~mdw
/
firewall
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
classify.m4: Explicitly class 255.255.255.255 as broadcast.
[firewall]
/
radius.m4
diff --git
a/radius.m4
b/radius.m4
index
0db7c51
..
6b4a32a
100644
(file)
--- a/
radius.m4
+++ b/
radius.m4
@@
-58,10
+58,8
@@
iptables -A fwd-spec-nofrag -j ACCEPT \
-m state --state ESTABLISHED
## BCP38 filtering. Note that addresses here are seen before NAT is applied.
-m state --state ESTABLISHED
## BCP38 filtering. Note that addresses here are seen before NAT is applied.
-bcp38 4 ppp0 62.49.204.144/28 172.29.198.0/23
-bcp38 6 t6-he \
- 2001:470:1f08:1b98::2 2001:470:1f09:1b98::/64 \
- 2001:470:9740::/48
+bcp38 4 ppp0 81.2.113.195 81.187.238.128/28 172.29.198.0/23
+bcp38 6 ppp0 2001:8b0:c92::/48
## NAT for RFC1918 addresses.
for i in PREROUTING OUTPUT POSTROUTING; do
## NAT for RFC1918 addresses.
for i in PREROUTING OUTPUT POSTROUTING; do
@@
-74,26
+72,21
@@
run iptables -t nat -X
run iptables -t nat -N outbound
run iptables -t nat -A outbound -j RETURN ! -o ppp0
run iptables -t nat -A outbound -j RETURN ! -s 172.29.198.0/23
run iptables -t nat -N outbound
run iptables -t nat -A outbound -j RETURN ! -o ppp0
run iptables -t nat -A outbound -j RETURN ! -s 172.29.198.0/23
-run iptables -t nat -A outbound -j RETURN -d
62.49.204.144
/28
+run iptables -t nat -A outbound -j RETURN -d
81.187.238.128
/28
run iptables -t nat -A outbound -j RETURN -d 172.29.198.0/23
## An awful hack.
##run iptables -t nat -A outbound -j DNETMAP --reuse \
run iptables -t nat -A outbound -j RETURN -d 172.29.198.0/23
## An awful hack.
##run iptables -t nat -A outbound -j DNETMAP --reuse \
-## -s 172.29.199.44 --prefix
62.49.204.157
+## -s 172.29.199.44 --prefix
81.187.238.142
##run iptables -t nat -A outbound -j DNETMAP --reuse \
##run iptables -t nat -A outbound -j DNETMAP --reuse \
-## -s 172.29.198.34 --prefix
62.49.204.157
+## -s 172.29.198.34 --prefix
81.187.238.142
##run iptables -t nat -A outbound -j DNETMAP --reuse \
##run iptables -t nat -A outbound -j DNETMAP --reuse \
-## -s 172.29.198.11 --prefix
62.49.204.157
+## -s 172.29.198.11 --prefix
81.187.238.142
##run iptables -t nat -A PREROUTING -j DNETMAP
##run iptables -t nat -A PREROUTING -j DNETMAP
-run iptables -t nat -A outbound -j SNAT --to-source
62.49.204.158
+run iptables -t nat -A outbound -j SNAT --to-source
81.187.238.142
run iptables -t nat -A POSTROUTING -j outbound
run iptables -t nat -A POSTROUTING -j outbound
-## TCP MSS clamping to help given Demon's sluggish approach to fragmentation-
-## needed errors.
-run ip46tables -t mangle -A FORWARD -o ppp0 -p tcp --tcp-flags SYN,RST SYN \
- -j TCPMSS --clamp-mss-to-pmtu
-
## Set up NAT protocol helpers. In particular, SIP needs some special
## twiddling.
run modprobe nf_conntrack_sip \
## Set up NAT protocol helpers. In particular, SIP needs some special
## twiddling.
run modprobe nf_conntrack_sip \
@@
-106,9
+99,9
@@
done
## Forbid anything complicated to the NAT address. Be sure to allow ident,
## though.
## Forbid anything complicated to the NAT address. Be sure to allow ident,
## though.
-run iptables -A INPUT -d
62.49.204.158
-p tcp -j ACCEPT \
+run iptables -A INPUT -d
81.187.238.142
-p tcp -j ACCEPT \
-m multiport --destination-ports=113
-m multiport --destination-ports=113
-run iptables -A INPUT -d
62.49.204.158
! -p icmp -j REJECT
+run iptables -A INPUT -d
81.187.238.142
! -p icmp -j REJECT
m4_divert(-1)
###----- That's all, folks --------------------------------------------------
m4_divert(-1)
###----- That's all, folks --------------------------------------------------