I'm hoping one of you bright folks can lend me a hand with a small
configuration problem I'm having with Marc Heuse' new SuSEfirewall 4.0
package. This is on a SuSE 7.0 professional system.
For several versions of SuSEfirewall, SuSE 6.3 through 7.0, I've tried to
configure the script to allow outside connections to port 6699 on the
firewall (napster) to my internally masqueraded windows desktop running
napster. Additionally, I've tried to let select other services through
to server machines on the internal masqueraded network, but so far,
no joy.
My internal windows desktop is at 192.168.1.101, and is successfully able
to get to Napster servers on port 6699 through the firewall.
I just wish I could share some of my files with the rest of the world.
Oh, and in my /etc/rc.firewall settings, don't be concerned about
pcanywheredata and pcanywherestat being open to the outside world. I
actually have sshd running on those ports, as that's the only way to get
to my firewall from my workplace. ;-)
Here are my /etc/rc.firewall settings:
FW_DEV_WORLD="eth0"
FW_DEV_INT="eth1"
FW_DEV_DMZ=""
FW_ROUTE="yes"
FW_MASQUERADE="yes"
FW_MASQ_NETS="192.168.1.0/24"
FW_MASQ_DEV="$FW_DEV_WORLD"
FW_PROTECT_FROM_INTERNAL="yes"
FW_AUTOPROTECT_GLOBAL_SERVICES="yes"
FW_SERVICES_EXTERNAL_TCP="ssh sshalt pcanywheredata pcanywherestat ident
napster"
FW_SERVICES_EXTERNAL_UDP="pcanywheredata pcanywherestat napster"
FW_SERVICES_EXTERNAL_IP=""
FW_SERVICES_DMZ_TCP=""
FW_SERVICES_DMZ_UDP=""
FW_SERVICES_DMZ_IP=""
FW_SERVICES_INTERNAL_TCP="telnet ftp smtp ssh sshalt pcanywheredata
pcanywherestat domain icq napster www 8080 rrlogind"
FW_SERVICES_INTERNAL_UDP="pcanywheredata pcanywherestat domain www icq 8080
rrlogind"
FW_SERVICES_INTERNAL_IP=""
FW_TRUSTED_NETS=""
FW_SERVICES_TRUSTED_TCP=""
FW_SERVICES_TRUSTED_UDP=""
FW_SERVICES_TRUSTED_IP=""
FW_ALLOW_INCOMING_HIGHPORTS_TCP="yes"
FW_ALLOW_INCOMING_HIGHPORTS_UDP="yes"
FW_SERVICE_DNS="yes"
FW_SERVICE_DHCLIENT="yes"
FW_SERVICE_DHCPD="yes"
FW_SERVICE_SAMBA="no"
FW_FORWARD_TCP=""
FW_FORWARD_UDP=""
FW_FORWARD_IP=""
# Here's where I'm trying to let napster in from the rest of the
# world to my windows box at 192.168.1.101
#
FW_FORWARD_MASQ_TCP="0/0,192.168.1.101,6699"
FW_FORWARD_MASQ_UDP="0/0,192.168.1.101,6699"
FW_REDIRECT_TCP=""
FW_REDIRECT_UDP=""
FW_LOG_DENY_CRIT="yes"
FW_LOG_DENY_ALL="no"
FW_LOG_ACCEPT_CRIT="yes"
FW_LOG_ACCEPT_ALL="no"
FW_KERNEL_SECURITY="yes"
FW_STOP_KEEP_ROUTING_STATE="no"
FW_ALLOW_PING_FW="yes"
FW_ALLOW_PING_DMZ="no"
FW_ALLOW_FW_TRACEROUTE="yes"
FW_ALLOW_FW_SOURCEQUENCH="yes"
FW_MASQ_MODULES="autofw cuseeme ftp irc mfw portfw quake raudio user vdolive"
- - -
Similarly, I tried allowing requests to port 80 through to 192.168.1.10,
which is one of my internal fileservers. It's running apache. No joy
there either... Tried:
FW_FORWARD_MASQ_TCP="0/0,192.168.1.10,80"
FW_FORWARD_MASQ_UDP="0/0,192.168.1.10,80"
Anyone have any ideas? I'll try to anticipate peoples' questions about
my system by providing some more information now, and I'll be happy to
provide more information if requested to do so.
I'm running a self-compiled kernel from the LX_SUSE sources, with the
international crypto patches applied so I could turn on some of
the crypto modules.
The following packages _are_ installed:
Series n:
- ipmasqad
- iproute2
And the following relevant kernel configs were/are set, and the modules
available:
Networking Options:
[*] Routing messages
[*] Network firewalls
[*] Socket filtering
[*] IP: Advanced Router
[*] IP: policy routing
[*] IP: verbose route monitoring
[*] IP: firewalling
[*] IP: firewall packet netlink device
[*] IP: use FWMARK value as routing key
[*] IP: masquerading
[*] IP: masquerading special modules support
<M> IP: ipautofw masquerade support (Experimental)
<M> IP: ipportfw masquerade support
<M> IP: ipmarkfw masquerade support
<M> IP: tunneling
<M> IP: GRE tunnels over IP
I *think* this should get me where I need to go.
I've confirmed that in /lib/modules/2.2.16, there are the following
modules ready to go:
ip_gre.o
ip_masq_cuseeme.o
ip_masq_irc.o
ip_masq_portfw.o
ip_masq_raudio.o
ip_masq_vdolive.o
ip_masq_autofw.o
ip_masq_ftp.o
ip_masq_mfw.o
ip_masq_quake.o
ip_masq_user.o
ipip.o