[SuSE 8.1] USB SpeedTouch modem user can't start SuSEfirewall2
Hello to all SuSe users, I installed my Alcatel USB SpeedTouch modem under SuSE8.1 using Benoit Papillaut's open source drivers and everything works fine. I can't, however start the SuSEfirewall2 under SuSE8.1. Any ideas why? Note : I am already using the latest version of SuSEfirewall2 which I downloaded via apt-get and I have already read SuSe Support knowledgebasefor Setting up Alcatel SpeedTouch USB DSL Modem. The configSpeedTouch article doesn't apply (IMO) when using using Benoit Papillaut's open source drivers. I am the first person to admit that I don't know what I an doing but the same setup ran just fine under SuSE8. I would greatly appreicate it if someone would please tell me how to set up / configure SuSEfirewall2 to work as a workstation with a max. of protection for surfing the Web. TIA Here's the error message I get when I try starting SuSEfirewall2. ----- start of log Starting the firewall *** stdout: *** *** stderr: *** insserv: Service SuSEfirewall2_setup has to be enabled for service SuSEfirewall2_final insserv: Service rpc has to be enabled for service SuSEfirewall2_final insserv: Service named has to be enabled for service SuSEfirewall2_final insserv: Service inetd has to be enabled for service SuSEfirewall2_final insserv: Service dhcp has to be enabled for service SuSEfirewall2_final insserv: Service nessusd has to be enabled for service SuSEfirewall2_final insserv: Service wpmd has to be enabled for service SuSEfirewall2_final insserv: Service squid has to be enabled for service SuSEfirewall2_final insserv: Service ipsec has to be enabled for service SuSEfirewall2_final insserv: exiting now! ----- end of log Ciao James Pearson E mail (mai) : james.pearson@wanadoo.fr E mail (bur) : james.pearson@wanadoo.com Web page: http://perso.wanadoo.fr/j.pearson/ What you make of your life is up to you. You have all the tools and resources you need.
jpearson3 wrote:
Hello to all SuSe users,
I installed my Alcatel USB SpeedTouch modem under SuSE8.1 using Benoit Papillaut's open source drivers and everything works fine. I can't, however start the SuSEfirewall2 under SuSE8.1. Any ideas why? Note : I am already using the latest version of SuSEfirewall2 which I downloaded via apt-get and I have already read SuSe Support knowledgebasefor Setting up Alcatel SpeedTouch USB DSL Modem. The configSpeedTouch article doesn't apply (IMO) when using using Benoit Papillaut's open source drivers.
I am the first person to admit that I don't know what I an doing but the same setup ran just fine under SuSE8.
I would greatly appreicate it if someone would please tell me how to set up / configure SuSEfirewall2 to work as a workstation with a max. of protection for surfing the Web. TIA
Here's the error message I get when I try starting SuSEfirewall2. ----- start of log Starting the firewall *** stdout: ***
*** stderr: *** insserv: Service SuSEfirewall2_setup has to be enabled for service SuSEfirewall2_final insserv: Service rpc has to be enabled for service SuSEfirewall2_final insserv: Service named has to be enabled for service SuSEfirewall2_final insserv: Service inetd has to be enabled for service SuSEfirewall2_final insserv: Service dhcp has to be enabled for service SuSEfirewall2_final insserv: Service nessusd has to be enabled for service SuSEfirewall2_final insserv: Service wpmd has to be enabled for service SuSEfirewall2_final insserv: Service squid has to be enabled for service SuSEfirewall2_final insserv: Service ipsec has to be enabled for service SuSEfirewall2_final insserv: exiting now! ----- end of log
Ciao James Pearson E mail (mai) : james.pearson@wanadoo.fr E mail (bur) : james.pearson@wanadoo.com Web page: http://perso.wanadoo.fr/j.pearson/
What you make of your life is up to you. You have all the tools and resources you need.
