tcp -p tcp --dport 22 -j
>ACCEPT 

no

>-A INPUT -s 1.2.3.0/24 -p tcp -m state --state NEW -m
>tcp --dport 22 -j ACCEPT 
>
>
>-A INPUT -s 1.2.3.0/24 -m state --state NEW -m tcp -p
>tcp --dport 22 -j ACCEPT 

no.

(But "-m conntrack --ctstate NEW -m tcp" and 
     "-m tcp -m conntrack --ctstate NEW" would)

^ permalink raw reply	[flat|nested] 20+ messages in thread

* RE: Iptables Rules
       [not found] <47fc8b35.0e1f400a.4de1.0570@mx.google.com>
@ 2008-04-09  9:53 ` Jan Engelhardt
  2008-04-09 17:01   ` Minh Cao
  0 siblings, 1 reply; 20+ messages in thread
From: Jan Engelhardt @ 2008-04-09  9:53 UTC (permalink / raw)
  To: Ukeme Noah; +Cc: 'Minh Cao', netfilter


>On Wednesday 2008-04-09 00:01, Minh Cao wrote:
>>Hi, 
>>Is that matter if I placed the options/extensions ( -m
>>and -p ) in different orders ? 
>
>No, but it matters between multiple -m.

On Wednesday 2008-04-09 11:23, Ukeme Noah wrote:
>Howdy,
>The last two, the ones using the state machine might give you problems if
>you use only those without specifying to allow established ssh connections.
>
>So, I'd suggest you add ,ESTABLISHED right after NEW to make the line

Adding random states to rules of which you do not have the context
is unlikely to be fruitful.


^ permalink raw reply	[flat|nested] 20+ messages in thread

* RE: Iptables Rules
  2008-04-09  9:53 ` Iptables Rules Jan Engelhardt
@ 2008-04-09 17:01   ` Minh Cao
  2008-04-09 17:03     ` Jan Engelhardt
  0 siblings, 1 reply; 20+ messages in thread
From: Minh Cao @ 2008-04-09 17:01 UTC (permalink / raw)
  To: Jan Engelhardt, Ukeme Noah; +Cc: 'Minh Cao', netfilter

Thanks for your help !

Please explain why these two acting differently.
On #2 I can login as anonymous, but ls.
Can I combine two rules into one ?

1/ 
-A INPUT -m state --state RELATED,ESTABLISHED -j
ACCEPT
-A INPUT -m state --state NEW -p tcp -m tcp --dport 21
-j ACCEPT

2/
-A INPUT -m state --state NEW,RELATED,ESTABLISHED -p
tcp -m tcp --dport 21 -j ACCEPT






--- Jan Engelhardt <jengelh@computergmbh.de> wrote:

> 
> >On Wednesday 2008-04-09 00:01, Minh Cao wrote:
> >>Hi, 
> >>Is that matter if I placed the options/extensions
> ( -m
> >>and -p ) in different orders ? 
> >
> >No, but it matters between multiple -m.
> 
> On Wednesday 2008-04-09 11:23, Ukeme Noah wrote:
> >Howdy,
> >The last two, the ones using the state machine
> might give you problems if
> >you use only those without specifying to allow
> established ssh connections.
> >
> >So, I'd suggest you add ,ESTABLISHED right after
> NEW to make the line
> 
> Adding random states to rules of which you do not
> have the context
> is unlikely to be fruitful.
> 
> --
> To unsubscribe from this list: send the line
> "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at 
> http://vger.kernel.org/majordomo-info.html
> 


^ permalink raw reply	[flat|nested] 20+ messages in thread

* RE: Iptables Rules
  2008-04-09 17:01   ` Minh Cao
@ 2008-04-09 17:03     ` Jan Engelhardt
  0 siblings, 0 replies; 20+ messages in thread
From: Jan Engelhardt @ 2008-04-09 17:03 UTC (permalink / raw)
  To: Minh Cao; +Cc: Ukeme Noah, netfilter


On Wednesday 2008-04-09 19:01, Minh Cao wrote:
>Thanks for your help !
>
>Please explain why these two acting differently.
>On #2 I can login as anonymous, but ls.
                                ^ but not ls

That's because in #2, you limit RELATED to port 21,
which is essentially meaningless.
In #1, RELATED applies to any port (as does ESTABLISHED).

>Can I combine two rules into one ?
>
>1/ 
>-A INPUT -m state --state RELATED,ESTABLISHED -j
>ACCEPT
>-A INPUT -m state --state NEW -p tcp -m tcp --dport 21
>-j ACCEPT

No.

^ permalink raw reply	[flat|nested] 20+ messages in thread

end of thread, other threads:[~2008-04-09 17:03 UTC | newest]

Thread overview: 20+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <47fc8b35.0e1f400a.4de1.0570@mx.google.com>
2008-04-09  9:53 ` Iptables Rules Jan Engelhardt
2008-04-09 17:01   ` Minh Cao
2008-04-09 17:03     ` Jan Engelhardt
2008-04-08 22:01 Minh Cao
2008-04-09  4:12 ` Jan Engelhardt
  -- strict thread matches above, loose matches on Subject: below --
2007-09-22 18:57 Iptables rules Shams Fantar
2007-09-22 19:32 ` Eljas Alakulppi
2007-09-22 19:44 ` Mike Wright
2005-08-04 19:36 multiports Peggy Kam
2005-08-05  6:34 ` multiports Jan Engelhardt
2005-08-10 20:13   ` Maximum number of ports? Peggy Kam
2005-09-13 22:10     ` Maximum number of rules in iptables? Peggy Kam
2005-09-15 15:22       ` iptables rules Peggy Kam
2005-09-15 15:26         ` Jörg Harmuth
2005-09-15 15:37           ` Peggy Kam
2005-09-15 16:23             ` Jörg Harmuth
2005-10-21 13:46               ` Realos
2005-10-21 16:03                 ` Rob Sterenborg
2005-10-21 16:19                 ` Jörg Harmuth
2005-09-15 15:33         ` Jörg Harmuth
2002-09-09  4:06 Iptables rules Didier Hung Wan Luk
2002-09-07 11:59 ashivale
2002-09-07  9:39 Didier Hung Wan Luk
2002-09-07 10:36 ` Antony Stone

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox