Mailinglist Archive: opensuse-security (192 mails)

< Previous Next >
IPchains Assistance
  • From: "KULISHdotCOM" <noc@xxxxxxxxxx>
  • Date: Thu, 4 May 2000 19:12:21 -0500
  • Message-id: <KOECJEMFMEJBKFKNGKIPEEEJCCAA.noc@xxxxxxxxxx>
Can someone please tell me how the following script CAN'T forward HTTP
requests
to and internal server? This is Hacker-Bait if I ever seen it.
Thanks.

#!/bin/sh

echo "Flushing Existing Rules and Setting Policies ..."
ipchains -F
ipchains -P input ACCEPT
ipchains -P output ACCEPT
ipchains -P forward ACCEPT
echo "Complete"
echo " "


echo "Initializing Kernel Level Modules ..."
echo "IP Forwarding"
echo 1 > /proc/sys/net/ipv4/ip_forward
ipmasqadm portfw -f
echo "Complete"
echo " "

echo "Initializing HTTP ..."

ipchains -A input -i eth0 -p tcp -s 0/0 1024:65535 -d 207.177.58.56 80 -j
ACCEPT
ipchains -A forward -p tcp -s 10.1.1.2 80 -j MASQ
ipmasqadm portfw -a -P tcp -L 207.177.58.56 80 -R 10.1.1.2 80
echo "Incoming HTTP requests Forwarded To 10.1.1.2"
echo "Complete"
echo " "



< Previous Next >
This Thread
Follow Ups