sslug-teknik team mailing list archive
-
sslug-teknik team
-
Mailing list archive
-
Message #41084
imap og pop3 sammen med ipchains
Hej jeg kan ikke få adgang til imap eller pop3 under RH 7.1
mit firewall script ser sådan her ud
#!/bin/sh
#
# rc.firewall - Initial SIMPLE IP Masquerade test for 2.1.x and 2.2.x
kernels
# added support for 2.4.x kernels
# using IPCHAINS
#
# Load all required IP MASQ modules
#
# NOTE: Only load the IP MASQ modules you need. All current IP MASQ
modules
# are shown below but are commented out from loading.
# Needed to initially load modules
#
/sbin/depmod -a
# Load Support for ipchains under 2.4.* kernel
#
/sbin/modprobe ipchains
# Supports the proper masquerading of FTP file transfers using the PORT
method
#
/sbin/modprobe ip_masq_ftp
# Supports the masquerading of RealAudio over UDP. Without this module,
# RealAudio WILL function but in TCP mode. This can cause a
reduction
# in sound quality
#
#/sbin/modprobe ip_masq_raudio
# Supports the masquerading of IRC DCC file transfers
#
#/sbin/modprobe ip_masq_irc
# Supports the masquerading of Quake and QuakeWorld by default. This
modules is
# for for multiple users behind the Linux MASQ server. If you are
going to
# play Quake I, II, and III, use the second example.
#
# NOTE: If you get ERRORs loading the QUAKE module, you are running
an old
# ----- kernel that has bugs in it. Please upgrade to the newest
kernel.
#
#Quake I / QuakeWorld (ports 26000 and 27000)
#/sbin/modprobe ip_masq_quake
#
#Quake I/II/III / QuakeWorld (ports 26000, 27000, 27910, 27960)
#/sbin/modprobe ip_masq_quake 26000,27000,27910,27960
# Supports the masquerading of the CuSeeme video conferencing software
#
#/sbin/modprobe ip_masq_cuseeme
#Supports the masquerading of the VDO-live video conferencing software
#
#/sbin/modprobe ip_masq_vdolive
#CRITICAL: Enable IP forwarding since it is disabled by default since
#
# Redhat Users: you may try changing the options in
# /etc/sysconfig/network from:
#
# FORWARD_IPV4=false
# to
# FORWARD_IPV4=true
#
#echo "1" > /proc/sys/net/ipv4/ip_forward
#CRITICAL: Enable automatic IP defragmenting since it is disabled by
default
# in 2.2.x kernels. This used to be a compile-time option but
the
# behavior was changed in 2.2.12
#
#echo "1" > /proc/sys/net/ipv4/ip_always_defrag
# Dynamic IP users:
#
# If you get your IP address dynamically from SLIP, PPP, or DHCP,
enable this # following option. This enables dynamic-ip address
hacking in IP MASQ,
# making the life with Diald and similar programs much easier.
#
#echo "1" > /proc/sys/net/ipv4/ip_dynaddr
# Enable the LooseUDP patch which some Internet-based games require
#
# If you are trying to get an Internet game to work through your IP
MASQ box,
# and you have set it up to the best of your ability without it
working, try
# enabling this option (delete the "#" character). This option is
disabled
# by default due to possible internal machine UDP port scanning
# vunerabilities.
#
#echo "1" > /proc/sys/net/ipv4/ip_masq_udp_dloose
# MASQ timeouts
#
# 2 hrs timeout for TCP session timeouts
# 10 sec timeout for traffic after the TCP/IP "FIN" packet is received
# 160 sec timeout for UDP traffic (Important for MASQ'ed ICQ users)
#
#/sbin/ipchains -M -S 7200 10 160
# DHCP: For people who receive their external IP address from either
DHCP or
# BOOTP such as ADSL or Cablemodem users, it is necessary to use
the
# following before the deny command. The
"bootp_client_net_if_name"
# should be replaced the name of the link that the DHCP/BOOTP
server
# will put an address on to? This will be something like "eth0",
# "eth1", etc.
#
# This example is currently commented out.
#
#
#/sbin/ipchains -A input -j ACCEPT -i bootp_clients_net_if_name -s 0/0
67 -d /0 #68 -p udp
# Enable simple IP forwarding and Masquerading
#
# NOTE: The following is an example for an internal LAN address in the
# 192.168.0.x network with a 255.255.255.0 or a "24" bit subnet
mask
# connecting to the Internet on interface eth0.
#
# ** Please change this network number, subnet mask, and your
Internet
# ** connection interface name to match your internal LAN setup
#
/sbin/ipchains -P forward DENY
#Enable internal interfaces to communication between each other
/sbin/ipchains -A forward -i eth1 -d 192.168.0.0/24
#Enable internal interfaces to MASQ out to the Internet
/sbin/ipchains -A forward -j MASQ -i eth0 -s 192.168.0.0/24 -d 0.0.0.0/0
/sbin/ipchains -I input 1 -p tcp --dport 143 -j ACCEPT -i eth0
/sbin/ipchains -I input 1 -p tcp --dport 110 -j ACCEPT -i eth0
jeg har ikke adgang til imap eller pop3 når jeg kører telnet localhost
143 eller 110
På forhånd tak