LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Software
User Name
Password
Linux - Software This forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.

Notices


Reply
  Search this Thread
Old 05-25-2008, 07:19 PM   #1
flashl
Member
 
Registered: Mar 2005
Posts: 44

Rep: Reputation: 15
Firestarter ssh problem on FC8


Up until three days ago, my firestarter configuration and hosts.allow files were working fine without complaint. Then suddenly, I could no longer ssh tunnel, use imap client, vnc, etc. to the host.

I have reviewed firestarter's configuration to verify the IP address of the host in question, deleted the ip address, and added the ip address in question in the allow host section but firestarter refuses to allow the host access. Now, the only way to access the remote host is to turn firestarter off or by connecting from another host via ssh.

Have anyone heard of anything similar happening like this before with firestarter?
 
Old 05-26-2008, 02:49 AM   #2
blackhole54
Senior Member
 
Registered: Mar 2006
Posts: 1,896

Rep: Reputation: 61
Is there any possibility that the host you are trying to connect from has actually changed IP address?
 
Old 05-27-2008, 04:18 PM   #3
flashl
Member
 
Registered: Mar 2005
Posts: 44

Original Poster
Rep: Reputation: 15
The host ip address changed earlier, changes were made to hosts.allow and firestarter. All was well, suddenly host could no longer access remote site.

To be sure ip addresses match, the ip address was copied from filter messages in /var/log/messages and pasted into hosts.allow and firestarter's host allow section. When that didn't work, selected host ip in Firestarter's event log and clicked allow host. Still no joy.
 
Old 05-28-2008, 07:50 AM   #4
blackhole54
Senior Member
 
Registered: Mar 2006
Posts: 1,896

Rep: Reputation: 61
I just played around with firestarter. The rule generation looked pretty basic. If you're sure the problem is in the firewall (i.e. firestarter is still logging that it is blocking this host) and if you are familiar with iptables you can look through the rules that are generated with (as root):

Code:
iptables -nvL | less
If you're not familiar with iptables and are comfortable posting the output of the above command along with the problematic IP address, I'll be happy to take a look at it and see if I can spot anything. (Before running the above command, try doing something that will get blocked from the problem host so that the output you post shows it being blocked. Perhaps there won't be any useful info there, but then again, there may be.)
 
Old 06-01-2008, 02:43 PM   #5
flashl
Member
 
Registered: Mar 2005
Posts: 44

Original Poster
Rep: Reputation: 15
Warning, even with iptables for dummies, I still don't get iptables.

BUT, I believe that the remote hosts' newly ISP DHCP issued ipaddress (98.170.0.0) that's being rejected is in firestarters policy area for reserved ips. (ip addresses 98.0.0.0/8)???

Although that conclusion seems reasonable, it does not make sense because a similarly configured host at the same location accepts the remote host using the 98.0.0.0 ip address.

snapshot from /var/log/messages:
Code:
Jun  1 11:24:23 lauren kernel: Inbound IN=eth0 OUT= MAC=00:13:d3:c0:d8:72:00:19:7e:31:a7:2b:08:00 SRC=98.170.211.17 DST=64.183.63.46 LEN=44 TOS=0x00 PREC=0x00 TTL=47 ID=37066 DF PROTO=TCP SPT=54856 DPT=143 WINDOW=5840 RES=0x00 SYN URGP=0 
Jun  1 11:55:39 lauren kernel: Inbound IN=eth0 OUT= MAC=00:13:d3:c0:d8:72:00:19:7e:31:a7:2b:08:00 SRC=98.170.211.17 DST=64.183.63.46 LEN=44 TOS=0x00 PREC=0x00 TTL=47 ID=25574 DF PROTO=TCP SPT=33401 DPT=10000 WINDOW=5840 RES=0x00 SYN URGP=0 
Jun  1 11:57:15 lauren kernel: Inbound IN=eth0 OUT= MAC=00:13:d3:c0:d8:72:00:19:7e:31:a7:2b:08:00 SRC=98.170.211.17 DST=64.183.63.46 LEN=44 TOS=0x00 PREC=0x00 TTL=47 ID=25575 DF PROTO=TCP SPT=33401 DPT=10000 WINDOW=5840 RES=0x00 SYN URGP=0
iptable results:
Code:
Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
53270   15M ACCEPT     tcp  --  *      *       64.183.63.46         0.0.0.0/0           tcp flags:!0x17/0x02 
 116K   18M ACCEPT     udp  --  *      *       64.183.63.46         0.0.0.0/0           
44834   14M ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
  621 83483 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: avg 1/sec burst 5 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:33434 
 1136  370K LSI        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
 340K   56M NR         all  --  eth0   *      !64.183.63.40/29      0.0.0.0/0           
    0     0 DROP       all  --  eth0   *       0.0.0.0/0            255.255.255.255     
    0     0 DROP       all  --  *      *       0.0.0.0/0            64.183.63.47        
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0           
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0             
   57  2751 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           state INVALID 
    0     0 LSI        all  -f  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 10/min burst 5 
 338K   56M INBOUND    all  --  eth0   *       0.0.0.0/0            0.0.0.0/0           
    0     0 LOG_FILTER  all  --  *      *       0.0.0.0/0            0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           LOG flags 0 level 6 prefix `Unknown Input' 

