nao entendi como isto pode estar sendo bloqueado, pelo que vi está
usando gmail e yahoo, que relação tem eles com serviços hospedados em
sua rede?
Explique melhor o problema, para que possamos te ajudar.
Em 27/11/06, Rafael Gomes<rafael(a)gnufacs.org> escreveu:
Tem que ver qual porta seu e-mail está usando.
E outra coisa,
/usr/sbin/iptables pode ser usado em uma variavel... dai ajuda muito
depois...
2006/11/27, Bruno Contin < brunorodeiro(a)gmail.com>:
>
>
> Olá comunidade, eu estou com um problema, implementei um firewall com
proxy ( squid ) no Fedora, a net está ok, o proxy também, só que não consigo
receber e-mails e nem enviar, e as portas no firewall estão abertas para
isso.
> esse é o meu firewall, se alguém puder me ajudar, eu agradeço... Vamos
criar uma lista de pessoas que queiram conversar via Google Talk para tirar
dúvidas? o meu é brunorodeiro(a)gmail.com
> abraços...
> obs: troquei de-mail pois no yahoo não estava recebendo. agora estou com
brunorodeiro(a)gmail.com
> obs: se eu colocar também uma regra no firewall para excluir determinado
ip do proxy, os e-mails funcionam normalmente...
>
> #!/bin/bash
>
> stop ()
> {
> echo "0" > /proc/sys/net/ipv4/ip_forward
> iptables -F
> iptables -X
> }
>
> start ()
> {
>
> ############################# Limpar as regras primeiro
> /usr/sbin/iptables -F
> /usr/sbin/iptables -t nat -F
> /usr/sbin/iptables -F -t mangle
> /usr/sbin/iptables -X -t mangle
>
>
> ############################# Insere os modulos kernel
> /sbin/modprobe iptable_nat
> /sbin/modprobe iptable_mangle
> /sbin/modprobe ipt_conntrack
> /sbin/modprobe ip_conntrack_ftp
> /sbin/modprobe ip_nat_ftp
> /sbin/modprobe ipt_multiport
> /sbin/modprobe ipt_LOG
> /sbin/modprobe ipt_mark
> /sbin/modprobe ipt_MARK
>
> echo 1 > /proc/sys/net/ipv4/ip_forward
>
> echo "0" > /proc/sys/net/ipv4/tcp_ecn
>
> ###########################################
> #/usr/sbin/iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
> /usr/sbin/iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
>
> ########### LOGS ######################
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 5190 -j LOG
--log-prefix "LOG ICQ: "
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 1863 -j LOG
--log-prefix "LOG MSN: "
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 22 -j LOG
--log-prefix "Serviço SSH: "
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 21 -j LOG
--log-prefix "Serviço FTP: "
>
> #####################################
> # PROTECAO EXTRA
> #####################################
>
> ############## Brute Force ############
> /usr/sbin/iptables -A INPUT -p tcp --syn --dport 22 -m recent --name
sshattack --set
> /usr/sbin/iptables -A INPUT -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j LOG --log-prefix 'SSH
REJECT: '
> /usr/sbin/iptables -A INPUT -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j REJECT --reject-with
tcp-reset
> /usr/sbin/iptables -A FORWARD -p tcp --syn --dport 22 -m recent --name
sshattack --set
> /usr/sbin/iptables -A FORWARD -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j LOG --log-prefix 'SSH
REJECT: '
> /usr/sbin/iptables -A FORWARD -p tcp --dport 22 --syn -m recent --name
sshattack --rcheck --seconds 60 --hitcount 3 -j REJECT --reject-with
tcp-reset
>
> ############# Proteção contra trojans ################
> /usr/sbin/iptables -N TROJAN
> /usr/sbin/iptables -A TROJAN -m limit --limit 15/m -j LOG --log-level 6
--log-prefix "FIREWALL: trojan: "
> /usr/sbin/iptables -A TROJAN -j DROP
> /usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 666 -j TROJAN
> /usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 666 -j TROJAN
> /usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 4000 -j TROJAN
> /usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 6000 -j TROJAN
> /usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 6006 -j TROJAN
> /usr/sbin/iptables -A INPUT -p TCP -i eth0 --dport 16660 -j TROJAN
>
> ############## Proteção contra worms #################
> /usr/sbin/iptables -A FORWARD -p tcp --dport 135 -i eth0 -j REJECT
>
> ############## SYN-flood ############
> /usr/sbin/iptables -A FORWARD -p tcp --syn -m limit --limit 1/s -j ACCEPT
>
> ############## ping da morte ########
> /usr/sbin/iptables -A FORWARD -p icmp --icmp-type echo-request -m limit
--limit 1/s -j ACCEPT
>
> ########### Port Scanners ###########
> /usr/sbin/iptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m
limit --limit 1/s -j DROP
>
> ########## IP Spoofing ##############
> /usr/sbin/iptables -N syn-flood
> /usr/sbin/iptables -A INPUT -i eth0 -p tcp --syn -j syn-flood
> /usr/sbin/iptables -A INPUT -s 10.0.0.0/8 -i eth0 -j DROP
> /usr/sbin/iptables -A INPUT -s 172.16.0.0/16 -i eth0 -j DROP
> /usr/sbin/iptables -A INPUT -s 192.168.0.0/24 -i eth0 -j DROP
>
> ######## anomalias de pacotes #######
> /usr/sbin/iptables -A FORWARD -m unclean -j DROP
>
> ################### CEF ########################
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp -d 200.201.174.0/16 -j
ACCEPT
> /usr/sbin/iptables -A FORWARD -p tcp -d 200.201.174.0/16 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp -d 200.201.166.0/16 -j
ACCEPT
> /usr/sbin/iptables -A FORWARD -p tcp -d 200.201.166.0/16 -j ACCEPT
>
> ############################# Redirecionar 80, 3128 -> 3128
>
> #/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 2100 -j DNAT
--to-destination 192.168.0.1:3128
> #/usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 80 -s
192.168.0.0/24 -j DNAT --to-destination 192.168.0.1:3128
> iptables -t nat -A PREROUTING -i eth1 -p tcp -m multiport -s
192.168.0.0/24 --dport 80,443,563 -j REDIRECT --to-port 3128
>
> ############################# Aceitar lista de portas padrao
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 21 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 22 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 23 -j ACCEPT -s
192.168.0.145
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 25 -j ACCEPT -s
192.168.0.0/24
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 53 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 80 -j ACCEPT -s
192.168.0.0/24
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 110 -j ACCEPT -s
192.168.0.0/24
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 443 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 465 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 500 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 587 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 995 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 3306 -j ACCEPT -s
192.168.0.0/24
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 2100 -j ACCEPT -s
192.168.0.0/24
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 8080 -j ACCEPT -s
192.168.0.0/24
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 5017 -j ACCEPT -s
192.168.0.0/24
>
> ########## ICQ ################
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 5190 -j ACCEPT -s
192.168.0.50
>
> ########### MSN #######################
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 1863 -j ACCEPT -s
192.168.0.128
>
>
> ######################################
> # Filtros de portas udp
> ######################################
> /usr/sbin/iptables -t nat -A PREROUTING -p udp --dport 53 -j ACCEPT
> /usr/sbin/iptables -t nat -A PREROUTING -p tcp --dport 53 -j ACCEPT
>
>
> ########### Apos feitas as regras rejeitar todos os outros pacotes
> /usr/sbin/iptables -t nat -p tcp -A PREROUTING -j DROP
> /usr/sbin/iptables -t nat -p udp -A PREROUTING -j DROP
>
> }
>
> case $1 in
> start)
> echo -n Starting Firewall...
> add_rules
> echo "Done"
> ;;
> stop)
> echo -n Stoping Firewall...
> flush_rules
> echo "Done"
> ;;
> restart)
> echo -n Restarting Firewall...
> flush_rules
> add_rules
> echo "Done"
> ;;
> status)
> echo "============================ Firewall rules:"
> iptables -L -n
> echo "============================ Masquerade tables:"
> iptables -t nat -L -n
> echo "============================ Mangle table:"
> iptables -t mangle -L -n
> ;;
> *)
> echo Usar: "$0 { status | start | stop | restart }"
> ;;
> esac
> --
> Fedora-users-br mailing list
> Fedora-users-br(a)redhat.com
>
https://www.redhat.com/mailman/listinfo/fedora-users-br
>
>
>
--
Rafael Brito Gomes
Sistema de Informação
Universidade de Salvador (UNIFACS)
Linux User - 430086
O Tabareu - A Arte em sua forma mais Pura!
http://tabareu.wordpress.com/
Blog do Sinot
http://sinot.wordpress.com/
--
Fedora-users-br mailing list
Fedora-users-br(a)redhat.com
https://www.redhat.com/mailman/listinfo/fedora-users-br
--
Felipe L. Tocchetto