netfilter.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* FORWARD -P DROP + allow MSN
@ 2009-04-16  9:30 Mihamina Rakotomandimby (R12y)
  2009-04-16 10:10 ` Mart Frauenlob
  0 siblings, 1 reply; 4+ messages in thread
From: Mihamina Rakotomandimby (R12y) @ 2009-04-16  9:30 UTC (permalink / raw)
  To: netfilter

Hi,
These are my current rules:
http://lab.vectoris.fr/projects/vectoris/browser/IPTables/trunk/firewall
(It's a big mess yet because I miss one feature: MSN. I'll clean it later)

The box it's running on is the gateway of the LAN to the Internet.

As you noticed, FORWARD is DROP by default.

I would like to allow MSN to my LAN users.

The problem:
If I "FORWARD -P ACCEPT", MSN works for the LAN users.

If I use it as it is now, MSN doesnt work.

Anyway, when setting the MSN LAN clients to use HTTP, it's OK with this config.

Any tips?
Thank you.

PS: no comments on the crappy Facebook DROP ;-).
-- 
                              Chef de projet chez Vectoris
                                  Phone: +261 33 11 207 36
System: xUbuntu 8.10 with almost all from package install
    http://www.google.com/search?q=mihamina+rakotomandimby

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: FORWARD -P DROP + allow MSN
  2009-04-16  9:30 FORWARD -P DROP + allow MSN Mihamina Rakotomandimby (R12y)
@ 2009-04-16 10:10 ` Mart Frauenlob
  2009-04-16 11:30   ` Mihamina Rakotomandimby (R12y)
  0 siblings, 1 reply; 4+ messages in thread
From: Mart Frauenlob @ 2009-04-16 10:10 UTC (permalink / raw)
  To: netfilter

Mihamina Rakotomandimby (R12y) wrote:
> Hi,
> These are my current rules:
> http://lab.vectoris.fr/projects/vectoris/browser/IPTables/trunk/firewall
> (It's a big mess yet because I miss one feature: MSN. I'll clean it 
> later)
>
> The box it's running on is the gateway of the LAN to the Internet.
>
> As you noticed, FORWARD is DROP by default.
>
> I would like to allow MSN to my LAN users.
>
> The problem:
> If I "FORWARD -P ACCEPT", MSN works for the LAN users.
>
> If I use it as it is now, MSN doesnt work.
>
> Anyway, when setting the MSN LAN clients to use HTTP, it's OK with 
> this config.
>
> Any tips?
> Thank you.
>
> PS: no comments on the crappy Facebook DROP ;-).

Hello,

first let me spend a few words on your current ruleset:

- The whole forwarding is stateless!
I strongly suggest to change that.
Allow that ports for your lan with something like that:
iptables -A FORWARD -i $WAN -o $LAN -d $ACCEPTED_MACHINE -m state 
--state ESTABLISHED,RELATED -j ACCEPT

this is the general 'allow all back in, which is tracked by the state 
machine' match.
now your ports:
iptables -A FORWARD -i $LAN -o $WAN -s $ACCEPTED_MACHINE -p tcp -m 
multiport --dports x,y,z... -m state --state NEW,ESTABLISHED -j ACCEPT

[...]
Same thing maybe on your $ACCEPTED_PORT in INPUT chain.

- Don't allow all icmp. Do you want your firewall to accept icmp 
redirects? Guess not...

- I will say some about the Facebook drop:
$IPT -A INPUT   -p tcp -i $LAN         --destination  $IP_FACEBOOK -j DROP
is completely unnecessary. Will never match, unless your box holds a 
Facebook hosts IP.

Now, let me think about the MSN thing. Personally I never used it, and 
don't know what configuration it may need. Didn't try to look it up now too.
But, one thing I noticed:
You REDIRECT all port 80 traffic to the local port 3128. HTTP proxy I 
guess...
Now MSN uses all those ports and as it looks port 80.
If now port 80 traffic goes over the http proxy and the rest of the 
traffic does not, that may cause the MSN applications to fail.
How about a socks proxy for MSN? I just guess client applications will 
have such a feature. In that case, your socks proxy does all the work, 
and you only have to open that port on the inside of the lan.