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: avg 1/sec burst 5 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:33434 
    0     0 LSI        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
    0     0 LOG_FILTER  all  --  *      *       0.0.0.0/0            0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           LOG flags 0 level 6 prefix `Unknown Forward' 

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
  312 15020 ACCEPT     tcp  --  *      *       64.183.63.46         64.183.63.46        tcp dpt:53 
58100 4156K ACCEPT     udp  --  *      *       64.183.63.46         64.183.63.46        udp dpt:53 
 156K   43M ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0           
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0           
 1402 91690 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           state INVALID 
 375K   90M OUTBOUND   all  --  *      eth0    0.0.0.0/0            0.0.0.0/0           
    0     0 LOG_FILTER  all  --  *      *       0.0.0.0/0            0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           LOG flags 0 level 6 prefix `Unknown Output' 

Chain INBOUND (1 references)
 pkts bytes target     prot opt in     out     source               destination         
 139K   32M ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED 
 156K   21M ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 ACCEPT     all  --  *      *       64.183.63.42         0.0.0.0/0           
    0     0 ACCEPT     all  --  *      *       64.183.63.43         0.0.0.0/0           
    0     0 ACCEPT     all  --  *      *       64.183.63.44         0.0.0.0/0           
  311 13792 ACCEPT     all  --  *      *       64.183.63.45         0.0.0.0/0           
 1752  105K ACCEPT     all  --  *      *       76.90.225.224        0.0.0.0/0           
    0     0 ACCEPT     all  --  *      *       76.234.49.129        0.0.0.0/0           
    0     0 ACCEPT     all  --  *      *       76.234.49.130        0.0.0.0/0           
    0     0 ACCEPT     all  --  *      *       98.170.211.17        0.0.0.0/0           
    0     0 ACCEPT     all  --  *      *       72.213.202.83        0.0.0.0/0           
    2    80 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:53 
29616 2051K ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:53 
 9348  465K ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:25 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:25 
   48  2240 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:80 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:80 
  178 11360 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:443 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:443 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:24441 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:24441 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:465 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:465 
    0     0 ACCEPT     tcp  --  *      *       98.170.211.17        0.0.0.0/0           tcp dpt:22 
    0     0 ACCEPT     udp  --  *      *       98.170.211.17        0.0.0.0/0           udp dpt:22 
 1797  179K LSI        all  --  *      *       0.0.0.0/0            0.0.0.0/0           
Chain LOG_FILTER (5 references)
 pkts bytes target     prot opt in     out     source               destination         

Chain LSI (75 references)
 pkts bytes target     prot opt in     out     source               destination         
10949 1016K LOG_FILTER  all  --  *      *       0.0.0.0/0            0.0.0.0/0           
 7408  360K LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02 limit: avg 1/sec burst 5 LOG flags 0 level 6 prefix `Inbound ' 
 7408  360K DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02 
    1    40 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x04 limit: avg 1/sec burst 5 LOG flags 0 level 6 prefix `Inbound ' 
    1    40 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x04 
    0     0 LOG        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: avg 1/sec burst 5 LOG flags 0 level 6 prefix `Inbound ' 
    0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8 
 3319  591K LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 5/sec burst 5 LOG flags 0 level 6 prefix `Inbound ' 
 3540  655K DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           

Chain LSO (0 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 LOG_FILTER  all  --  *      *       0.0.0.0/0            0.0.0.0/0           
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 5/sec burst 5 LOG flags 0 level 6 prefix `Outbound ' 
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable 