I had to disable quickmode for my speedtouch to work: in /etc/sysconfig/SuSEfirewall2 FW_QUICKMODE="no" If you wish, I can post my whole conf file. fxf
jpearson3 wrote:
Thank you for your reply. Can you please post your whole conf file to suse-linux-e-help@suse.com as I will be trying to set up SuSEfirewall2 over the weekend.
One more question. Did you just do a vi ... and set the set up the conf file that way or did you use Firewall setup screen? Or maybe both..?
I used vi .... I find it easier than yast 2. Heres' my configuration file; my setup is: one SuSE 8.1 server, with the speedtouch, and four windows boxes running samba, and sharing internet access. # Copyright (c) 2000-2002 SuSE GmbH Nuernberg, Germany. All rights reserved. # [removed all the intro] # # 1.) # Should the Firewall run in quickmode? # # "Quickmode" means that only the interfaces pointing to external networks # are secured, and no other. all interfaces not in the list of FW_DEV_EXT # are allowed full network access! Additionally, masquerading is # automatically activated for FW_MASQ_DEV devices. and last but not least: # all incoming connection via external interfaces are REJECTED. # You will only need to configure 2.) and FW_MASQ_DEV in 6.) # Optionally, you may add entries to section 9a.) # # Choice: "yes" or "no", if not set defaults to "no" # FW_QUICKMODE="no" # # 2.) # Which is the interface that points to the internet/untrusted networks? # # Enter all the network devices here which are untrusted. # # Choice: any number of devices, seperated by a space # e.g. "eth0", "ippp0 ippp1 eth0:1" # FW_DEV_EXT="ppp0" # # 3.) # Which is the interface that points to the internal network? # # Enter all the network devices here which are trusted. # If you are not connected to a trusted network (e.g. you have just a # dialup) leave this empty. # # Choice: leave empty or any number of devices, seperated by a space # e.g. "tr0", "eth0 eth1 eth1:1" or "" # FW_DEV_INT="eth0" # # 4.) # Which is the interface that points to the dmz or dialup network? # # Enter all the network devices here which point to the dmz/dialups. # A "dmz" is a special, seperated network, which is only connected to the # firewall, and should be reachable from the internet to provide services, # e.g. WWW, Mail, etc. and hence are at risk from attacks. # See /usr/share/doc/packages/SuSEfirewall2/EXAMPLES for an example. # # Special note: You have to configure FW_FORWARD to define the services # which should be available to the internet and set FW_ROUTE to yes. # # Choice: leave empty or any number of devices, seperated by a space # e.g. "tr0", "eth0 eth1 eth1:1" or "" # FW_DEV_DMZ="" # # 5.) # Should routing between the internet, dmz and internal network be activated? # REQUIRES: FW_DEV_INT or FW_DEV_DMZ # # You need only set this to yes, if you either want to masquerade internal # machines or allow access to the dmz (or internal machines, but this is not # a good idea). This option supersedes IP_FORWARD from # /etc/sysconfig/network/options # # Setting this option one alone doesn't do anything. Either activate # massquerading with FW_MASQUERADE below if you want to masquerade your # internal network to the internet, or configure FW_FORWARD to define # what is allowed to be forwarded! # # Choice: "yes" or "no", if not set defaults to "no" # FW_ROUTE="yes" # # 6.) # Do you want to masquerade internal networks to the outside? # REQUIRES: FW_DEV_INT or FW_DEV_DMZ, FW_ROUTE # # "Masquerading" means that all your internal machines which use services on # the internet seem to come from your firewall. # Please note that it is more secure to communicate via proxies to the # internet than masquerading. This option