[PLUTO-help] iptables ... permettere l'export di file system nfs
Andrea Ligabue
ligabue a theochem.unimo.it
Mar 22 Mar 2005 18:46:42 CET
Ho risolto da solo il problema ... in realta' occorre anche abilitare
iptables -A f2to1 -p tcp --sport 0:65535 --dport 32769:32769 -m state --state NEW -j ACCEPT
iptables -A f2to1 -p udp --sport 0:65535 --dport 32769:32769 -j ACCEPT
che e' il protocollo:
filenet-rpc 32769/tcp # Filenet RPC
filenet-rpc 32769/udp # Filenet RPC
... e guarddog (almeno la versione che ho usato io) non lo faceva
ciao a tutti
Liga
----------------------------------------------------------
There's no honorable way to kill, no gentle way to destroy.
There is nothing good in war. Except its ending.
-- Abraham Lincoln, "The Savage Curtain", stardate 5906.5
----------------------------------------------------------
tel +39 059 2055115
On Tue, 22 Mar 2005, Andrea Ligabue wrote:
> Ciao a tutti
>
> sto cercando di configuraee un firewall che tra gli altri servizi mi permetta
> l'export di file system nfs ...
>
> per iniziare la configurazione ho utilizzato guardog e poi sto editando il
> file a mano
>
> ho definito una catena chiamata f2to1 che gestisce i collegamento tra alcune
> macchine del mio ufficio e la macchina che deve fare l'export dei filesystems
>
> per autorizzare l'nfs ho settato is eguenti comandi
>
> iptables -A f2to1 -p tcp --sport 0:65535 --dport 111:111 -m state --state NEW
> -j ACCEPT
> iptables -A f2to1 -p udp --sport 0:65535 --dport 111:111 -j ACCEPT
> iptables -A f2to1 -p tcp --sport 0:65535 --dport 1024:5999 -m state --state
> NEW -j ACCEPT
> iptables -A f2to1 -p udp --sport 0:65535 --dport 0:65535 -j ACCEPT
> iptables -A f2to1 -p tcp --sport 0:65535 --dport 2049:2049 -m state --state
> NEW -j ACCEPT
> iptables -A f2to1 -p udp --sport 0:65535 --dport 2049:2049 -j ACCEPT
>
> ma se faccio un nmap sulla macchina ottengo:
>
> 111/tcp open rpcbind
>
> ma
>
> 2049/tcp closed nfs
>
> ... c'e' un modo per capire a che livello (da quale comando/regola) il mio
> pacchetto viene fermato dal firewall ?
>
> Per capirci, la catena f2to1 (comadno iptables -L) e' questa:
>
> target prot opt source destination
> ACCEPT icmp -- anywhere anywhere icmp echo-reply
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:imaps state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:cvspserver state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:auth state NEW
> ACCEPT udp -- anywhere anywhere udp dpt:113
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:https state NEW
> ACCEPT tcp -- anywhere anywhere tcp dpt:sunrpc
> state NEW
> ACCEPT udp -- anywhere anywhere udp dpt:sunrpc
> ACCEPT tcp -- anywhere anywhere tcp
> dpts:1024:5999 state NEW
> ACCEPT udp -- anywhere anywhere udp
> ACCEPT tcp -- anywhere anywhere tcp dpt:nfs state
> NEW
> ACCEPT udp -- anywhere anywhere udp dpt:nfs
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:smtp state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:imap2 state NEW
> ACCEPT udp -- anywhere anywhere udp dpt:imap2
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:www state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:webcache state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:8008 state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:8000 state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:8888 state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpts:x11:6063 state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:10000 state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:pop3 state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:pop3s state NEW
> ACCEPT udp -- anywhere anywhere udp dpt:xdmcp
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:pop2 state NEW
> ACCEPT tcp -- anywhere anywhere tcp
> spts:1024:65535 dpt:ssh state NEW
> ACCEPT tcp -- anywhere anywhere tcp spts:0:1023
> dpt:ssh state NEW
> logdrop all -- anywhere anywhere
>
> ... gli altri sefvizi funzionano ... nmap mi ritorna (nmap -sT) i seguenti
> risultati:
>
> 22/tcp open ssh
> 25/tcp open smtp
> 80/tcp open http
> 110/tcp open pop3
> 111/tcp open rpcbind
> 143/tcp open imap
> 443/tcp open https
> 1473/tcp closed openmath
> 5432/tcp open postgres
> 10000/tcp open snet-sensor-mgmt
>
> ... qualcuno puo' aiutarmi ?
>
> grazie mille
> Andrea
>
> ----------------------------------------------------------
>
> There's no honorable way to kill, no gentle way to destroy. There is nothing
> good in war. Except its ending.
>
> -- Abraham Lincoln, "The Savage Curtain", stardate 5906.5
>
> ----------------------------------------------------------
>
> tel +39 059 2055115
>
More information about the pluto-help
mailing list