1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 <2010> 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 | Index | 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 <2010> 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 |
<== Date ==> | <== Thread ==> |
---|
Subject: | Re: Firewall (iptables) issues? |
From: | Eric Norum <[email protected]> |
To: | "Jeff Hill" <[email protected]> |
Cc: | [email protected] |
Date: | Fri, 5 Nov 2010 15:25:10 -0700 |
I don't understand. The rules that I presented are for inbound packets. I explicitly noted that they are sufficient only under the assumption that outbound packets are not filtered. The first rule -A INPUT -s 192.168.0.0/22 -p udp --sport 5064 -j ACCEPT takes care of incoming responses to PV search requests. The second rule -A INPUT -s 192.168.0.0/22 -p udp --dport 5065 -j ACCEPT takes care of incoming beacons. As far as I can tell, and as far as my empirical tests showed, these are sufficient to allow clients to operate on a firewalled machine. Could you clarify as to what you feel I've missed? On Nov 5, 2010, at 3:14 PM, Jeff Hill wrote:
|