Chain NR (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 LSI        all  --  eth0   *       0.0.0.0/8            64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       1.0.0.0/8            64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       2.0.0.0/8            64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       5.0.0.0/8            64.183.63.40/29    
    0     0 LSI        all  --  eth0   *       7.0.0.0/8            64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       10.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       23.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       27.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       31.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       36.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       37.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       39.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       42.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       49.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       50.0.0.0/8           64.183.63.40/29     
 2907  197K LSI        all  --  eth0   *       77.0.0.0/8           64.183.63.40/29     
 1447 77906 LSI        all  --  eth0   *       78.0.0.0/8           64.183.63.40/29     
  606 29915 LSI        all  --  eth0   *       79.0.0.0/8           64.183.63.40/29     
 1273 64478 LSI        all  --  eth0   *       92.0.0.0/8           64.183.63.40/29     
  177  8611 LSI        all  --  eth0   *       93.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       94.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       95.0.0.0/8           64.183.63.40/29     
   97  4489 LSI        all  --  eth0   *       96.0.0.0/8           64.183.63.40/29     
   48  2364 LSI        all  --  eth0   *       97.0.0.0/8           64.183.63.40/29     
  614 37769 LSI        all  --  eth0   *       98.0.0.0/8           64.183.63.40/29     
   48  2436 LSI        all  --  eth0   *       99.0.0.0/8           64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       100.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       101.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       102.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       103.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       104.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       105.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       106.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       107.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       108.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       109.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       110.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       111.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       112.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       113.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       114.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       115.0.0.0/8          64.183.63.40/29     
  237 11637 LSI        all  --  eth0   *       116.0.0.0/8          64.183.63.40/29     
  313 16930 LSI        all  --  eth0   *       117.0.0.0/8          64.183.63.40/29     
  122  5920 LSI        all  --  eth0   *       118.0.0.0/8          64.183.63.40/29     
  127  7469 LSI        all  --  eth0   *       119.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       120.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       127.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       169.254.0.0/16       64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       172.16.0.0/12        64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       173.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       174.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       175.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       176.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       177.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       178.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       179.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       180.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       181.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       182.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       183.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       184.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       185.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       186.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       187.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       192.0.2.0/24         64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       192.168.0.0/16       64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       197.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       198.18.0.0/15        64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       223.0.0.0/8          64.183.63.40/29     
  127  7469 LSI        all  --  eth0   *       119.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       120.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       127.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       169.254.0.0/16       64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       172.16.0.0/12        64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       173.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       174.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       175.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       176.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       177.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       178.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       179.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       180.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       181.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       182.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       183.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       184.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       185.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       186.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       187.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       192.0.2.0/24         64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       192.168.0.0/16       64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       197.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       198.18.0.0/15        64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       223.0.0.0/8          64.183.63.40/29     
    0     0 LSI        all  --  eth0   *       224.0.0.0/3          64.183.63.40/29     

Chain OUTBOUND (1 references)
 pkts bytes target     prot opt in     out     source               destination         
  629 84707 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
 163K   58M ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED 
89976   22M ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED 
 121K 9337K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           



   48  2364 LSI        all  --  eth0   *       97.0.0.0/8           64.183.63.40/29     
  625 38253 LSI        all  --  eth0   *       98.0.0.0/8           64.183.63.40/29     
   48  2436 LSI        all  --  eth0   *       99.0.0.0/8           64.183.63.40/29
 
Old 06-02-2008, 03:46 AM   #6
blackhole54
Senior Member
 
Registered: Mar 2006
Posts: 1,896

Rep: Reputation: 61
Quote:
Originally Posted by flashl View Post
Warning, even with iptables for dummies, I still don't get iptables.
I dunno. You seem to be doing pretty well.

Quote:
BUT, I believe that the remote hosts' newly ISP DHCP issued ipaddress (98.170.0.0) that's being rejected is in firestarters policy area for reserved ips. (ip addresses 98.0.0.0/8)???
Exactly so. Now I should warn you that I am no Firestarter expert and I haven't studied the manual. But off hand, I don't see a way to handle this situation from the GUI. (Doesn't mean there isn't one.) However, the relevant data is listed in /etc/firsestarter/non-routables, and you can simply hand edit that if you don't have a better way. (You will just have to delete the line; it doesn't appear to allow for commenting something out. I'd suggest making a backup copy of the unmodified file.) Also note that the pathname I quoted is from Ubuntu; the location of the file could be different in Fedora.

