Server4You Shorewall

cryzed

New Member
Hallo, Ich habe mir vor kurzem bei Server4You einen vServer gemietet. Dort wollte ich jetzt eine Shorewall einrichten anstatt mich mit dem Plesk-Firewall Interface rumzuschlagen. Aber ich habe ein kleines Problem, denke ich:

Code:
root@server:~# ifconfig
lo        Protokoll:Lokale Schleife  
          inet Adresse:127.0.0.1  Maske:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:4123107580462294411 errors:0 dropped:0 overruns:0 frame:0
          TX packets:7024053875732919876 errors:0 dropped:0 overruns:0 carrier:0
          Kollisionen:0 Sendewarteschlangenlänge:0 
          RX bytes:5881813131153545817 (308.8 PiB)  TX bytes:7933231361385124143 (492.5 PiB)

venet0    Protokoll:UNSPEC  Hardware Adresse 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00  
          inet Adresse:127.0.0.1  P-z-P:127.0.0.1  Bcast:0.0.0.0  Maske:255.255.255.255
          UP BROADCAST PUNKTZUPUNKT RUNNING NOARP  MTU:1500  Metric:1
          RX packets:1322678 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1211161 errors:0 dropped:0 overruns:0 carrier:0
          Kollisionen:0 Sendewarteschlangenlänge:0 
          RX bytes:187446362 (178.7 MiB)  TX bytes:68020551 (64.8 MiB)

venet0:0  Protokoll:UNSPEC  Hardware Adresse 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00  
          inet Adresse:62.75.144.5  P-z-P:62.75.144.5  Bcast:0.0.0.0  Maske:255.255.255.255
          UP BROADCAST PUNKTZUPUNKT RUNNING NOARP  MTU:1500  Metric:1

root@server:~#

Code:
root@server:/etc/shorewall# tail interfaces policy rules zones
==> interfaces <==
#
#			net	ppp0	-
#
# For additional information, see
# http://shorewall.net/Documentation.htm#Interfaces
#
###############################################################################
#ZONE	INTERFACE	BROADCAST	OPTIONS
net     venet0          62.75.144.5,62.75.144.5   routeback   
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE

==> policy <==
#
# See http://shorewall.net/Documentation.htm#Policy for additional information.
#
###############################################################################
#SOURCE		DEST		POLICY		LOG		LIMIT:BURST
#						LEVEL
fw      net     ACCEPT
net     all     DROP    info
all     all     REJECT  info
#LAST LINE -- DO NOT REMOVE

==> rules <==
#############################################################################################################
#ACTION	SOURCE		DEST		PROTO	DEST	SOURCE		ORIGINAL	RATE		USER/
#						PORT(S)	PORT(S)		DEST		LIMIT		GROUP
#SECTION ESTABLISHED
#SECTION RELATED
ACCEPT  net                     fw      icmp    8               # icmp 
ACCEPT  net                     fw      tcp     80              # http/https(443)
ACCEPT  net                     fw      tcp     22              # ssh
ACCEPT  net                     fw      tcp     25565          # minecraft
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE

==> zones <==
#
#
# For more information, see http://www.shorewall.net/Documentation.htm#Zones
#
###############################################################################
#ZONE	TYPE		OPTIONS		IN			OUT
#					OPTIONS			OPTIONS
fw	firewall
net     ipv4
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE
root@server:/etc/shorewall#

Code:
root@server:/etc/init.d# shorewall start || shorewall clear
Compiling...
Initializing...
Determining Zones...
   IPv4 Zones: net
   Firewall Zone: fw
Validating interfaces file...
Validating hosts file...
Validating Policy file...
Determining Hosts in Zones...
   net Zone: venet0:0.0.0.0/0
Pre-processing Actions...
   Pre-processing /usr/share/shorewall/action.Drop...
   Pre-processing /usr/share/shorewall/action.Reject...
   Pre-processing /usr/share/shorewall/action.Limit...
Deleting user chains...
Compiling /etc/shorewall/routestopped ...
Creating Interface Chains...
Compiling Proxy ARP
Compiling NAT...
Compiling NETMAP...
Compiling Common Rules
Compiling Kernel Route Filtering...
Compiling IP Forwarding...
Compiling /etc/shorewall/rules...
Compiling Actions...
Compiling /usr/share/shorewall/action.Drop for Chain Drop...
Compiling /usr/share/shorewall/action.Reject for Chain Reject...
Compiling /etc/shorewall/policy...
Compiling Traffic Control Rules...
Validating /etc/shorewall/tcdevices...
Validating /etc/shorewall/tcclasses...
Compiling Rule Activation...
Compiling Refresh of Black List...
Validating /etc/shorewall/tcdevices...
Validating /etc/shorewall/tcclasses...
Shorewall configuration compiled to /var/lib/shorewall/.start
Starting Shorewall....
Initializing...
Clearing Traffic Control/QOS
Deleting user chains...
iptables: No chain/target/match by that name
   ERROR: Command "/sbin/iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT" Failed
iptables: No chain/target/match by that name
iptables: No chain/target/match by that name
/sbin/shorewall: line 527: 15942 Beendet                 ${VARDIR}/.start $debugging start
Clearing Shorewall...
iptables: No chain/target/match by that name
iptables: No chain/target/match by that name
done.
root@server:/etc/init.d#

Ich bin mir hierbei 100% sicher das es an meiner Konfiguration liegt. Es scheint Probleme zu geben venet0:0 als Interface zu spezifizieren und bin dann hierdrauf gelandet: Shorewall and Aliased Interfaces. Das hat mich aber irgendwie nur noch mehr verwirrt. Könnte mir jemand helfen?
 
Last edited by a moderator:
Hi,

Code:
iptables: No chain/target/match by that name
   ERROR: Command "/sbin/iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT" Failed

Dein vServer unterstützt kein Stateful Firewall Matching. Das dürfte erstmal Dein Hauptproblem darstellen ;)


-W
 
Back
Top