[Firehol-support] No connectivity off firewall host ??
Trent Goulden
trent at plenty.co.za
Thu Jul 29 16:18:06 BST 2004
Everything else works great, and fireHOL is fantastic
The problem i am experiencing is when firehol is enabled (started) i cannot
connect off the HOST machine.
This is my problem
------ SNIP -----
[root at spawn root]# ping http://www.sourceforge.net
PING sourceforge.net (66.35.250.203) 56(84) bytes of data.
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
--- sourceforge.net ping statistics ---
8 packets transmitted, 0 received, 100% packet loss, time 7016ms
------ SNIP -----
and the logs
------ LOG SNIP -------
Jul 29 02:29:12 spawn kernel: OUT-unknown:IN= OUT=eth0 SRC=*.*.*.200
DST=66.35.250.203 LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8
CODE=0 ID=60510 SEQ=1
Jul 29 02:29:13 spawn kernel: OUT-unknown:IN= OUT=eth0 SRC=*.*.*.200
DST=66.35.250.203 LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8
CODE=0 ID=60510 SEQ=2
Jul 29 02:29:14 spawn kernel: OUT-unknown:IN= OUT=eth0 SRC=*.*.*.200
DST=66.35.250.203 LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8
CODE=0 ID=60510 SEQ=3
------ LOG SNIP -------
All internal eth1 clients have full access, and everything NATS correctly
with External IP mapping.
Just this little issue off the HOST machine.
Conf follows...
thanks in advance
- Trent
version 5
#
# Custom service definitions
#
server_lotusSpam_ports="udp/1440"
client_lotusSpam_ports="1440"
server_rockwell_ports="udp/2222"
client_rockwell_ports="any"
##################################
# OI internal
##################################
INT_IF="eth1"
INT_IP="192.168.0.1"
INT_NET="192.168.0.0/24"
INT_BROADCAST="192.168.0.255"
INT_SPAWN_SERV="all"
SMOKE="192.168.0.129"
DARSH="192.168.0.151"
VIKING="192.168.0.160"
MARK="192.168.0.161"
NICK="192.168.0.162"
STOMPED="192.168.0.163"
##################################
# OI external
##################################
EXT_IF="eth0"
EXT_IP="*.*.*.200"
EXT_NET="*.*.*.0/23"
EXT_BROADCAST="*.*.*.255"
EXT_SPAWN_SERV="ssh icmp"
EXT_SMOKE="*.*.*.129"
EXT_DARSH="*.*.*.*"
EXT_VIKING="*.*.*.160"
EXT_MARK="*.*.*.161"
EXT_NICK="*.*.*.162"
EXT_STOMPED="*.*.*.163"
#################################
# SNAT #
#################################
# SMOKE DNAT & SNAT
#################################
snat to "${EXT_SMOKE}" outface "${EXT_IF}" src "${SMOKE}"
dnat to "${SMOKE}" inface "${EXT_IF}" src not "${INT_NET} ${UNROUTABLE_IPS}"
dst "${EXT_SMOKE}"
# DARSH DNAT & SNAT
#################################
snat to "${EXT_DARSH}" outface "${EXT_IF}" src "${DARSH}"
dnat to "${DARSH}" inface "${EXT_IF}" src not "${INT_NET} ${UNROUTABLE_IPS}"
dst "${EXT_DARSH}"
# VIKING DNAT & SNAT
#################################
snat to "${EXT_VIKING}" outface "${EXT_IF}" src "${VIKING}"
dnat to "${VIKING}" inface "${EXT_IF}" src not "${INT_NET}
${UNROUTABLE_IPS}" dst "${EXT_VIKING}"
# MARK DNAT & SNAT
#################################
snat to "${EXT_MARK}" outface "${EXT_IF}" src "${MARK}"
dnat to "${MARK}" inface "${EXT_IF}" src not "${INT_NET} ${UNROUTABLE_IPS}"
dst "${EXT_MARK}"
# NICK DNAT & SNAT
#################################
snat to "${EXT_NICK}" outface "${EXT_IF}" src "${NICK}"
dnat to "${NICK}" inface "${EXT_IF}" src not "${INT_NET} ${UNROUTABLE_IPS}"
dst "${EXT_NICK}"
# STOMPED DNAT & SNAT
#################################
snat to "${EXT_STOMPED}" outface "${EXT_IF}" src "${STOMPED}"
dnat to "${STOMPED}" inface "${EXT_IF}" src not "${INT_NET}
${UNROUTABLE_IPS}" dst "${EXT_STOMPED}"