Hope it helps...

greets

Mart


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: FORWARD -P DROP + allow MSN
  2009-04-16 10:10 ` Mart Frauenlob
@ 2009-04-16 11:30   ` Mihamina Rakotomandimby (R12y)
  2009-04-16 13:31     ` Mart Frauenlob
  0 siblings, 1 reply; 4+ messages in thread
From: Mihamina Rakotomandimby (R12y) @ 2009-04-16 11:30 UTC (permalink / raw)
  To: netfilter

Mart Frauenlob wrote:
> - The whole forwarding is stateless!
> I strongly suggest to change that.
> Allow that ports for your lan with something like that:
> iptables -A FORWARD -i $WAN -o $LAN -d $ACCEPTED_MACHINE -m state 
> --state ESTABLISHED,RELATED -j ACCEPT

Done.

> this is the general 'allow all back in, which is tracked by the state 
> machine' match.
> now your ports:
> iptables -A FORWARD -i $LAN -o $WAN -s $ACCEPTED_MACHINE -p tcp -m 
> multiport --dports x,y,z... -m state --state NEW,ESTABLISHED -j ACCEPT
> 
> [...]
> Same thing maybe on your $ACCEPTED_PORT in INPUT chain.

Erm, supposing I will have to add some more ports, I'd rather add them in 
one place than in each line, so, for that purpose, looping seems better for 
me.

> - Don't allow all icmp. Do you want your firewall to accept icmp 
> redirects? Guess not...

Okay, It's just in order to debug, because we make several traceroutes.

> - I will say some about the Facebook drop:
> $IPT -A INPUT   -p tcp -i $LAN         --destination  $IP_FACEBOOK -j DROP

It was for the following REDIRECT.
I did not filter REDIRECTing to the HTTP proxy, I filter when it INPUTs 
after the REDIRECT.

It's just a notice, not from a documentation reading.
Look at my ACCEPTED_PORT, it does not list 80, and web browsing fails if I 
block INPUTs. So, I guessed REDIRECTed packets are INPUT ones after 
REDIRECTion.

> Now, let me think about the MSN thing. Personally I never used it, and 
> don't know what configuration it may need. Didn't try to look it up now 
> too.

Happy you! Some collegues refuse to use Jabber.

> But, one thing I noticed:
> You REDIRECT all port 80 traffic to the local port 3128. HTTP proxy I 
> guess...

IT's the running SQUID, yes.

> Now MSN uses all those ports and as it looks port 80.

I did not understand this sentence.

> If now port 80 traffic goes over the http proxy and the rest of the 
> traffic does not, that may cause the MSN applications to fail.
> How about a socks proxy for MSN? 

Never heard about...

> I just guess client applications will 
> have such a feature. In that case, your socks proxy does all the work, 

I'll try: http://www.google.com/search?q=Ubuntu+SOCKS+proxy+MSN is not the 
right query yet, if you have a more powerful query, please tell ;-)


-- 
                              Chef de projet chez Vectoris
                                  Phone: +261 33 11 207 36
System: xUbuntu 8.10 with almost all from package install
    http://www.google.com/search?q=mihamina+rakotomandimby

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: FORWARD -P DROP + allow MSN
  2009-04-16 11:30   ` Mihamina Rakotomandimby (R12y)
@ 2009-04-16 13:31     ` Mart Frauenlob
  0 siblings, 0 replies; 4+ messages in thread
From: Mart Frauenlob @ 2009-04-16 13:31 UTC (permalink / raw)
  To: netfilter

Mihamina Rakotomandimby (R12y) wrote:
> Mart Frauenlob wrote:
>> - The whole forwarding is stateless!
>> I strongly suggest to change that.
>> Allow that ports for your lan with something like that:
>> iptables -A FORWARD -i $WAN -o $LAN -d $ACCEPTED_MACHINE -m state 
>> --state ESTABLISHED,RELATED -j ACCEPT
>
> Done.
>
>> this is the general 'allow all back in, which is tracked by the state 
>> machine' match.
>> now your ports:
>> iptables -A FORWARD -i $LAN -o $WAN -s $ACCEPTED_MACHINE -p tcp -m 
>> multiport --dports x,y,z... -m state --state NEW,ESTABLISHED -j ACCEPT
>>
>> [...]
>> Same thing maybe on your $ACCEPTED_PORT in INPUT chain.
>
> Erm, supposing I will have to add some more ports, I'd rather add them 
> in one place than in each line, so, for that purpose, looping seems 
> better for me.
>
>> - Don't allow all icmp. Do you want your firewall to accept icmp 
>> redirects? Guess not...
>
> Okay, It's just in order to debug, because we make several traceroutes.
>
>> - I will say some about the Facebook drop:
>> $IPT -A INPUT   -p tcp -i $LAN         --destination  $IP_FACEBOOK -j 
>> DROP
>
> It was for the following REDIRECT.
> I did not filter REDIRECTing to the HTTP proxy, I filter when it 
> INPUTs after the REDIRECT.
>
> It's just a notice, not from a documentation reading.
> Look at my ACCEPTED_PORT, it does not list 80, and web browsing fails 
> if I block INPUTs. So, I guessed REDIRECTed packets are INPUT ones 
> after REDIRECTion.
>
ah, yes... didn't think of that, but than maybe the FORWARD rule is not 
needed....
>> Now, let me think about the MSN thing. Personally I never used it, 
>> and don't know what configuration it may need. Didn't try to look it 
>> up now too.
>
> Happy you! Some collegues refuse to use Jabber.
>
>> But, one thing I noticed:
>> You REDIRECT all port 80 traffic to the local port 3128. HTTP proxy I 
>> guess...
>
> IT's the running SQUID, yes.
>
>> Now MSN uses all those ports and as it looks port 80.
>
> I did not understand this sentence.
>
because you said in your first post:
'Anyway, when setting the MSN LAN clients to use HTTP, it's OK with this 
config. '
And you have those iptables rules opening a lot of ports for MSN traffic.
>> If now port 80 traffic goes over the http proxy and the rest of the 
>> traffic does not, that may cause the MSN applications to fail.
It might happen that a part of the MSN traffic goes over the http proxy 
while the rest not, and that may cause a failure.

>> How about a socks proxy for MSN? 
>
> Never heard about...
>
>> I just guess client applications will have such a feature. In that 
>> case, your socks proxy does all the work, 
>
> I'll try: http://www.google.com/search?q=Ubuntu+SOCKS+proxy+MSN is not 
> the right query yet, if you have a more powerful query, please tell ;-)
>
What clients are you using on the LAN side to connect to the MSN network?
If I open up Windows messenger on xp, under extras, options, network, I 
can specify a socks server.
Your client application(s) should also provide such an option....

Now if you setup a socks server on your router (there are some 
available), and instruct your clients to use the socks server for MSN, 
you don't need to open up firewall ports.

If you don't want that, you need to find out what tcp/udp ports to open 
up for MSN.
Quickly searching brings me this i.e.
http://www.gentoo-wiki.info/Iptables_port_reference#MSN_Messenger

But maybe more is required, I don't know...

One more thing.
I suggest to only REJECT to your LAN(s) as final rule, doing the reject 
thing other than on port 113 (auth) to the outside (untrusted) world, 
can lead to DOS attacks.

greets

Mart


^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2009-04-16 13:31 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-04-16  9:30 FORWARD -P DROP + allow MSN Mihamina Rakotomandimby (R12y)
2009-04-16 10:10 ` Mart Frauenlob
2009-04-16 11:30   ` Mihamina Rakotomandimby (R12y)
2009-04-16 13:31     ` Mart Frauenlob

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).