is required for FW_MASQ_NETS and # FW_FORWARD_MASQ. # # Choice: "yes" or "no", if not set defaults to "no" # FW_MASQUERADE="yes" # # You must also define on which interface(s) to masquerade on. This is # normally your external device(s) to the internet. # Most users can leave the default below. # # e.g. "ippp0" or "$FW_DEV_EXT" FW_MASQ_DEV="$FW_DEV_EXT" # # Which internal computers/networks are allowed to access the internet # directly (not via proxys on the firewall)? # Only these networks will be allowed access and will be masqueraded! # # Choice: leave empty or any number of hosts/networks seperated by a space. # Every host/network may get a list of allowed services, otherwise everything # is allowed. A target network, protocol and service is appended by a comma to # the host/network. e.g. "10.0.0.0/8" allows the whole 10.0.0.0 network with # unrestricted access. "10.0.1.0/24,0/0,tcp,80 10.0.1.0/24,0/0tcp,21" allows # the 10.0.1.0 network to use www/ftp to the internet. # "10.0.1.0/24,tcp,1024:65535 10.0.2.0/24" is OK too. # Set this variable to "0/0" to allow unrestricted access to the internet. # FW_MASQ_NETS="0/0" # # 7.) # Do you want to protect the firewall from the internal network? # REQUIRES: FW_DEV_INT # # If you set this to "yes", internal machines may only access services on # the machine you explicitly allow. They will be also affected from the # FW_AUTOPROTECT_SERVICES option. # If you set this to "no", any user can connect (and attack) any service on # the firewall. # # Choice: "yes" or "no", if not set defaults to "yes" # # "yes" is a good choice FW_PROTECT_FROM_INTERNAL="no" # # 8.) # Do you want to autoprotect all running network services on the firewall? # # If set to "yes", all network access to services TCP and UDP on this machine # will be prevented (except to those which you explicitly allow, see below: # FW_SERVICES_{EXT,DMZ,INT}_{TCP,UDP}) # # Choice: "yes" or "no", if not set defaults to "yes" # FW_AUTOPROTECT_SERVICES="yes" # # 9.) # Which services ON THE FIREWALL should be accessible from either the internet # (or other untrusted networks), the dmz or internal (trusted networks)? # (see no.13 & 14 if you want to route traffic through the firewall) XXX # # Enter all ports or known portnames below, seperated by a space. # TCP services (e.g. SMTP, WWW) must be set in FW_SERVICES_*_TCP, and # UDP services (e.g. syslog) must be set in FW_SERVICES_*_UDP. # e.g. if a webserver on the firewall should be accessible from the internet: # FW_SERVICES_EXT_TCP="www" # e.g. if the firewall should receive syslog messages from the dmz: # FW_SERVICES_DMZ_UDP="syslog" # For IP protocols (like GRE for PPTP, or OSPF for routing) you need to set # FW_SERVICES_*_IP with the protocol name or number (see /etc/protocols) # # Choice: leave empty or any number of ports, known portnames (from # /etc/services) and port ranges seperated by a space. Port ranges are # written like this: allow port 1 to 10 -> "1:10" # e.g. "", "smtp", "123 514", "3200:3299", "ftp 22 telnet 512:514" # For FW_SERVICES_*_IP enter the protocol name (like "igmp") or number ("2") # # Common: smtp domain FW_SERVICES_EXT_TCP="http 80 pop3 smtp 25 ssh telnet " # Common: domain FW_SERVICES_EXT_UDP="www" # Common: domain # For VPN/Routing which END at the firewall!! FW_SERVICES_EXT_IP="" # # Common: smtp domain FW_SERVICES_DMZ_TCP="" # Common: domain FW_SERVICES_DMZ_UDP="" # For VPN/Routing which END at the firewall!! FW_SERVICES_DMZ_IP="" # # Common: ssh smtp domain FW_SERVICES_INT_TCP="ssh smtp 25 26 143 www 80" # Common: domain syslog FW_SERVICES_INT_UDP="" # For VPN/Routing which END at the firewall!! FW_SERVICES_INT_IP="" # 9a.) # External services in QUICKMODE. # This is only used for QUICKMODE (see 1.)! # (The settings here are similar to section 9.) # Which services ON THE FIREWALL should be accessible from either the # internet (or other untrusted networks), i.e. the external interface(s) # $FW_DEV_EXT # # Enter all ports or known portnames below, seperated by a space. # TCP services (e.g. SMTP, WWW) must be set in FW_SERVICES_QUICK_TCP, and # UDP services (e.g. syslog) must be set in FW_SERVICES_QUICK_UDP. # e.g. if a secure shell daemon on the firewall should be accessible from # the internet: # FW_SERVICES_QUICK_TCP="ssh" # e.g. if the firewall should receive isakmp (IPsec) internet: # FW_SERVICES_QUICK_UDP="isakmp" # For IP protocols (like IPsec) you need to set # FW_SERVICES_QUICK_IP="50" # # Choice: leave empty or any number of ports, known portnames (from # /etc/services) and port ranges seperated by a space. Port ranges are # written like this: allow port 1 to 10 -> "1:10" # e.g. "", "smtp", "123 514", "3200:3299", "ftp 22 telnet 512:514" # For FW_SERVICES_*_IP enter the protocol name (like "igmp") or number ("2") # # QUICKMODE: TCP services open to external networks (InterNet) # (Common: ssh smtp) FW_SERVICES_QUICK_TCP="" # QUICKMODE: UDP services open to external networks (InterNet) # (Common: isakmp) FW_SERVICES_QUICK_UDP="" # QUICKMODE: IP protocols unconditionally open to external networks (InterNet) # (For VPN firewall that is VPN gateway: 50) FW_SERVICES_QUICK_IP="" # # 10.) # Which services should be accessible from trusted hosts/nets? # # Define trusted hosts/networks (doesnt matter if they are internal or # external) and the TCP and/or UDP services they are allowed to use. # Please note that a trusted host/net is *not* allowed to ping the firewall # until you set it to allow also icmp! # # Choice: leave FW_TRUSTED_NETS empty or any number of computers and/or # networks, seperated by a space. e.g. "172.20.1.1 172.20.0.0/16" # Optional, enter a protocol after a comma, e.g. "1.1.1.1,icmp" # Optional, enter a port after a protocol, e.g. "2.2.2.2,tcp,22" # FW_TRUSTED_NETS="" # # 11.) # How is access allowed to high (unpriviliged [above 1023]) ports? # # You may either allow everyone from anyport access to your highports ("yes"), # disallow anyone ("no"), anyone who comes from a defined port (portnumber or # known portname) [note that this is easy to circumvent!], or just your # defined nameservers ("DNS"). # Note that you can't use rpc requests (e.g. rpcinfo, showmount) as root # from a firewall using this script (well, you can if you include range # 600:1023 in FW_SERVICES_EXT_UDP ...). # Please note that with v2.1 "yes" is not mandatory for active FTP from # the firewall anymore. # # Choice: "yes", "no", "DNS", portnumber or known portname, # if not set defaults to "no" # # Common: "ftp-data", better is "yes" to be sure that everything else works :-( FW_ALLOW_INCOMING_HIGHPORTS_TCP="2500 143" # Common: "DNS" or "domain ntp", better is "yes" to be sure ... FW_ALLOW_INCOMING_HIGHPORTS_UDP="yes" # # 12.) # Are you running some of the services below? # They need special attention - otherwise they won´t work! # # Set services you are running to "yes", all others to "no", # if not set defaults to "no" # If you want to offer the below services to your DMZ as well, # (and not just internally), set the switches below to "dmz", # if you even want to offer to the world as well, set to "ext" # instead of "yes" (NOT RECOMMENDED FOR SECURITY REASONS!) # FW_SERVICE_AUTODETECT="yes" # Autodetect the services below when starting # If you are running bind/named set to yes. Remember that you have to open # port 53 (or "domain") as udp/tcp to allow incoming queries. # Also FW_ALLOW_INCOMING_HIGHPORTS_UDP needs to be "yes" FW_SERVICE_DNS="no" # if you use dhclient to get an ip address you have to set this to "yes" ! FW_SERVICE_DHCLIENT="no" # set to "yes" if this server is a DHCP server FW_SERVICE_DHCPD="no" # set to "yes" if this server is running squid. You still have to open the # tcp port 3128 to allow remote access to the squid proxy service. FW_SERVICE_SQUID="no" # set to "yes" if this server is running a samba server. You still have to # open the tcp port 139 to allow remote access to SAMBA. FW_SERVICE_SAMBA="yes" # # 13.) # Which services accessed from the internet should be allowed to the # dmz (or internal network - if it is not masqueraded)? # REQUIRES: FW_ROUTE # # With this option you may allow access to e.g. your mailserver. The # machines must have valid, non-private, IP addresses which were assigned to # you by your ISP. This opens a direct link to your network, so only use # this option for access to your dmz!!!! # # Choice: leave empty (good choice!) or use the following explained syntax # of forwarding rules, seperated each by a space. # A forwarding rule consists of 1) source IP/net and 2) destination IP # seperated by a comma. e.g. "1.1.1.1,2.2.2.2 3.3.3.3/16,4.4.4.4/24" # Optional is a protocol, seperated by a comma, e.g. "5.5.5.5,6.6.6.6,igmp" # Optional is a port after the protocol with a comma, e.g. "0/0,0/0,udp,514" # FW_FORWARD="" # Beware to use this! # # 14.) # Which services accessed from the internet should be allowed to masqueraded # servers (on the internal network or dmz)? # REQUIRES: FW_ROUTE # # With this option you may allow access to e.g. your mailserver. The # machines must be in a masqueraded segment and may not have public IP addesses! # Hint: if FW_DEV_MASQ is set to the external interface you have to set # FW_FORWARD from internal to DMZ for the service as well to allow access # from internal! # # Please note that this should *not* be used for security reasons! You are # opening a hole to your precious internal network. If e.g. the webserver there # is compromised - your full internal network is compromised!! # # Choice: leave empty (good choice!) or use the following explained syntax # of forward masquerade rules, seperated each by a space. # A forward masquerade rule consists of 1) source IP/net, 2) the IP to which # the requests will be forwarded to (in the dmz/intern net), 3) a protocol # (tcp/udp only!) and 4) destination port, seperated by a comma (","), e.g. # "4.0.0.0/8,1.1.1.1,tcp,80" # # Optional is a port after the destination port, to redirect the request to # a different destination port on the destination IP, e.g. # "4.0.0.0/8,1.1.1.1,tcp,80,81" # # Optional is an target IP address on which should the masquerading be decided. # You have to set the optional port option to use this. # # Example: # 200.200.200.0/24,10.0.0.10,tcp,80,81,202.202.202.202 # The class C network 200.200.200.0/24 trying to access 202.202.202.202 port # 80 will be forwarded to the internal server 10.0.0.10 on port 81. # Example: # 200.200.200.0/24,10.0.0.10,tcp,80 # The class C network 200.200.200.0/24 trying to access anything which goes # through this firewall ill be forwarded to the internal server 10.0.0.10 on # port 80 # FW_FORWARD_MASQ="" # Beware to use this! # # 15.) # Which accesses to services should be redirected to a localport on the # firewall machine? # # This can be used to force all internal users to surf via your squid proxy, # or transparently redirect incoming webtraffic to a secure webserver. # # Choice: leave empty or use the following explained syntax of redirecting # rules, seperated by a space. # A redirecting rule consists of 1) source IP/net, 2) destination IP/net, # 3) protocol (tcp or udp) 3) original destination port and 4) local port to # redirect the traffic to, seperated by a colon. e.g.: # "10.0.0.0/8,0/0,tcp,80,3128 0/0,172.20.1.1,tcp,80,8080" # Please note that as 2) destination, you may add '!' in front of the IP/net # to specify everything EXCEPT this IP/net. # FW_REDIRECT="" # # 16.) # Which logging level should be enforced? # You can define to log packets which were accepted or denied. # You can also the set log level, the critical stuff or everything. # Note that logging *_ALL is only for debugging purpose ... # # Choice: "yes" or "no", if not set FW_LOG_*_CRIT defaults to "yes", and # FW_LOG_*_ALL defaults to "no" # FW_LOG_DROP_CRIT="yes" # FW_LOG_DROP_ALL="no" # FW_LOG_ACCEPT_CRIT="yes" # FW_LOG_ACCEPT_ALL="no" # # only change/activate this if you know what you are doing! FW_LOG="--log-level warning --log-tcp-options --log-ip-option --log-prefix SuSE-FW" # # 17.) # Do you want to enable additional kernel TCP/IP security features? # If set to yes, some obscure kernel options are set. # (icmp_ignore_bogus_error_responses, icmp_echoreply_rate, # icmp_destunreach_rate, icmp_paramprob_rate, icmp_timeexeed_rate, # ip_local_port_range, log_martians, mc_forwarding, mc_forwarding, # rp_filter, routing flush) # Tip: Set this to "no" until you have verified that you have got a # configuration which works for you. Then set this to "yes" and keep it # if everything still works. (It should!) ;-) # # Choice: "yes" or "no", if not set defaults to "yes" # FW_KERNEL_SECURITY="no" # # 18.) # Keep the routing set on, if the firewall rules are unloaded? # REQUIRES: FW_ROUTE # # If you are using diald, or automatic dialing via ISDN, if packets need # to be sent to the internet, you need to turn this on. The script will then # not turn off routing and masquerading when stopped. # You *might* also need this if you have got a DMZ. # Please note that this is *insecure*! If you unload the rules, but are still # connected, you might your internal network open to attacks! # The better solution is to remove "/sbin/SuSEfirewall2 stop" or # "/sbin/init.d/firewall stop" from the ip-down script! # # # Choices "yes" or "no", if not set defaults to "no" # FW_STOP_KEEP_ROUTING_STATE="no" # # 19.) # Allow (or don't) ICMP echo pings on either the firewall or the dmz from # the internet? The internet option is for allowing the DMZ and the internal # network to ping the internet. # REQUIRES: FW_ROUTE for FW_ALLOW_PING_DMZ and FW_ALLOW_PING_EXT # # Choice: "yes" or "no", defaults to "no" if not set # FW_ALLOW_PING_FW="yes" # FW_ALLOW_PING_DMZ="no" # FW_ALLOW_PING_EXT="yes" ## # END of /etc/sysconfig/SuSEfirewall2 ## # # #-------------------------------------------------------------------------# # # # EXPERT OPTIONS - all others please don't change these! # # # #-------------------------------------------------------------------------# # # # # 20.) # Allow (or don't) ICMP time-to-live-exceeded to be send from your firewall. # This is used for traceroutes to your firewall (or traceroute like tools). # # Please note that the unix traceroute only works if you say "yes" to # FW_ALLOW_INCOMING_HIGHPORTS_UDP, and windows traceroutes only if you say # additionally "yes" to FW_ALLOW_PING_FW # # Choice: "yes" or "no", if not set defaults to "no" # FW_ALLOW_FW_TRACEROUTE="yes" # # 21.) # Allow ICMP sourcequench from your ISP? # # If set to yes, the firewall will notice when connection is choking, however # this opens yourself to a denial of service attack. Choose your poison. # # Choice: "yes" or "no", if not set defaults to "yes" # FW_ALLOW_FW_SOURCEQUENCH="yes" # # 22.) # Allow/Ignore IP Broadcasts? # # If set to yes, the firewall will not filter broadcasts by default. # This is needed e.g. for Netbios/Samba, RIP, OSPF where the broadcast # option is used. # If you do not want to allow them however ignore the annoying log entries, # set FW_IGNORE_FW_BROADCAST to yes. # # Choice: "yes" or "no", if not set defaults to "no" # FW_ALLOW_FW_BROADCAST="no" # FW_IGNORE_FW_BROADCAST="yes" # # 23.) # Allow same class routing per default? # REQUIRES: FW_ROUTE # # Do you want to allow routing between interfaces of the same class # (e.g. between all internet interfaces, or all internal network interfaces) # be default (so without the need setting up FW_FORWARD definitions)? # # Choice: "yes" or "no", if not set defaults to "no" # FW_ALLOW_CLASS_ROUTING="yes" # # 25.) # Do you want to load customary rules from a file? # # This is really an expert option. NO HELP WILL BE GIVEN FOR THIS! # READ THE EXAMPLE CUSTOMARY FILE AT /etc/sysconfig/SuSEfirewall2-custom # #FW_CUSTOMRULES="/etc/sysconfig/SuSEfirewall2-custom" FW_CUSTOMRULES="" # # 26.) # Do you want to REJECT packets instead of DROPing? # # DROPing (which is the default) will make portscans and attacks much # slower, as no replies to the packets will be sent. REJECTing means, that # for every illegal packet, a connection reject packet is sent to the # sender. # # Choice: "yes" or "no", if not set defaults to "no" # FW_REJECT="no" ___________________________________ Courtesy of SuSE Linux nibz.org
* FX Fraipont;
# FW_MASQ_NETS="0/0"
????? it would be better in my opinion to say which networks is masquearded ie 192.168.1.0/24 much safer
# For FW_SERVICES_*_IP enter the protocol name (like "igmp") or number ("2") # # Common: smtp domain FW_SERVICES_EXT_TCP="http 80 pop3 smtp 25 ssh telnet " ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ http and 80 smtp and 25
just say "www smtp" and if yopuare using telnet why bother with ssh ?
# Common: domain FW_SERVICES_EXT_UDP="www"
www is TCP not UDP
# # Common: ssh smtp domain FW_SERVICES_INT_TCP="ssh smtp 25 26 143 www 80"
"ssh smtp 26 143 www"
FW_ALLOW_INCOMING_HIGHPORTS_TCP="2500 143" ^^^^ 143 is not a highport
# Common: "DNS" or "domain ntp", better is "yes" to be sure ... FW_ALLOW_INCOMING_HIGHPORTS_UDP="yes"
I would have put just "DNS" makes more secure
# if everything still works. (It should!) ;-) # # Choice: "yes" or "no", if not set defaults to "yes" # FW_KERNEL_SECURITY="no"
yes is much better This is my opinion your mileage may vary -- Togan Muftuoglu Unofficial SuSE FAQ Maintainer http://dinamizm.ath.cx
# Context:
I am using a SpeedTouch USB modem under SuSE8.1 to connect to Internet.
I had problems setting up and running the version of SuSEfirewall2 that came
with the 8.1 cd's becasue it errored out during the initial setup.
# To get SuSEfirewall2 up and running and properly setup for my SpeedTouch
USB modem
# I had to do the following things:
#1
# Use apt-get to install a new version SuSEfirewall2 . I installed 3.1-2
#2
# Modify the following ***2*** options of SuSEfirewall2 .
vi /etc/sysconfig/SuSEfirewall2
# 1.)
# Should the Firewall run in quickmode?
FW_QUICKMODE="yes"
# 2.)
# Which is the interface that points to the internet/untrusted networks?
FW_DEV_EXT="ppp0"
#3
# Add the two following soft links under /etc/init.d/rc5.d as they were no
to be found.
# Note : You might have to change the first 3 letters in order to get the
start up order correct
cd /etc/init.d/rc5.d
ln -s ../SuSEfirewall2_setup S03SuSEfirewall2_setup
ln -s ../SuSEfirewall2_final S04SuSEfirewall2_final
Every SuSEfirewall2 now works and it tested out ok at Gibsons "Shields Up"
Most ports were Stealth, 3 ports (tcp, pop3 and ?) were marked "Closed"
Thanks for all the help.
Ciao
James Pearson
E mail (mai) : james.pearson@wanadoo.fr
E mail (bur) : james.pearson@wanadoo.com
Web page: http://perso.wanadoo.fr/j.pearson/
What you make of your life is up to you.
You have all the tools and resources you need.
----- Original Message -----
From: "Togan Muftuoglu"
* FX Fraipont;
on 08 Nov, 2002 wrote: # FW_MASQ_NETS="0/0"
????? it would be better in my opinion to say which networks is masquearded ie 192.168.1.0/24 much safer
# For FW_SERVICES_*_IP enter the protocol name (like "igmp") or number ("2") # # Common: smtp domain FW_SERVICES_EXT_TCP="http 80 pop3 smtp 25 ssh telnet " ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ http and 80 smtp and 25
just say "www smtp" and if yopuare using telnet why bother with ssh ?
# Common: domain FW_SERVICES_EXT_UDP="www"
www is TCP not UDP
# # Common: ssh smtp domain FW_SERVICES_INT_TCP="ssh smtp 25 26 143 www 80"
"ssh smtp 26 143 www"
FW_ALLOW_INCOMING_HIGHPORTS_TCP="2500 143" ^^^^ 143 is not a highport
# Common: "DNS" or "domain ntp", better is "yes" to be sure ... FW_ALLOW_INCOMING_HIGHPORTS_UDP="yes"
I would have put just "DNS" makes more secure
# if everything still works. (It should!) ;-) # # Choice: "yes" or "no", if not set defaults to "yes" # FW_KERNEL_SECURITY="no"
yes is much better
This is my opinion your mileage may vary
--
Togan Muftuoglu Unofficial SuSE FAQ Maintainer http://dinamizm.ath.cx
-- Check the headers for your unsubscription address For additional commands send e-mail to suse-linux-e-help@suse.com Also check the archives at http://lists.suse.com Please read the FAQs: suse-linux-e-faq@suse.com
Togan Muftuoglu wrote:
* FX Fraipont;
on 08 Nov, 2002 wrote: # FW_MASQ_NETS="0/0"
????? it would be better in my opinion to say which networks is masquearded ie 192.168.1.0/24 much safer
This is what I had in previous SuSe versions (7.3 7.1), but 0/0 was the default, so I left it that way. You are surely right.
# For FW_SERVICES_*_IP enter the protocol name (like "igmp") or number ("2") # # Common: smtp domain FW_SERVICES_EXT_TCP="http 80 pop3 smtp 25 ssh telnet "
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ http and 80 smtp and 25
just say "www smtp" and if yopuare using telnet why bother with ssh ?
# Common: domain FW_SERVICES_EXT_UDP="www"
www is TCP not UDP
# # Common: ssh smtp domain FW_SERVICES_INT_TCP="ssh smtp 25 26 143 www 80"
"ssh smtp 26 143 www"
This is quite messy, I must admit, and is the result of some experimentation due to the fact that my smtp does not work anymore since my ISP decided to block port 25. I didn't quite know how to define another port for sendmail. I tried 2500, but I see 2500 is in use on 8.1. So I still don't know.
FW_ALLOW_INCOMING_HIGHPORTS_TCP="2500 143"
^^^^ 143 is not a highport
Right. If I use pop or imap, shouldn't port 143 be open? And where should I specify this?
# Common: "DNS" or "domain ntp", better is "yes" to be sure ... FW_ALLOW_INCOMING_HIGHPORTS_UDP="yes"
I would have put just "DNS" makes more secure
# if everything still works. (It should!) ;-) # # Choice: "yes" or "no", if not set defaults to "yes" # FW_KERNEL_SECURITY="no"
yes is much better
This is my opinion your mileage may vary
It does! I don't claim to be an expert, it is only a setup I found was working for me, after some experimentation .... Thanks for your comments. FX -- ______________________ Courtesy of SuSE Linux nibz.org
participants (3)
-
FX Fraipont
-
jpearson3
-
Togan Muftuoglu