# Catchall undefined NAT ???
#################################
snat to "${EXT_IP}" outface "${EXT_IF}" src "${INT_NET}"
#################################
# #
# INTERFACE DEFINITIONS #
# #
# #######################
# INTERNAL IF no protection #
# #
#######################################################
interface "${EXT_IF}" lotusSpamNuke
policy return
server lotusSpam drop dst 255.255.255.255
server rockwell drop dst 255.255.255.255
interface "${INT_IF}" spawnINT src "${INT_NET}" dst "${INT_IP}"
policy reject
server all accept
client all accept
#######################################################
# EXTERNAL IF (multiple ip`s) protected #
#######################################################
# spawn
interface "${EXT_IF}" spawnEXT src "${EXT_NET}" dst "${EXT_IP}"
protection strong
server "ssh" accept
client all accept
policy drop
# smoke
interface "${EXT_IF}" smokeEXT src "${EXT_NET}" dst "${EXT_SMOKE}"
protection strong
client all accept
policy drop
# darsh
interface "${EXT_IF}" darshEXT src "${EXT_NET}" dst "${EXT_DARSH}"
protection strong
client all accept
policy drop
# viking
interface "${EXT_IF}" vikingEXT src "${EXT_NET}" dst "${EXT_VIKING}"
protection strong
client all accept
policy drop
# mark
interface "${EXT_IF}" markEXT src "${EXT_NET}" dst "${EXT_MARK}"
protection strong
client all accept
policy drop
# nick
interface "${EXT_IF}" nickEXT src "${EXT_NET}" dst "${EXT_NICK}"
protection strong
client all accept
policy drop
# stomped
interface "${EXT_IF}" stompedEXT src "${EXT_NET}" dst "${EXT_STOMPED}"
protection strong
client all accept
policy drop
####################################################
# ROUTING SECTION #
####################################################
# Internet 2 LAN
router internet2lan inface "${EXT_IF}" outface "${INT_IF}" dst "${EXT_IP}"
client icmp accept
route all accept
# LAN 2 Internet
router lan2internet inface "${INT_IF}" outface "${EXT_IF}" src "${INT_IP}"
client all accept
route all accept
####################################################
# CLIENT ROUTING IN & OUT #
####################################################
# SMOKE
# SMOKE 2 Lan
router smoke2lan inface "${EXT_IF}" outface "${INT_IF}" dst "${EXT_SMOKE}"
client all accept
route all accept
# SMOKE 2 Internet
router smoke2internet inface "${INT_IF}" outface "${EXT_IF}" src "${SMOKE}"
client all accept
route all accept
# DARSH
# DARSH 2 Lan
router darsh2lan inface "${EXT_IF}" outface "${INT_IF}" dst "${EXT_DARSH}"
client all accept
route all accept
# DARSH 2 Internet
router darsh2internet inface "${INT_IF}" outface "${EXT_IF}" src "${DARSH}"
client all accept
route all accept
# VIKING
# VIKING 2 Lan
router viking2lan inface "${EXT_IF}" outface "${INT_IF}" dst "${EXT_VIKING}"
client all accept
route all accept
# VIKING 2 Internet
router viking2internet inface "${INT_IF}" outface "${EXT_IF}" src
"${VIKING}"
client all accept
route all accept
# MARK
# MARK 2 Lan
router mark2lan inface "${EXT_IF}" outface "${INT_IF}" dst "${EXT_MARK}"
client all accept
route all accept
# MARK 2 Internet
router mark2internet inface "${INT_IF}" outface "${EXT_IF}" src "${MARK}"
client all accept
route all accept
# NICK
# NICK 2 Lan
router nick2lan inface "${EXT_IF}" outface "${INT_IF}" dst "${EXT_NICK}"
client all accept
route all accept
# NICK 2 Internet
router nick2internet inface "${INT_IF}" outface "${EXT_IF}" src "${NICK}"
client all accept
route all accept
# STOMPED
# STOMPED 2 Lan
router stomped2lan inface "${EXT_IF}" outface "${INT_IF}" dst
"${EXT_STOMPED}"
client all accept
route all accept
# STOMPED 2 Internet
router stomped2internet inface "${INT_IF}" outface "${EXT_IF}" src
"${STOMPED}"
client all accept
route all accept
More information about the Firehol-support
mailing list