Another thing, I am not an expert on unroutable addresses in Internet Protocol. But I seem to remember that there were some addresses that were reserved for the time being. Maybe there has been a change and some addresses that used to be reserved are now being used? I just downloaded the tarball from fs-security to check for any recent changes. It is dated 2005 and the non-routables file still contains that address range.

Quote:
Although that conclusion seems reasonable, it does not make sense because a similarly configured host at the same location accepts the remote host using the 98.0.0.0 ip address.
My reading of the rules you posted is it should be rejecting that address if the connection attempt comes in on eth0 and does not originate from 64.183.63.40/29 (which I assume is your LAN).

Code:
  Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
53270   15M ACCEPT     tcp  --  *      *       64.183.63.46         0.0.0.0/0           tcp flags:!0x17/0x02 
 116K   18M ACCEPT     udp  --  *      *       64.183.63.46         0.0.0.0/0           
44834   14M ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0           
  621 83483 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: avg 1/sec burst 5 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:33434 
 1136  370K LSI        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
 340K   56M NR         all  --  eth0   *      !64.183.63.40/29      0.0.0.0/0 
So the only way I could see different behavior is if something is configured differently on the other box or if the other box is on the same subnet (as reflected by the rule I've highlighted above) as the problematic client. As always, I am capable of making mistakes. You could always do a similar listing of the rules using iptables on the other box. The critcal rules for this would be what I've highlighted above, the rule you've probably already spotted in the NR chain, and, of course, the LSI chain where the packets actually get dropped.

Last edited by blackhole54; 06-02-2008 at 03:49 AM. Reason: cleanup
 
Old 06-02-2008, 09:20 AM   #7
blackhole54
Senior Member
 
Registered: Mar 2006
Posts: 1,896

Rep: Reputation: 61
flashl,

This was intended as an edit to the previous post but I am having trouble with LQ's edit function. (Thank heavens for local text editors!)

EDIT: Firestarter has an option (Preferences -> Advanced Options under "Traffic Validation") called Block traffic from reserved addresses on public interfaces. Unchecking this box causes the NR chain to disappear. Perhaps the computer that is allowing connections from the problematic client has this box unchecked. Whether or not it should be checked is a decision you will have to make.

EDIT2: It occurred to me some of the confusion you professed about iptables might be not understanding CIDR notation. If so, take a look here. If you are a little rusty with "dotted decimal notation" for IP addresses, have a look here.

Last edited by blackhole54; 06-02-2008 at 09:51 AM.
 
Old 06-02-2008, 11:56 AM   #8
flashl
Member
 
Registered: Mar 2005
Posts: 44

Original Poster
Rep: Reputation: 15
[solved]

blackhole54, Thank you, for taking the time to help and sharing your expertise and insight.

Changing the non-routables file on the complainting host solved the problem.

I will use the information shared to re-familiarize myself with ip notation and CIDR.

Again, Thanks.
 
Old 06-02-2008, 09:00 PM   #9
chrism01
LQ Guru
 
Registered: Aug 2004
Location: Sydney
Distribution: Rocky 9.2
Posts: 18,359

Rep: Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751Reputation: 2751
For reserved IP ranges, see Notes section here: http://www.iana.org/assignments/ipv4-address-space
Note that you were thinking of 198...., 98... is fine.
 
Old 06-02-2008, 09:51 PM   #10
blackhole54
Senior Member
 
Registered: Mar 2006
Posts: 1,896

Rep: Reputation: 61
Quote:
Originally Posted by chrism01 View Post
For reserved IP ranges, see Notes section here: http://www.iana.org/assignments/ipv4-address-space
Note that you were thinking of 198...., 98... is fine.
Thanks for the link. Unfortunately, Firestarter is listing both 98.0.0.0/8 and 198.18.0.0/15 as "unroutable." But, as I previously noted, that project last released code in 2005.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
squid problem in fc8 Ammad Linux - Networking 2 05-17-2008 11:07 AM
Disable selinux at install problem FC8 Ezplan Fedora - Installation 4 03-13-2008 07:07 PM
FC4 to FC8 Installation by CD Problem h_tere2000 Linux - Software 7 12-28-2007 11:01 PM
Problem installing FC8 on my scsi DinoFly Linux - Newbie 1 11-22-2007 01:15 AM
FC8 wireless problem using bcm43xx_fwcutter nga_tom Linux - Wireless Networking 1 11-20-2007 10:09 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Software

All times are GMT -5. The time now is 04:25 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration