Re: Packets dropped by iptables

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2004-10-12 at 21:42, Alexander Dalloz wrote:

> > -A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
> 
> You drop all other ICMP types other than echo (=8). That is bad. ICMP is
> an important protocol and blocking specific types will break things! If
> you don't know for sure why you block a specific ICMP type then just
> don't. You gain no security.

So I guess I should change this line with:

-A INPUT -p icmp -j ACCEPT

Is this OK?

> > Oct 12 21:18:52 kalimotxo kernel: Bad packet from eth0:IN=eth0 OUT=
> > MAC=00:50:8d:e3:19:cb:00:90:d0:bc:56:db:08:00 SRC=62.48.113.158
> > DST=192.168.1.2 LEN=40 TOS=0x00 PREC=0x00 TTL=118 ID=21077 PROTO=TCP
> > SPT=4662 DPT=36569 WINDOW=0 RES=0x00 ACK RST URGP=0
> > 
> > I think these are acknowledge packets, and they should be accepted (BTW,
> > 4662 is my TCP port for amule). Why are they not accepted by the above
> > rules (state ESTABLISHED) and how can I accept these dropped packets?
> 
> What tells you that these are ESTABLISHED (or RELATED) connections? If
> they would be, then they would not go to the LOGDROP chain. If running a
> P2P client such connection attempts are pretty normal. This is how P2P
> works.

If this are ACK packets, I assume that they are response to a previously
established communication. How can I let this packets come into my
system?

Juan

-- 
Please avoid sending me Word or PowerPoint attachments.
See http://www.fsf.org/philosophy/no-word-attachments.html


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux